Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Papago.Plus_1.0.0_x64-setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\cn.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\en.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\id.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\ja.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\ko.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\tw.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\vi.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Papago Plus\uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1179d6f7-a5a8-4b83-a158-ab1b93d1778d.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 231674
|
modified
|
||
C:\Users\user\AppData\Local\Temp\3a08e40f-6253-4bc6-a175-3866276b5b3f.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\3e906415-5e5d-4450-8924-a21c8a139cf6.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\6913fb4f-0acc-4a77-a182-f127ba4214b5.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\723ed2e5-e279-4260-bfd6-16077be302e5.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\79f0c55f-2ec9-4c4f-95e3-520d2adeb157.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\87ef32e3-625c-4f23-ba36-4391be061d2d.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\926c3fe6-6c40-49b3-b031-b4dfd3fe7b08.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\e0539ede-ea9e-42a9-82ef-23c404633c18.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\e7444031-c9f7-4064-9454-b49f06753b7f.tmp
|
PNG image data, 1072 x 291, 8-bit/color RGBA, non-interlaced
|
modified
|
||
C:\Users\user\AppData\Local\Temp\f9a551ef-7b07-473b-b561-4e46b83e812c.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\fdbe38b4-ffb3-482e-9551-abb941dd0d79.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsk4D0F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\modern-header.bmp
|
PC bitmap, Windows 3.x format, 150 x 57 x 32, resolution 11811 x 11811 px/m, cbSize 34254, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 32, resolution 11811 x 11811 px/m, cbSize 206038, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\nsis_tauri_utils.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\3da6f01e-d197-402c-a10c-a70bf235b487.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\4f6ca950-ef83-4833-99f6-b591cb361caf.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\92345e15-afec-41dc-9f2d-e86126a4195d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\9e226e7f-94e2-4fdf-9042-6c07f0a602e0.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics\BrowserMetrics-6704C468-1EE8.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad\throttle_store.dat
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\47484a70-b49f-4c0b-ae51-e95f9913dd88.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\4862ee42-0f24-445c-908e-89912293dcea.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\6655691a-488e-4cbe-af4b-9a84450e1111.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\91e69a5c-0a3a-4f46-b708-b2a3e8f35565.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000001
|
ASCII text, with very long lines (16975)
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000002
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000003
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000004
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000005
|
ASCII text, with very long lines (57751)
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000006
|
Unicode text, UTF-8 text, with very long lines (65342), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000007
|
Unicode text, UTF-8 text, with very long lines (65502), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000008
|
Unicode text, UTF-8 text, with very long lines (17318)
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\0bd958ffceadd47f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\0e5deb4684d55dc3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\113708608bfb0a61_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\11cb47d42fc2befe_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\18aec1929f1c1678_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\29cfe2c18c748826_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\2c6d278e8c6cb526_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\40f4b959219de741_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\46f3fc861737d24f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\5b77cd7630c4f1cc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\610dc6f461cc78ca_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\620fb405f7202701_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6ae4c7797c63ca43_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6d0e3171141dfceb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6f39ad8b1740b814_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\78d2ea91c56d1d68_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\7ba8005d902e503d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\8e06c23a2c52c992_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\991c6c69e4718e61_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9c2a0b62fe40bc60_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9cee2c796f197867_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9edbcbe2499b698e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\a43f3c81ebd6f55d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\c51be6f37a35bd1b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\d634a54afeba8145_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\d68640305f1fb0dc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\da7ecd3fa4f599d9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\defc3d746e09cc02_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\fb1a55d8c34219d0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF558455.TMP (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8,
version-valid-for 14
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 13, cookie
0x8, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie
0xc, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\0526e3e7-e3a4-4ce1-95cc-0e572c0d3a6a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\22ee898e-8444-411a-bcdc-2665de4d5979.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\2de52058-fa56-4d21-9121-2ad7d4bf02c9.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\534d40eb-ded5-4603-a776-0a1a9398595e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\7605c362-49ca-419b-a5b1-72dea92247b0.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\941a229a-ee05-4818-a661-c639a2da3715.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State~RF553829.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State~RF55d331.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\SCT Auditing Pending Reports~RF54ab79.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF54f777.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF552126.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF55bb44.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\README
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Top Sites
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie
0x36, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\da6b48dc-a4c0-4b54-af92-e3ed59bd400d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54a88b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54a8ba.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54cff9.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54faa3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF55226f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF55b9cd.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\c75cd8bb-f20c-4d1d-90b8-2bcdff84a29b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\cd22afcf-b58b-4290-8c5d-80dd48324229.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\d281619f-80e2-49f9-b7be-8995fc90df98.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Papago Plus.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Mon Sep 23 01:19:44 2024, mtime=Tue Oct 8 04:34:18 2024, atime=Mon Sep 23 01:19:44 2024, length=12311216, window=hide
|
dropped
|
||
C:\Users\user\Desktop\Papago Plus.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Mon Sep 23 01:19:44 2024, mtime=Tue Oct 8 04:34:29 2024, atime=Mon Sep 23 01:19:44 2024, length=12311216, window=hide
|
dropped
|
There are 202 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Papago.Plus_1.0.0_x64-setup.exe
|
"C:\Users\user\Desktop\Papago.Plus_1.0.0_x64-setup.exe"
|
||
C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe
|
"C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe"
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=papago-plus.exe
--webview-exe-version=1.0.0 --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2
--edge-webview-custom-scheme --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection
--enable-features=MojoIpcz --lang=en-GB --mojo-named-platform-channel-pipe=7816.7908.8323693247663805206
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\com.papago-plus\EBWebView
/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad
--annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program
Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge
WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ffdfb508e88,0x7ffdfb508e98,0x7ffdfb508ea8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--mojo-platform-channel-handle=1780 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz
--disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView"
--webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2
--edge-webview-custom-scheme --mojo-platform-channel-handle=2844 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService
--lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView"
--webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2
--edge-webview-custom-scheme --mojo-platform-channel-handle=3068 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --first-renderer-process
--autoplay-policy=no-user-gesture-required --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5548653942 --mojo-platform-channel-handle=3316 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5550154672 --mojo-platform-channel-handle=3928 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5551248804 --mojo-platform-channel-handle=4104 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5552634586 --mojo-platform-channel-handle=4276 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=9 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5556940838 --mojo-platform-channel-handle=4684 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=10 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5559462037 --mojo-platform-channel-handle=5084 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=11 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5562238683 --mojo-platform-channel-handle=5236 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=12 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5564302324 --mojo-platform-channel-handle=5636 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=13 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5564872825 --mojo-platform-channel-handle=5764 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=14 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5565507872 --mojo-platform-channel-handle=5972 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=15 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5565959933 --mojo-platform-channel-handle=6328 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required
--disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=16 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909
--launch-time-ticks=5567112456 --mojo-platform-channel-handle=6720 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144
--enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.papago-plus.com/signup/email?url=https%3A%2F%2Fpapago-plus.com
|
210.89.168.48
|
||
https://update.papago-plus.com/update/
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/app/not-found.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
https://permanently-removed.invalid/oauth2/v2/tokeninfo
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://account.papago-plus.com/_next/static/css/cebd1a14e6c2fb8c.css
|
210.89.168.48
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://permanently-removed.invalid/chrome/blank.htmlhttps://permanently-removed.invalid/LogoutYxABs
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-supportcargo
|
unknown
|
||
http://tauri.localhostpA
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/9964.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
https://anglebug.com/7714
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/6dd5e7ea.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
https://www.microsoftnews.cn/
|
unknown
|
||
http://tauri.localhost/welcome
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://account.papago-plus.com/_next/static/css/7b51cb7d19f701b9.css
|
210.89.168.48
|
||
http://tauri.localhost/update-history
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/app/error.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
http://tauri.localhost/update-check
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://github.com/tauri-apps/tauri/issues/8306)
|
unknown
|
||
http://tauri.localhostcontent-type:text/html
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://openjsf.org/
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLPretendardVariableWeightThinPretendardVariable-T
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://account.papago-plus.com/_next/static/media/icon-show-eye.fad13419.svg
|
210.89.168.48
|
||
https://permanently-removed.invalid/oauth2/v4/token
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://account.papago-plus.com/signup?url=https%3A%2F%2Fpapago-plus.com%2F&_rsc=15y08
|
210.89.168.48
|
||
https://papago-plus.com
|
unknown
|
||
http://tauri.localhost/assets/PretendardVariable-CJuje-Rk.woff2P
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://account.papago-plus.com/_next/static/css/ab3914a7715d4111.css
|
210.89.168.48
|
||
https://account.papago-plus.com/_next/static/chunks/9463.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
https://account.papago-plus.com/_next/static/chunks/app/(root)/login/template.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
http://no.url.provided.local
|
unknown
|
||
https://github.com/webpack-contrib/style-loader#insertat)
|
unknown
|
||
http://underscorejs.org/LICENSE
|
unknown
|
||
https://permanently-removed.invalid/chrome/blank.html
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://update.papago-plus.com/
|
unknown
|
||
https://permanently-removed.invalid/v1/issuetoken
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://permanently-removed.invalid/reauth/v1beta/users/
|
unknown
|
||
https://github.com/swsnr/gethostname.rs/issues
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://update.papago-plus.com/sentry
|
unknown
|
||
http://tauri.localhost/setting
|
unknown
|
||
http://tauri.localhost/update-check=
|
unknown
|
||
http://tauri.localhost/exit
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/6199.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
https://npms.io/search?q=ponyfill.
|
unknown
|
||
https://permanently-removed.invalid/RotateBoundCookies
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://tauri.localhost/settingPapago
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
http://tauri.localhost/assets/PretendardVariable-CJuje-Rk.woff2PP
|
unknown
|
||
http://tauri.localhost/update-history/
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://localhost.msn.com/
|
unknown
|
||
https://orioncactus.com/5)
|
unknown
|
||
https://papago-plus.com/login?url=https%3A%2F%2Fpapago-plus.com
|
61.247.192.225
|
||
https://account.papago-plus.com/_next/static/chunks/7664.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
http://anglebug.com/4384
|
unknown
|
||
http://localhost:1420/../disticons/128x128.pngicons/128x128
|
unknown
|
||
https://account.papago-plus.com/_next/static/chunks/8872.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
|
210.89.168.48
|
||
http://anglebug.com/3970
|
unknown
|
||
https://account.papago-plus.com/favicon.ico
|
210.89.168.48
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://orioncactus.com/
|
unknown
|
||
https://urlpattern.spec.whatwg.org/)
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
https://account.papago-plus.com/signup/email?url=https%3A%2F%2Fpapago-plus.com%2F
|
210.89.168.48
|
||
http://anglebug.com/7760
|
unknown
|
||
http://json-schema.org/draft-07/schema#A
|
unknown
|
||
https://account.papago-plus.com/login?url=https%3A%2F%2Fpapago-plus.com
|
210.89.168.48
|
||
http://anglebug.com/5901
|
unknown
|
||
http://tauri.localhost/update-checkPapago
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chrome.cloudflare-dns.com
|
162.159.61.3
|
||
update.papago-plus.com.nheos.com
|
210.89.168.83
|
||
update.papago-plus.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
210.89.168.83
|
update.papago-plus.com.nheos.com
|
Korea Republic of
|
||
162.159.61.3
|
chrome.cloudflare-dns.com
|
United States
|
||
61.247.192.225
|
unknown
|
Korea Republic of
|
||
210.89.168.48
|
unknown
|
Korea Republic of
|
||
204.79.197.239
|
unknown
|
United States
|
||
125.209.233.25
|
unknown
|
Korea Republic of
|
||
96.17.65.14
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
172.64.41.3
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\papago-plus
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\papago-plus
|
NULL
|
||
HKEY_CURRENT_USER_Classes\papago-plus\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\papago-plus\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\papago-plus\Papago Plus
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\papago-plus\Papago Plus
|
Installer Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
dr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
|
UsageStatsInSample
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
usagestats
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
urlstats
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
failed_count
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
There are 38 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7D1001D50000
|
trusted library allocation
|
page read and write
|
||
19EC01678000
|
trusted library allocation
|
page read and write
|
||
324001F64000
|
trusted library allocation
|
page read and write
|
||
333800638000
|
trusted library allocation
|
page read and write
|
||
76BC03A18000
|
trusted library allocation
|
page read and write
|
||
19EC01044000
|
trusted library allocation
|
page read and write
|
||
696001F34000
|
trusted library allocation
|
page read and write
|
||
333801ECC000
|
trusted library allocation
|
page read and write
|
||
696001204000
|
trusted library allocation
|
page read and write
|
||
7D10003C4000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01E5C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01C0C000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
3338009E4000
|
trusted library allocation
|
page read and write
|
||
7D1002088000
|
trusted library allocation
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
324001F24000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
324001D8C000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
2B00B280000
|
remote allocation
|
page read and write
|
||
6960008A0000
|
trusted library allocation
|
page read and write
|
||
333802178000
|
trusted library allocation
|
page read and write
|
||
19EC01DF0000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
333801D9C000
|
trusted library allocation
|
page read and write
|
||
324001DBC000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
22C85C39000
|
heap
|
page read and write
|
||
22C87610000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
1CF6FE75000
|
heap
|
page read and write
|
||
76BC044A4000
|
trusted library allocation
|
page read and write
|
||
19EC01E3C000
|
trusted library allocation
|
page read and write
|
||
3338002A0000
|
trusted library allocation
|
page read and write
|
||
324001E14000
|
trusted library allocation
|
page read and write
|
||
71A8022D8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
696000B6C000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
135FD944000
|
heap
|
page read and write
|
||
19EC00B61000
|
trusted library allocation
|
page read and write
|
||
333801DBC000
|
trusted library allocation
|
page read and write
|
||
19EC0074C000
|
trusted library allocation
|
page read and write
|
||
19EC00634000
|
trusted library allocation
|
page read and write
|
||
33380061C000
|
trusted library allocation
|
page read and write
|
||
333800BE8000
|
trusted library allocation
|
page read and write
|
||
79D8002DC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
22C8B7FC000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
7D100040C000
|
trusted library allocation
|
page read and write
|
||
22C87845000
|
heap
|
page read and write
|
||
135FD8A2000
|
heap
|
page read and write
|
||
19EC01064000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
27964902000
|
heap
|
page read and write
|
||
12F4002D8000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
69600205C000
|
trusted library allocation
|
page read and write
|
||
696001C1C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C87563000
|
heap
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
19EC01FE8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
22C876CB000
|
heap
|
page read and write
|
||
19EC00BA0000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
19EC01CD8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE74000
|
heap
|
page read and write
|
||
324001D5C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
7D1002085000
|
trusted library allocation
|
page read and write
|
||
25DD1A2B000
|
heap
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
19EC01F28000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE6A000
|
heap
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
19EC00AC8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
19EC00AD4000
|
trusted library allocation
|
page read and write
|
||
324000614000
|
trusted library allocation
|
page read and write
|
||
79D800614000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
79D80040C000
|
trusted library allocation
|
page read and write
|
||
275400150000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001C8C000
|
trusted library allocation
|
page read and write
|
||
25DD1A2B000
|
heap
|
page read and write
|
||
33380206C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801D84000
|
trusted library allocation
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
22C8752C000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB076000
|
heap
|
page read and write
|
||
324000BB4000
|
trusted library allocation
|
page read and write
|
||
19EC01204000
|
trusted library allocation
|
page read and write
|
||
19EC00BB0000
|
trusted library allocation
|
page read and write
|
||
333800B90000
|
trusted library allocation
|
page read and write
|
||
324000824000
|
trusted library allocation
|
page read and write
|
||
19EC0077C000
|
trusted library allocation
|
page read and write
|
||
7D1001FCC000
|
trusted library allocation
|
page read and write
|
||
696000614000
|
trusted library allocation
|
page read and write
|
||
19EC02040000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
696000348000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
696001EE8000
|
trusted library allocation
|
page read and write
|
||
324002054000
|
trusted library allocation
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
333802018000
|
trusted library allocation
|
page read and write
|
||
696001CFC000
|
trusted library allocation
|
page read and write
|
||
19EC0074C000
|
trusted library allocation
|
page read and write
|
||
135FD92A000
|
heap
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
324001D84000
|
trusted library allocation
|
page read and write
|
||
3148002BC000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
696001F08000
|
trusted library allocation
|
page read and write
|
||
1ED24A73000
|
heap
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
5FC0003AC000
|
trusted library allocation
|
page read and write
|
||
696001D94000
|
trusted library allocation
|
page read and write
|
||
696002098000
|
trusted library allocation
|
page read and write
|
||
1ED24A57000
|
heap
|
page read and write
|
||
76BC03C9C000
|
trusted library allocation
|
page read and write
|
||
19AC00298000
|
direct allocation
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
696000E44000
|
trusted library allocation
|
page read and write
|
||
324000334000
|
trusted library allocation
|
page read and write
|
||
19EC00894000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC01E74000
|
trusted library allocation
|
page read and write
|
||
7D10003E8000
|
trusted library allocation
|
page read and write
|
||
19EC003DC000
|
trusted library allocation
|
page read and write
|
||
7D100061C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
69600033C000
|
trusted library allocation
|
page read and write
|
||
324000ABC000
|
trusted library allocation
|
page read and write
|
||
3FB4002B8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE6E000
|
heap
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
2754001E0000
|
trusted library allocation
|
page read and write
|
||
76BC03504000
|
trusted library allocation
|
page read and write
|
||
696001C9C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
6960021A4000
|
trusted library allocation
|
page read and write
|
||
69600238C000
|
trusted library allocation
|
page read and write
|
||
76BC03018000
|
trusted library allocation
|
page read and write
|
||
25DE7857000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9EC00240000
|
trusted library allocation
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
3240009D4000
|
trusted library allocation
|
page read and write
|
||
79D800770000
|
trusted library allocation
|
page read and write
|
||
79D80080C000
|
trusted library allocation
|
page read and write
|
||
19EC00BB8000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
1EEAB03C000
|
heap
|
page read and write
|
||
324001D7C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
19EC01204000
|
trusted library allocation
|
page read and write
|
||
33380074C000
|
trusted library allocation
|
page read and write
|
||
79D8003B8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
76BC03510000
|
trusted library allocation
|
page read and write
|
||
3338009E4000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
333800A0C000
|
trusted library allocation
|
page read and write
|
||
76BC03510000
|
trusted library allocation
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
22C8752C000
|
heap
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
69600080C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
7D1001E38000
|
trusted library allocation
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
324001004000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
3148002D8000
|
trusted library allocation
|
page read and write
|
||
3CE000298000
|
direct allocation
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
3338006A0000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
3F3800744000
|
trusted library allocation
|
page read and write
|
||
3338021A8000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1CF6FE3C000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
79D800334000
|
trusted library allocation
|
page read and write
|
||
6960009C6000
|
trusted library allocation
|
page read and write
|
||
696000E38000
|
trusted library allocation
|
page read and write
|
||
3F38007BC000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
25DE7809000
|
heap
|
page read and write
|
||
19EC0107C000
|
trusted library allocation
|
page read and write
|
||
76BC044B0000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
333801404000
|
trusted library allocation
|
page read and write
|
||
76BC04418000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
7C800032C000
|
trusted library allocation
|
page read and write
|
||
32400208D000
|
trusted library allocation
|
page read and write
|
||
562C00408000
|
trusted library allocation
|
page read and write
|
||
494800294000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
6960020CE000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
324000BD4000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801DB4000
|
trusted library allocation
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
22C874C7000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
22C874D1000
|
heap
|
page read and write
|
||
33380203C000
|
trusted library allocation
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3F380072C000
|
trusted library allocation
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
76BC03C90000
|
trusted library allocation
|
page read and write
|
||
3240006AC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE73000
|
heap
|
page read and write
|
||
7D1000634000
|
trusted library allocation
|
page read and write
|
||
19EC00A18000
|
trusted library allocation
|
page read and write
|
||
7D1001F2C000
|
trusted library allocation
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
76BC04034000
|
trusted library allocation
|
page read and write
|
||
19EC01C88000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC01FC8000
|
trusted library allocation
|
page read and write
|
||
696000E4C000
|
trusted library allocation
|
page read and write
|
||
368C00338000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
22C8772E000
|
heap
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
696001E80000
|
trusted library allocation
|
page read and write
|
||
324001204000
|
trusted library allocation
|
page read and write
|
||
19EC014C4000
|
trusted library allocation
|
page read and write
|
||
7D1000284000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
79D800614000
|
trusted library allocation
|
page read and write
|
||
6960008A0000
|
trusted library allocation
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
19EC00694000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
324000BAC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
79D8002CC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE6F000
|
heap
|
page read and write
|
||
333800614000
|
trusted library allocation
|
page read and write
|
||
696001E88000
|
trusted library allocation
|
page read and write
|
||
7D100078C000
|
trusted library allocation
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
273C000
|
heap
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
19EC01DC0000
|
trusted library allocation
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
333801DE4000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
324000614000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
696000A14000
|
trusted library allocation
|
page read and write
|
||
333802046000
|
trusted library allocation
|
page read and write
|
||
7D10002A0000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
3F3800744000
|
trusted library allocation
|
page read and write
|
||
19EC0028C000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
7C8000344000
|
trusted library allocation
|
page read and write
|
||
22C8B70C000
|
heap
|
page read and write
|
||
25DD1A09000
|
heap
|
page read and write
|
||
368C00240000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
76BC03A18000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696000334000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0C000
|
heap
|
page read and write
|
||
3F380066C000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
22C876B9000
|
heap
|
page read and write
|
||
19EC01FE8000
|
trusted library allocation
|
page read and write
|
||
33380078C000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
20F4000
|
heap
|
page read and write
|
||
76BC04C04000
|
trusted library allocation
|
page read and write
|
||
79D80031C000
|
trusted library allocation
|
page read and write
|
||
324001C5C000
|
trusted library allocation
|
page read and write
|
||
22C8753D000
|
heap
|
page read and write
|
||
696000E34000
|
trusted library allocation
|
page read and write
|
||
22C875F5000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC044BC000
|
trusted library allocation
|
page read and write
|
||
324001DC4000
|
trusted library allocation
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
79D8003C4000
|
trusted library allocation
|
page read and write
|
||
696000AE0000
|
trusted library allocation
|
page read and write
|
||
324001EE8000
|
trusted library allocation
|
page read and write
|
||
76BC038E0000
|
trusted library allocation
|
page read and write
|
||
69600100B000
|
trusted library allocation
|
page read and write
|
||
7D10009F0000
|
trusted library allocation
|
page read and write
|
||
22C87900000
|
heap
|
page read and write
|
||
32400202E000
|
trusted library allocation
|
page read and write
|
||
324001F2C000
|
trusted library allocation
|
page read and write
|
||
696001E0C000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
333800A18000
|
trusted library allocation
|
page read and write
|
||
7D1002080000
|
trusted library allocation
|
page read and write
|
||
19EC00B4C000
|
trusted library allocation
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
696000E90000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
324001D9C000
|
trusted library allocation
|
page read and write
|
||
76BC0396C000
|
trusted library allocation
|
page read and write
|
||
2A78002CC000
|
trusted library allocation
|
page read and write
|
||
19EC00724000
|
trusted library allocation
|
page read and write
|
||
333800AC3000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696001F24000
|
trusted library allocation
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
76BC0320C000
|
trusted library allocation
|
page read and write
|
||
19EC0208C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
3338007D8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C87563000
|
heap
|
page read and write
|
||
19EC01CF0000
|
trusted library allocation
|
page read and write
|
||
76BC0480C000
|
trusted library allocation
|
page read and write
|
||
22C875F6000
|
heap
|
page read and write
|
||
7D1001DC8000
|
trusted library allocation
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
696000E3C000
|
trusted library allocation
|
page read and write
|
||
3338003D0000
|
trusted library allocation
|
page read and write
|
||
324000894000
|
trusted library allocation
|
page read and write
|
||
696000E64000
|
trusted library allocation
|
page read and write
|
||
324001ED0000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801D1C000
|
trusted library allocation
|
page read and write
|
||
696002036000
|
trusted library allocation
|
page read and write
|
||
76BC039E0000
|
trusted library allocation
|
page read and write
|
||
3F3801004000
|
trusted library allocation
|
page read and write
|
||
1ED24A09000
|
heap
|
page read and write
|
||
79D800284000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696000638000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
696000890000
|
trusted library allocation
|
page read and write
|
||
19EC0033C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
3A3C00298000
|
direct allocation
|
page read and write
|
||
696000724000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
3338003D0000
|
trusted library allocation
|
page read and write
|
||
6960022B4000
|
trusted library allocation
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
3338007A4000
|
trusted library allocation
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
696001EB8000
|
trusted library allocation
|
page read and write
|
||
19EC01F30000
|
trusted library allocation
|
page read and write
|
||
333800A4C000
|
trusted library allocation
|
page read and write
|
||
333802098000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
76BC03908000
|
trusted library allocation
|
page read and write
|
||
19EC00BE8000
|
trusted library allocation
|
page read and write
|
||
3F38007DC000
|
trusted library allocation
|
page read and write
|
||
19EC00B3C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
79D800AB4000
|
trusted library allocation
|
page read and write
|
||
12F4002BC000
|
trusted library allocation
|
page read and write
|
||
19EC00B5F000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
7D1000730000
|
trusted library allocation
|
page read and write
|
||
333801E74000
|
trusted library allocation
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
279649B4000
|
heap
|
page read and write
|
||
19EC01D20000
|
trusted library allocation
|
page read and write
|
||
19EC01D80000
|
trusted library allocation
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
76BC03D84000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801D6C000
|
trusted library allocation
|
page read and write
|
||
333800B88000
|
trusted library allocation
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
25DE782B000
|
heap
|
page read and write
|
||
1CF6FE3C000
|
heap
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
7D1000730000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
6960009E4000
|
trusted library allocation
|
page read and write
|
||
76BC0405C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC00B44000
|
trusted library allocation
|
page read and write
|
||
7D1001D28000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
2C18002CC000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
3F38002A4000
|
trusted library allocation
|
page read and write
|
||
22C8B7FE000
|
heap
|
page read and write
|
||
1ED24A6D000
|
heap
|
page read and write
|
||
324000284000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
19EC0080C000
|
trusted library allocation
|
page read and write
|
||
76BC03D84000
|
trusted library allocation
|
page read and write
|
||
1E34002D4000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801FD8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
696002036000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
358800294000
|
trusted library allocation
|
page read and write
|
||
1EEAB079000
|
heap
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
19EC0101C000
|
trusted library allocation
|
page read and write
|
||
19EC01DC0000
|
trusted library allocation
|
page read and write
|
||
6960002DC000
|
trusted library allocation
|
page read and write
|
||
324000674000
|
trusted library allocation
|
page read and write
|
||
3240002DC000
|
trusted library allocation
|
page read and write
|
||
69600205C000
|
trusted library allocation
|
page read and write
|
||
562C00240000
|
trusted library allocation
|
page read and write
|
||
324001C6C000
|
trusted library allocation
|
page read and write
|
||
19EC02E04000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801DC4000
|
trusted library allocation
|
page read and write
|
||
76BC02CB8000
|
trusted library allocation
|
page read and write
|
||
3338002DC000
|
trusted library allocation
|
page read and write
|
||
333802095000
|
trusted library allocation
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
19EC01D70000
|
trusted library allocation
|
page read and write
|
||
79D800334000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
19EC0103C000
|
trusted library allocation
|
page read and write
|
||
324001CF4000
|
trusted library allocation
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
7D1000334000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
76BC0300C000
|
trusted library allocation
|
page read and write
|
||
19EC01F78000
|
trusted library allocation
|
page read and write
|
||
19EC00A38000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
3FB4002B8000
|
trusted library allocation
|
page read and write
|
||
696001E44000
|
trusted library allocation
|
page read and write
|
||
19EC01DD8000
|
trusted library allocation
|
page read and write
|
||
1ED24A09000
|
heap
|
page read and write
|
||
3148002BC000
|
trusted library allocation
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
333801C24000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
333801D24000
|
trusted library allocation
|
page read and write
|
||
33380204C000
|
trusted library allocation
|
page read and write
|
||
324001F5C000
|
trusted library allocation
|
page read and write
|
||
333801D2C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7D1001D18000
|
trusted library allocation
|
page read and write
|
||
696003204000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
333800788000
|
trusted library allocation
|
page read and write
|
||
696000B64000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
333801C2C000
|
trusted library allocation
|
page read and write
|
||
79D80033C000
|
trusted library allocation
|
page read and write
|
||
696003004000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
696000AEA000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
135FD8A0000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C87726000
|
heap
|
page read and write
|
||
7D100061C000
|
trusted library allocation
|
page read and write
|
||
324000620000
|
trusted library allocation
|
page read and write
|
||
76BC031B8000
|
trusted library allocation
|
page read and write
|
||
696000B60000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
696001DB4000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
696001D74000
|
trusted library allocation
|
page read and write
|
||
333800674000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
324001CD4000
|
trusted library allocation
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
3338007F0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1CF6FE62000
|
heap
|
page read and write
|
||
7D1000AC8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
7D1000788000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
76BC03C04000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
1ED24A09000
|
heap
|
page read and write
|
||
324001DCC000
|
trusted library allocation
|
page read and write
|
||
696001EF0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
7D1000ABC000
|
trusted library allocation
|
page read and write
|
||
79D800334000
|
trusted library allocation
|
page read and write
|
||
324001C64000
|
trusted library allocation
|
page read and write
|
||
7D10006A0000
|
trusted library allocation
|
page read and write
|
||
19EC00B78000
|
trusted library allocation
|
page read and write
|
||
19EC01CC0000
|
trusted library allocation
|
page read and write
|
||
76BC027B8000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
19EC01D58000
|
trusted library allocation
|
page read and write
|
||
19EC0200C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
324001D4C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
32400204C000
|
trusted library allocation
|
page read and write
|
||
333800834000
|
trusted library allocation
|
page read and write
|
||
696000E94000
|
trusted library allocation
|
page read and write
|
||
19EC009D4000
|
trusted library allocation
|
page read and write
|
||
3588002B8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
32400201C000
|
trusted library allocation
|
page read and write
|
||
76BC039D4000
|
trusted library allocation
|
page read and write
|
||
4B08002A8000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
333800718000
|
trusted library allocation
|
page read and write
|
||
7D1001FF4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C87538000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
6960006AC000
|
trusted library allocation
|
page read and write
|
||
333800284000
|
trusted library allocation
|
page read and write
|
||
76BC0366C000
|
trusted library allocation
|
page read and write
|
||
696001E2C000
|
trusted library allocation
|
page read and write
|
||
3F3800744000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001C0C000
|
trusted library allocation
|
page read and write
|
||
22C874D7000
|
heap
|
page read and write
|
||
62400320000
|
direct allocation
|
page read and write
|
||
76BC03FE4000
|
trusted library allocation
|
page read and write
|
||
324001FEC000
|
trusted library allocation
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
76BC031C4000
|
trusted library allocation
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
19EC01060000
|
trusted library allocation
|
page read and write
|
||
2754001B8000
|
trusted library allocation
|
page read and write
|
||
7D10003C4000
|
trusted library allocation
|
page read and write
|
||
333800694000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
19EC01D28000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
1CF6FE66000
|
heap
|
page read and write
|
||
7D1001CC4000
|
trusted library allocation
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
324001D24000
|
trusted library allocation
|
page read and write
|
||
3338009EC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC00B61000
|
trusted library allocation
|
page read and write
|
||
32400028C000
|
trusted library allocation
|
page read and write
|
||
19EC00624000
|
trusted library allocation
|
page read and write
|
||
22C87563000
|
heap
|
page read and write
|
||
324001D74000
|
trusted library allocation
|
page read and write
|
||
19EC009D4000
|
trusted library allocation
|
page read and write
|
||
7D1002036000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC01D08000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
19EC00C04000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
19AC00244000
|
direct allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC03088000
|
trusted library allocation
|
page read and write
|
||
76BC03924000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
624002EC000
|
direct allocation
|
page read and write
|
||
696000BA0000
|
trusted library allocation
|
page read and write
|
||
135FD928000
|
heap
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
696000E68000
|
trusted library allocation
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
324000A18000
|
trusted library allocation
|
page read and write
|
||
22C87606000
|
heap
|
page read and write
|
||
333800634000
|
trusted library allocation
|
page read and write
|
||
6960009E4000
|
trusted library allocation
|
page read and write
|
||
22C8752C000
|
heap
|
page read and write
|
||
13583402000
|
heap
|
page read and write
|
||
333801D94000
|
trusted library allocation
|
page read and write
|
||
19EC00B5F000
|
trusted library allocation
|
page read and write
|
||
333800AB0000
|
trusted library allocation
|
page read and write
|
||
135FD929000
|
heap
|
page read and write
|
||
3F3800C04000
|
trusted library allocation
|
page read and write
|
||
333801C14000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
3CE000244000
|
direct allocation
|
page read and write
|
||
696000AE2000
|
trusted library allocation
|
page read and write
|
||
76BC03930000
|
trusted library allocation
|
page read and write
|
||
696000AEC000
|
trusted library allocation
|
page read and write
|
||
3338009E4000
|
trusted library allocation
|
page read and write
|
||
76BC03970000
|
trusted library allocation
|
page read and write
|
||
19EC01C58000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
333800B98000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
22C87601000
|
heap
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
22C8774E000
|
heap
|
page read and write
|
||
79D80074C000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
22C876F7000
|
heap
|
page read and write
|
||
6960009EC000
|
trusted library allocation
|
page read and write
|
||
7D1001D78000
|
trusted library allocation
|
page read and write
|
||
1CF6FE57000
|
heap
|
page read and write
|
||
696000694000
|
trusted library allocation
|
page read and write
|
||
696000ABC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
2480000C000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
1EEAB077000
|
heap
|
page read and write
|
||
2B900040000
|
trusted library allocation
|
page read and write
|
||
1ED24A79000
|
heap
|
page read and write
|
||
19EC008A4000
|
trusted library allocation
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
2FC5000
|
heap
|
page read and write
|
||
1CF6FE0F000
|
heap
|
page read and write
|
||
22C8760F000
|
heap
|
page read and write
|
||
333802098000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
19EC01FB8000
|
trusted library allocation
|
page read and write
|
||
22C87854000
|
heap
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
696000E80000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
19EC00614000
|
trusted library allocation
|
page read and write
|
||
324001F34000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
7D100204C000
|
trusted library allocation
|
page read and write
|
||
22C87559000
|
heap
|
page read and write
|
||
7D100031C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
76BC03924000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
76BC03504000
|
trusted library allocation
|
page read and write
|
||
324001EF0000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
5FC000134000
|
trusted library allocation
|
page read and write
|
||
3240002A0000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
3240002A0000
|
trusted library allocation
|
page read and write
|
||
696002324000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
7D1001DC0000
|
trusted library allocation
|
page read and write
|
||
7C8000344000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
19EC00AC6000
|
trusted library allocation
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1CF6FE0A000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC01D48000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
79D800674000
|
trusted library allocation
|
page read and write
|
||
333801D3C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE70000
|
heap
|
page read and write
|
||
7D1000334000
|
trusted library allocation
|
page read and write
|
||
324001E0C000
|
trusted library allocation
|
page read and write
|
||
368C0032C000
|
trusted library allocation
|
page read and write
|
||
1ED24A79000
|
heap
|
page read and write
|
||
22C877CE000
|
heap
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
19EC02014000
|
trusted library allocation
|
page read and write
|
||
19EC01048000
|
trusted library allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
19EC0061C000
|
trusted library allocation
|
page read and write
|
||
696000A40000
|
trusted library allocation
|
page read and write
|
||
76BC02224000
|
trusted library allocation
|
page read and write
|
||
7D1001FE4000
|
trusted library allocation
|
page read and write
|
||
7D1001F1C000
|
trusted library allocation
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
696000614000
|
trusted library allocation
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
696001D7C000
|
trusted library allocation
|
page read and write
|
||
447C002A0000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
324001DAC000
|
trusted library allocation
|
page read and write
|
||
333800BA8000
|
trusted library allocation
|
page read and write
|
||
333801DF4000
|
trusted library allocation
|
page read and write
|
||
19EC00334000
|
trusted library allocation
|
page read and write
|
||
12F4002C8000
|
trusted library allocation
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
19EC01CF8000
|
trusted library allocation
|
page read and write
|
||
1ED24A66000
|
heap
|
page read and write
|
||
7FF7C9F41000
|
unkown
|
page readonly
|
||
135FD92F000
|
heap
|
page read and write
|
||
3240009F0000
|
trusted library allocation
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
19EC01EC4000
|
trusted library allocation
|
page read and write
|
||
76BC03E04000
|
trusted library allocation
|
page read and write
|
||
324001F1C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696000E50000
|
trusted library allocation
|
page read and write
|
||
19EC01FD8000
|
trusted library allocation
|
page read and write
|
||
696001DD4000
|
trusted library allocation
|
page read and write
|
||
333802180000
|
trusted library allocation
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
19EC02084000
|
trusted library allocation
|
page read and write
|
||
19EC01030000
|
trusted library allocation
|
page read and write
|
||
3338009ED000
|
trusted library allocation
|
page read and write
|
||
76BC02754000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
3F3801A04000
|
trusted library allocation
|
page read and write
|
||
76BC039EC000
|
trusted library allocation
|
page read and write
|
||
19EC00894000
|
trusted library allocation
|
page read and write
|
||
1ED24A0E000
|
heap
|
page read and write
|
||
19EC003B8000
|
trusted library allocation
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
7D1002026000
|
trusted library allocation
|
page read and write
|
||
333800A38000
|
trusted library allocation
|
page read and write
|
||
333802024000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
333801D44000
|
trusted library allocation
|
page read and write
|
||
333801EFC000
|
trusted library allocation
|
page read and write
|
||
19EC003B8000
|
trusted library allocation
|
page read and write
|
||
333800348000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1ED24A76000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
324001D54000
|
trusted library allocation
|
page read and write
|
||
333801F04000
|
trusted library allocation
|
page read and write
|
||
696001D9C000
|
trusted library allocation
|
page read and write
|
||
333801D5C000
|
trusted library allocation
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
76BC035E5000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
2A78002CC000
|
trusted library allocation
|
page read and write
|
||
696001F6C000
|
trusted library allocation
|
page read and write
|
||
562C0032C000
|
trusted library allocation
|
page read and write
|
||
324000BB4000
|
trusted library allocation
|
page read and write
|
||
324001F00000
|
trusted library allocation
|
page read and write
|
||
32400080C000
|
trusted library allocation
|
page read and write
|
||
19EC02018000
|
trusted library allocation
|
page read and write
|
||
76BC0360C000
|
trusted library allocation
|
page read and write
|
||
135FD929000
|
heap
|
page read and write
|
||
19EC00E0B000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
heap
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
1EEAB03C000
|
heap
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
7D1000AA4000
|
trusted library allocation
|
page read and write
|
||
3240003DC000
|
trusted library allocation
|
page read and write
|
||
7930002B8000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
5FC000114000
|
trusted library allocation
|
page read and write
|
||
1CF6FE62000
|
heap
|
page read and write
|
||
333801C3C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
333801F50000
|
trusted library allocation
|
page read and write
|
||
696000A2C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
22C876F7000
|
heap
|
page read and write
|
||
3FB4002A8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
4B0800294000
|
trusted library allocation
|
page read and write
|
||
324001E70000
|
trusted library allocation
|
page read and write
|
||
1E34002D4000
|
trusted library allocation
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
494800294000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
7D100061C000
|
trusted library allocation
|
page read and write
|
||
22C878FB000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
22C87854000
|
heap
|
page read and write
|
||
333800BA0000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
324001C84000
|
trusted library allocation
|
page read and write
|
||
33380033C000
|
trusted library allocation
|
page read and write
|
||
76BC04E04000
|
trusted library allocation
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
7D10003B8000
|
trusted library allocation
|
page read and write
|
||
135FD96C000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
76BC04004000
|
trusted library allocation
|
page read and write
|
||
19EC02048000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
3FB400294000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801C9C000
|
trusted library allocation
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
333801F20000
|
trusted library allocation
|
page read and write
|
||
3FB400294000
|
trusted library allocation
|
page read and write
|
||
7D1000894000
|
trusted library allocation
|
page read and write
|
||
19EC00B5F000
|
trusted library allocation
|
page read and write
|
||
1ED24A3C000
|
heap
|
page read and write
|
||
3F380060C000
|
trusted library allocation
|
page read and write
|
||
76BC03C04000
|
trusted library allocation
|
page read and write
|
||
333800B5F000
|
trusted library allocation
|
page read and write
|
||
33380080C000
|
trusted library allocation
|
page read and write
|
||
19EC00674000
|
trusted library allocation
|
page read and write
|
||
333800A6C000
|
trusted library allocation
|
page read and write
|
||
19EC00684000
|
trusted library allocation
|
page read and write
|
||
2C1800294000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
696000EA0000
|
trusted library allocation
|
page read and write
|
||
333801EE4000
|
trusted library allocation
|
page read and write
|
||
19EC00A24000
|
trusted library allocation
|
page read and write
|
||
19EC01C14000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
324000A0C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333800A98000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
1ED24A08000
|
heap
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
19EC01D90000
|
trusted library allocation
|
page read and write
|
||
3588002A4000
|
trusted library allocation
|
page read and write
|
||
324001D5C000
|
trusted library allocation
|
page read and write
|
||
22C8761E000
|
heap
|
page read and write
|
||
696000E60000
|
trusted library allocation
|
page read and write
|
||
19EC0104C000
|
trusted library allocation
|
page read and write
|
||
7D1000730000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
19EC007F0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
32400202E000
|
trusted library allocation
|
page read and write
|
||
33380060C000
|
trusted library allocation
|
page read and write
|
||
333800B4C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
696002024000
|
trusted library allocation
|
page read and write
|
||
22C875F7000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
19EC00730000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
135FD980000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
3F3800364000
|
trusted library allocation
|
page read and write
|
||
1CF6FE6E000
|
heap
|
page read and write
|
||
1E34002BC000
|
trusted library allocation
|
page read and write
|
||
324000AB0000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
696002C0B000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
6960002DC000
|
trusted library allocation
|
page read and write
|
||
1ED24A81000
|
heap
|
page read and write
|
||
696001C34000
|
trusted library allocation
|
page read and write
|
||
3F38007D8000
|
trusted library allocation
|
page read and write
|
||
79D800788000
|
trusted library allocation
|
page read and write
|
||
76BC03554000
|
trusted library allocation
|
page read and write
|
||
19EC01C24000
|
trusted library allocation
|
page read and write
|
||
696001470000
|
trusted library allocation
|
page read and write
|
||
333801F78000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
33380074C000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
22C874D7000
|
heap
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801FF0000
|
trusted library allocation
|
page read and write
|
||
79D80060C000
|
trusted library allocation
|
page read and write
|
||
76BC0320C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC00BB0000
|
trusted library allocation
|
page read and write
|
||
69600031C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333800BB0000
|
trusted library allocation
|
page read and write
|
||
19EC01D30000
|
trusted library allocation
|
page read and write
|
||
2A78002CC000
|
trusted library allocation
|
page read and write
|
||
324001F7C000
|
trusted library allocation
|
page read and write
|
||
7D1001FE4000
|
trusted library allocation
|
page read and write
|
||
25DE782B000
|
heap
|
page read and write
|
||
32400074C000
|
trusted library allocation
|
page read and write
|
||
7D1000ABC000
|
trusted library allocation
|
page read and write
|
||
324000A98000
|
trusted library allocation
|
page read and write
|
||
1CF6FE7F000
|
heap
|
page read and write
|
||
1EEAB057000
|
heap
|
page read and write
|
||
447C0028C000
|
trusted library allocation
|
page read and write
|
||
19EC02090000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
79D8003DC000
|
trusted library allocation
|
page read and write
|
||
7D10003D0000
|
trusted library allocation
|
page read and write
|
||
1ED24A0A000
|
heap
|
page read and write
|
||
7D1000718000
|
trusted library allocation
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
6960007A4000
|
trusted library allocation
|
page read and write
|
||
19EC01DB8000
|
trusted library allocation
|
page read and write
|
||
79D800718000
|
trusted library allocation
|
page read and write
|
||
19EC009DD000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333800B5F000
|
trusted library allocation
|
page read and write
|
||
33380077C000
|
trusted library allocation
|
page read and write
|
||
7930002B8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
76BC0351C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
33380028C000
|
trusted library allocation
|
page read and write
|
||
19EC01EA4000
|
trusted library allocation
|
page read and write
|
||
333801D7C000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
19EC01DE8000
|
trusted library allocation
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
324000A40000
|
trusted library allocation
|
page read and write
|
||
333801D4C000
|
trusted library allocation
|
page read and write
|
||
696001ED0000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
79D800730000
|
trusted library allocation
|
page read and write
|
||
696000B87000
|
trusted library allocation
|
page read and write
|
||
6960003C4000
|
trusted library allocation
|
page read and write
|
||
696002114000
|
trusted library allocation
|
page read and write
|
||
333801E7C000
|
trusted library allocation
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
3F3801604000
|
trusted library allocation
|
page read and write
|
||
3240006A0000
|
trusted library allocation
|
page read and write
|
||
19EC007D8000
|
trusted library allocation
|
page read and write
|
||
76BC03C9C000
|
trusted library allocation
|
page read and write
|
||
696000B7C000
|
trusted library allocation
|
page read and write
|
||
19EC01090000
|
trusted library allocation
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
333800AC8000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
333800AD4000
|
trusted library allocation
|
page read and write
|
||
324001D0C000
|
trusted library allocation
|
page read and write
|
||
3F3800408000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
5FC000281000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1CF6FE6E000
|
heap
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
19EC0148C000
|
trusted library allocation
|
page read and write
|
||
3F38003A8000
|
trusted library allocation
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
5FC000290000
|
trusted library allocation
|
page read and write
|
||
76BC02AC1000
|
trusted library allocation
|
page read and write
|
||
19EC0060C000
|
trusted library allocation
|
page read and write
|
||
333801EAC000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
79D8003AC000
|
trusted library allocation
|
page read and write
|
||
324001FEC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
19EC01004000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
19EC01C34000
|
trusted library allocation
|
page read and write
|
||
279649AC000
|
heap
|
page read and write
|
||
696000E74000
|
trusted library allocation
|
page read and write
|
||
13583502000
|
heap
|
page read and write
|
||
6960006AC000
|
trusted library allocation
|
page read and write
|
||
19EC00BE0000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
1ED24A6F000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
1ED24A0A000
|
heap
|
page read and write
|
||
324001E54000
|
trusted library allocation
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
3338006AC000
|
trusted library allocation
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
3FB4002CC000
|
trusted library allocation
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
7C8000408000
|
trusted library allocation
|
page read and write
|
||
333801004000
|
trusted library allocation
|
page read and write
|
||
22C85C42000
|
heap
|
page read and write
|
||
324001D6C000
|
trusted library allocation
|
page read and write
|
||
696001D24000
|
trusted library allocation
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
22C87717000
|
heap
|
page read and write
|
||
69600204C000
|
trusted library allocation
|
page read and write
|
||
7D1001D30000
|
trusted library allocation
|
page read and write
|
||
19EC002A0000
|
trusted library allocation
|
page read and write
|
||
32400060C000
|
trusted library allocation
|
page read and write
|
||
1ED24A3C000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
6960007F0000
|
trusted library allocation
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
696000730000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
324000684000
|
trusted library allocation
|
page read and write
|
||
324001CE4000
|
trusted library allocation
|
page read and write
|
||
76BC03C84000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC02A0B000
|
trusted library allocation
|
page read and write
|
||
696001FF4000
|
trusted library allocation
|
page read and write
|
||
19EC02050000
|
trusted library allocation
|
page read and write
|
||
324001E80000
|
trusted library allocation
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
32400060C000
|
trusted library allocation
|
page read and write
|
||
696002324000
|
trusted library allocation
|
page read and write
|
||
696001C54000
|
trusted library allocation
|
page read and write
|
||
19EC01D30000
|
trusted library allocation
|
page read and write
|
||
19EC01C1C000
|
trusted library allocation
|
page read and write
|
||
2C18002A8000
|
trusted library allocation
|
page read and write
|
||
696001E1C000
|
trusted library allocation
|
page read and write
|
||
19EC01CE0000
|
trusted library allocation
|
page read and write
|
||
79D8002CC000
|
trusted library allocation
|
page read and write
|
||
696001D54000
|
trusted library allocation
|
page read and write
|
||
696001EC0000
|
trusted library allocation
|
page read and write
|
||
6960002A0000
|
trusted library allocation
|
page read and write
|
||
696000B89000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
33380201C000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001E2C000
|
trusted library allocation
|
page read and write
|
||
333800AFC000
|
trusted library allocation
|
page read and write
|
||
19EC01DE8000
|
trusted library allocation
|
page read and write
|
||
76BC04134000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
1ED24A3C000
|
heap
|
page read and write
|
||
6240032F000
|
direct allocation
|
page read and write
|
||
19EC01D78000
|
trusted library allocation
|
page read and write
|
||
33380205C000
|
trusted library allocation
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
1CF6FE78000
|
heap
|
page read and write
|
||
25DE7866000
|
heap
|
page read and write
|
||
324001DDC000
|
trusted library allocation
|
page read and write
|
||
76BC03088000
|
trusted library allocation
|
page read and write
|
||
76BC031D0000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001DC4000
|
trusted library allocation
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
1EEAB074000
|
heap
|
page read and write
|
||
19EC01DA8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
7D100204C000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
79D800AC0000
|
trusted library allocation
|
page read and write
|
||
447C0028C000
|
trusted library allocation
|
page read and write
|
||
696001D0C000
|
trusted library allocation
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
324001CDC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
324001CB4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
79D800894000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
19EC00770000
|
trusted library allocation
|
page read and write
|
||
76BC03924000
|
trusted library allocation
|
page read and write
|
||
333800614000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
324000818000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
19EC01058000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
5FC000160000
|
trusted library allocation
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
19EC01D70000
|
trusted library allocation
|
page read and write
|
||
2A78002B8000
|
trusted library allocation
|
page read and write
|
||
3600000C000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1EEAB03C000
|
heap
|
page read and write
|
||
3588002A4000
|
trusted library allocation
|
page read and write
|
||
19EC01DA0000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333800BF0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
3338003A8000
|
trusted library allocation
|
page read and write
|
||
22C87894000
|
heap
|
page read and write
|
||
2C18002B8000
|
trusted library allocation
|
page read and write
|
||
324001C14000
|
trusted library allocation
|
page read and write
|
||
696001D1C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
333800BB8000
|
trusted library allocation
|
page read and write
|
||
324001F3C000
|
trusted library allocation
|
page read and write
|
||
2B00B62B000
|
heap
|
page read and write
|
||
9EC00338000
|
trusted library allocation
|
page read and write
|
||
76BC0367C000
|
trusted library allocation
|
page read and write
|
||
333800408000
|
trusted library allocation
|
page read and write
|
||
324000334000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
333800818000
|
trusted library allocation
|
page read and write
|
||
1ED24A6B000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC0106C000
|
trusted library allocation
|
page read and write
|
||
3FB400294000
|
trusted library allocation
|
page read and write
|
||
696000BB8000
|
trusted library allocation
|
page read and write
|
||
29B6000
|
heap
|
page read and write
|
||
2A7800294000
|
trusted library allocation
|
page read and write
|
||
696000834000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1ED24A74000
|
heap
|
page read and write
|
||
19EC00BF0000
|
trusted library allocation
|
page read and write
|
||
79D80061C000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC00E04000
|
trusted library allocation
|
page read and write
|
||
7D100204C000
|
trusted library allocation
|
page read and write
|
||
1E34002D4000
|
trusted library allocation
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
32400203E000
|
trusted library allocation
|
page read and write
|
||
24500040000
|
trusted library allocation
|
page read and write
|
||
19EC00818000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
696002C04000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
19EC021D0000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
1EEAB06D000
|
heap
|
page read and write
|
||
696002018000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
3240002CC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
333800624000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
25DD1A62000
|
heap
|
page read and write
|
||
135FD974000
|
heap
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
22C8782C000
|
heap
|
page read and write
|
||
696001C14000
|
trusted library allocation
|
page read and write
|
||
3240002CC000
|
trusted library allocation
|
page read and write
|
||
324001DB4000
|
trusted library allocation
|
page read and write
|
||
2A7800294000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
3240003C4000
|
trusted library allocation
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
333800B5F000
|
trusted library allocation
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
19EC00BC0000
|
trusted library allocation
|
page read and write
|
||
76BC03C9C000
|
trusted library allocation
|
page read and write
|
||
7D100202C000
|
trusted library allocation
|
page read and write
|
||
19EC01D40000
|
trusted library allocation
|
page read and write
|
||
19EC02E0B000
|
trusted library allocation
|
page read and write
|
||
19EC00B14000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
696000788000
|
trusted library allocation
|
page read and write
|
||
7C8000320000
|
trusted library allocation
|
page read and write
|
||
324001F74000
|
trusted library allocation
|
page read and write
|
||
333800B28000
|
trusted library allocation
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
333801F68000
|
trusted library allocation
|
page read and write
|
||
19EC009E8000
|
trusted library allocation
|
page read and write
|
||
19EC00284000
|
trusted library allocation
|
page read and write
|
||
76BC02FD8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
696000C04000
|
trusted library allocation
|
page read and write
|
||
696002054000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
19EC0077C000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
3F3800C04000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
32400203E000
|
trusted library allocation
|
page read and write
|
||
333801D5C000
|
trusted library allocation
|
page read and write
|
||
7D1000894000
|
trusted library allocation
|
page read and write
|
||
333800770000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
22C874DD000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
1EEAB06A000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
62400318000
|
direct allocation
|
page read and write
|
||
19EC01EDC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
19EC0202A000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
333801E44000
|
trusted library allocation
|
page read and write
|
||
4B0800294000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
6960003D0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
3F38003A8000
|
trusted library allocation
|
page read and write
|
||
19EC0213C000
|
trusted library allocation
|
page read and write
|
||
22C8B5EE000
|
heap
|
page read and write
|
||
22C877CE000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
696000BD8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C8763D000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696000EA8000
|
trusted library allocation
|
page read and write
|
||
19EC02050000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C8B5E2000
|
heap
|
page read and write
|
||
324001D6C000
|
trusted library allocation
|
page read and write
|
||
76BC0366C000
|
trusted library allocation
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
696000E70000
|
trusted library allocation
|
page read and write
|
||
19EC01ED4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
7D10009E0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
314800240000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
324001EF8000
|
trusted library allocation
|
page read and write
|
||
1358351F000
|
heap
|
page read and write
|
||
1ED24A78000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333802036000
|
trusted library allocation
|
page read and write
|
||
7C800040C000
|
trusted library allocation
|
page read and write
|
||
7D1001CCC000
|
trusted library allocation
|
page read and write
|
||
333800624000
|
trusted library allocation
|
page read and write
|
||
324001EB8000
|
trusted library allocation
|
page read and write
|
||
3618002B4000
|
direct allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
76BC0448C000
|
trusted library allocation
|
page read and write
|
||
3F3801004000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
19EC01F58000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
79D800730000
|
trusted library allocation
|
page read and write
|
||
69600219C000
|
trusted library allocation
|
page read and write
|
||
135FF702000
|
heap
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
324001DDC000
|
trusted library allocation
|
page read and write
|
||
3338002CC000
|
trusted library allocation
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
696001C74000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
76BC03030000
|
trusted library allocation
|
page read and write
|
||
2754001A4000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
333801C7C000
|
trusted library allocation
|
page read and write
|
||
696000B48000
|
trusted library allocation
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
19EC00ABE000
|
trusted library allocation
|
page read and write
|
||
19EC0074C000
|
trusted library allocation
|
page read and write
|
||
22C87627000
|
heap
|
page read and write
|
||
1CF6FE85000
|
heap
|
page read and write
|
||
76BC02754000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
696001C64000
|
trusted library allocation
|
page read and write
|
||
135FD94E000
|
heap
|
page read and write
|
||
324001DBC000
|
trusted library allocation
|
page read and write
|
||
696001DC4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
7D10002D4000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
135FD8E3000
|
heap
|
page read and write
|
||
76BC0402C000
|
trusted library allocation
|
page read and write
|
||
79D800AD8000
|
trusted library allocation
|
page read and write
|
||
324001DAC000
|
trusted library allocation
|
page read and write
|
||
135FD950000
|
heap
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
69600078C000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
4B08002CC000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
1ED24A7A000
|
heap
|
page read and write
|
||
3F3801604000
|
trusted library allocation
|
page read and write
|
||
76BC04404000
|
trusted library allocation
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
324000724000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
696001CA4000
|
trusted library allocation
|
page read and write
|
||
696001EB0000
|
trusted library allocation
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE5C000
|
heap
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
7D10009D8000
|
trusted library allocation
|
page read and write
|
||
19EC02100000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
447C002C8000
|
trusted library allocation
|
page read and write
|
||
333801C34000
|
trusted library allocation
|
page read and write
|
||
3F380060C000
|
trusted library allocation
|
page read and write
|
||
3588002A4000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1CF6FE66000
|
heap
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
69600205C000
|
trusted library allocation
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
324001D34000
|
trusted library allocation
|
page read and write
|
||
22C87536000
|
heap
|
page read and write
|
||
333800B61000
|
trusted library allocation
|
page read and write
|
||
324002054000
|
trusted library allocation
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
696002404000
|
trusted library allocation
|
page read and write
|
||
696001F00000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC009DC000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
1CF6FE08000
|
heap
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
19EC00BC8000
|
trusted library allocation
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
324001FDC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
76BC04404000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
22C8B5EF000
|
heap
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333801D9C000
|
trusted library allocation
|
page read and write
|
||
324001C44000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC01DD8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
79D800770000
|
trusted library allocation
|
page read and write
|
||
333801C6C000
|
trusted library allocation
|
page read and write
|
||
3F3801004000
|
trusted library allocation
|
page read and write
|
||
33380040C000
|
trusted library allocation
|
page read and write
|
||
39D00040000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
333801D54000
|
trusted library allocation
|
page read and write
|
||
19EC01EB4000
|
trusted library allocation
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC031B8000
|
trusted library allocation
|
page read and write
|
||
324000AD4000
|
trusted library allocation
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
19EC01C60000
|
trusted library allocation
|
page read and write
|
||
19EC00730000
|
trusted library allocation
|
page read and write
|
||
1EEAB008000
|
heap
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
324000718000
|
trusted library allocation
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
333801DAC000
|
trusted library allocation
|
page read and write
|
||
696001DCC000
|
trusted library allocation
|
page read and write
|
||
333801C4C000
|
trusted library allocation
|
page read and write
|
||
1E3400240000
|
trusted library allocation
|
page read and write
|
||
22C87726000
|
heap
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
7D10002DC000
|
trusted library allocation
|
page read and write
|
||
324000BBC000
|
trusted library allocation
|
page read and write
|
||
696001DEC000
|
trusted library allocation
|
page read and write
|
||
7D1000624000
|
trusted library allocation
|
page read and write
|
||
696001D6C000
|
trusted library allocation
|
page read and write
|
||
333801DDC000
|
trusted library allocation
|
page read and write
|
||
3FB400294000
|
trusted library allocation
|
page read and write
|
||
22C875A9000
|
heap
|
page read and write
|
||
19EC02A04000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
696000B34000
|
trusted library allocation
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
696000B1C000
|
trusted library allocation
|
page read and write
|
||
696001EC8000
|
trusted library allocation
|
page read and write
|
||
19EC01568000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
3338007C0000
|
trusted library allocation
|
page read and write
|
||
19EC01D50000
|
trusted library allocation
|
page read and write
|
||
1358351F000
|
heap
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
19EC006A0000
|
trusted library allocation
|
page read and write
|
||
22C85C5F000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
447C002C8000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
562C00298000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696001FF4000
|
trusted library allocation
|
page read and write
|
||
135FF708000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
4C18002D4000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
333801CE4000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
696001004000
|
trusted library allocation
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
2A78002B8000
|
trusted library allocation
|
page read and write
|
||
7D1001CE0000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
19EC01068000
|
trusted library allocation
|
page read and write
|
||
76BC03694000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
324001C34000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
2B00B62B000
|
heap
|
page read and write
|
||
76BC030EC000
|
trusted library allocation
|
page read and write
|
||
7D1000620000
|
trusted library allocation
|
page read and write
|
||
3338009EC000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
333800B38000
|
trusted library allocation
|
page read and write
|
||
19EC01DD0000
|
trusted library allocation
|
page read and write
|
||
76BC03D4C000
|
trusted library allocation
|
page read and write
|
||
324001C54000
|
trusted library allocation
|
page read and write
|
||
25DD1A2B000
|
heap
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
69600061C000
|
trusted library allocation
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
19EC00A38000
|
trusted library allocation
|
page read and write
|
||
22C875E9000
|
heap
|
page read and write
|
||
333800B3C000
|
trusted library allocation
|
page read and write
|
||
1ED24A6A000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
368C0030C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE6E000
|
heap
|
page read and write
|
||
22C8752C000
|
heap
|
page read and write
|
||
19EC01CE8000
|
trusted library allocation
|
page read and write
|
||
79D800A38000
|
trusted library allocation
|
page read and write
|
||
4C18002E4000
|
trusted library allocation
|
page read and write
|
||
324001EB0000
|
trusted library allocation
|
page read and write
|
||
333801F60000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333801CFC000
|
trusted library allocation
|
page read and write
|
||
7D1000ACB000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
2B00B441000
|
heap
|
page read and write
|
||
2A78002A8000
|
trusted library allocation
|
page read and write
|
||
333801D44000
|
trusted library allocation
|
page read and write
|
||
696000654000
|
trusted library allocation
|
page read and write
|
||
19EC01568000
|
trusted library allocation
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
79D80077C000
|
trusted library allocation
|
page read and write
|
||
19EC01DF0000
|
trusted library allocation
|
page read and write
|
||
7D100077C000
|
trusted library allocation
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
3FB4002C4000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
19EC00A98000
|
trusted library allocation
|
page read and write
|
||
696002036000
|
trusted library allocation
|
page read and write
|
||
19EC01F48000
|
trusted library allocation
|
page read and write
|
||
7D1000ACB000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
1CF6FE71000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696000A54000
|
trusted library allocation
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
19EC0100C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
69600060C000
|
trusted library allocation
|
page read and write
|
||
22C8B5E5000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
22C8B7FA000
|
heap
|
page read and write
|
||
696002164000
|
trusted library allocation
|
page read and write
|
||
22C8766B000
|
heap
|
page read and write
|
||
19EC0060C000
|
trusted library allocation
|
page read and write
|
||
696001CC4000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
275400158000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
4948002CC000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
135FD92A000
|
heap
|
page read and write
|
||
19EC01CB8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696002098000
|
trusted library allocation
|
page read and write
|
||
324001DEC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
333801DC4000
|
trusted library allocation
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
7D1000638000
|
trusted library allocation
|
page read and write
|
||
696000E5C000
|
trusted library allocation
|
page read and write
|
||
7FF7C93F0000
|
unkown
|
page readonly
|
||
19EC01E6C000
|
trusted library allocation
|
page read and write
|
||
696001F24000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
135FD934000
|
heap
|
page read and write
|
||
7D10006AC000
|
trusted library allocation
|
page read and write
|
||
19EC01040000
|
trusted library allocation
|
page read and write
|
||
79D8009D0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696001E44000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
324000624000
|
trusted library allocation
|
page read and write
|
||
324000BB4000
|
trusted library allocation
|
page read and write
|
||
3338002CC000
|
trusted library allocation
|
page read and write
|
||
368C00298000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696001F7C000
|
trusted library allocation
|
page read and write
|
||
333801D2C000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
275400178000
|
trusted library allocation
|
page read and write
|
||
19EC006A0000
|
trusted library allocation
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
22C878EB000
|
heap
|
page read and write
|
||
696001C94000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
7D10003DC000
|
trusted library allocation
|
page read and write
|
||
19EC01CD0000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
6960009F2000
|
trusted library allocation
|
page read and write
|
||
333800BE0000
|
trusted library allocation
|
page read and write
|
||
3F380066C000
|
trusted library allocation
|
page read and write
|
||
19EC00284000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
19EC01D88000
|
trusted library allocation
|
page read and write
|
||
324001F1C000
|
trusted library allocation
|
page read and write
|
||
6240032C000
|
direct allocation
|
page read and write
|
||
333801E84000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
696000B89000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
3338003C4000
|
trusted library allocation
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
76BC03030000
|
trusted library allocation
|
page read and write
|
||
696000BD8000
|
trusted library allocation
|
page read and write
|
||
76BC04404000
|
trusted library allocation
|
page read and write
|
||
76BC03D6D000
|
trusted library allocation
|
page read and write
|
||
324001E98000
|
trusted library allocation
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
324000334000
|
trusted library allocation
|
page read and write
|
||
7930002B8000
|
trusted library allocation
|
page read and write
|
||
333801CDC000
|
trusted library allocation
|
page read and write
|
||
551000
|
heap
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
3338006AC000
|
trusted library allocation
|
page read and write
|
||
3F3800328000
|
trusted library allocation
|
page read and write
|
||
4948002C4000
|
trusted library allocation
|
page read and write
|
||
19EC02030000
|
trusted library allocation
|
page read and write
|
||
79D8003E8000
|
trusted library allocation
|
page read and write
|
||
3F3801A04000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
19EC00BB0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE26000
|
heap
|
page read and write
|
||
135FF708000
|
heap
|
page read and write
|
||
19EC01F38000
|
trusted library allocation
|
page read and write
|
||
324001FEC000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
62400328000
|
direct allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
4B08002B8000
|
trusted library allocation
|
page read and write
|
||
2A78002C4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
32400040C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7D100078C000
|
trusted library allocation
|
page read and write
|
||
19EC02020000
|
trusted library allocation
|
page read and write
|
||
22C8B7FC000
|
heap
|
page read and write
|
||
324000770000
|
trusted library allocation
|
page read and write
|
||
76BC04804000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
7D1000348000
|
trusted library allocation
|
page read and write
|
||
22C8766B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
324001C4C000
|
trusted library allocation
|
page read and write
|
||
6960006AC000
|
trusted library allocation
|
page read and write
|
||
1EEAB06A000
|
heap
|
page read and write
|
||
7D1002044000
|
trusted library allocation
|
page read and write
|
||
19EC01050000
|
trusted library allocation
|
page read and write
|
||
7D100204C000
|
trusted library allocation
|
page read and write
|
||
1ED24A09000
|
heap
|
page read and write
|
||
333800B04000
|
trusted library allocation
|
page read and write
|
||
12F4002D4000
|
trusted library allocation
|
page read and write
|
||
4C1800244000
|
trusted library allocation
|
page read and write
|
||
19EC01E84000
|
trusted library allocation
|
page read and write
|
||
19EC01D98000
|
trusted library allocation
|
page read and write
|
||
22C87757000
|
heap
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
76BC03804000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
27964912000
|
heap
|
page read and write
|
||
1EEAB040000
|
heap
|
page read and write
|
||
3148002D8000
|
trusted library allocation
|
page read and write
|
||
562C00338000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC0360C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
696000AD4000
|
trusted library allocation
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
333800B80000
|
trusted library allocation
|
page read and write
|
||
76BC03254000
|
trusted library allocation
|
page read and write
|
||
696001FF4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
3240006AC000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
76BC03110000
|
trusted library allocation
|
page read and write
|
||
3F38003A8000
|
trusted library allocation
|
page read and write
|
||
696001D04000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
6960003C4000
|
trusted library allocation
|
page read and write
|
||
696001DDC000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
7D1000A2C000
|
trusted library allocation
|
page read and write
|
||
696000770000
|
trusted library allocation
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
76BC030EC000
|
trusted library allocation
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
22C87637000
|
heap
|
page read and write
|
||
333801DEC000
|
trusted library allocation
|
page read and write
|
||
3338003C4000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
79D800A8C000
|
trusted library allocation
|
page read and write
|
||
1EEAB06A000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
32400033C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
19EC00A4C000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
3F380066C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
135FD934000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
19EC02170000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
333801E0C000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
333801C0C000
|
trusted library allocation
|
page read and write
|
||
1ED24A6B000
|
heap
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
324000614000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
27964912000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3240003AC000
|
trusted library allocation
|
page read and write
|
||
3FB4002CC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
32400077C000
|
trusted library allocation
|
page read and write
|
||
562C0040C000
|
trusted library allocation
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
19EC0031C000
|
trusted library allocation
|
page read and write
|
||
3240006A0000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
333801DD4000
|
trusted library allocation
|
page read and write
|
||
76BC031B8000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
6240031A000
|
direct allocation
|
page read and write
|
||
19EC01D00000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
22C8770B000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
3F38007D8000
|
trusted library allocation
|
page read and write
|
||
333800BC0000
|
trusted library allocation
|
page read and write
|
||
22C87561000
|
heap
|
page read and write
|
||
1ED24A70000
|
heap
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
19EC01D80000
|
trusted library allocation
|
page read and write
|
||
324001CCC000
|
trusted library allocation
|
page read and write
|
||
22C8764A000
|
heap
|
page read and write
|
||
696000684000
|
trusted library allocation
|
page read and write
|
||
79D80077C000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
32400208D000
|
trusted library allocation
|
page read and write
|
||
79D800A24000
|
trusted library allocation
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
333800824000
|
trusted library allocation
|
page read and write
|
||
135FD96E000
|
heap
|
page read and write
|
||
22C874BE000
|
heap
|
page read and write
|
||
1ED24A40000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
76BC04004000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
76BC03694000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
696000BE8000
|
trusted library allocation
|
page read and write
|
||
76BC03264000
|
trusted library allocation
|
page read and write
|
||
7D1001FB4000
|
trusted library allocation
|
page read and write
|
||
7D10003B8000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696001E44000
|
trusted library allocation
|
page read and write
|
||
333802054000
|
trusted library allocation
|
page read and write
|
||
7D1002088000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
696001D34000
|
trusted library allocation
|
page read and write
|
||
1ED24A70000
|
heap
|
page read and write
|
||
69600201C000
|
trusted library allocation
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
19EC02A04000
|
trusted library allocation
|
page read and write
|
||
19EC01D20000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1ED24A74000
|
heap
|
page read and write
|
||
1ED24A76000
|
heap
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
1E34002D4000
|
trusted library allocation
|
page read and write
|
||
3338002A0000
|
trusted library allocation
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
12F4002AC000
|
trusted library allocation
|
page read and write
|
||
696001E48000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
76BC04080000
|
trusted library allocation
|
page read and write
|
||
1ED24A7C000
|
heap
|
page read and write
|
||
696001CF4000
|
trusted library allocation
|
page read and write
|
||
1ED24A6C000
|
heap
|
page read and write
|
||
76BC04404000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
76BC030F4000
|
trusted library allocation
|
page read and write
|
||
19EC02048000
|
trusted library allocation
|
page read and write
|
||
7D1000284000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
7D10002A0000
|
trusted library allocation
|
page read and write
|
||
76BC03E04000
|
trusted library allocation
|
page read and write
|
||
69600074C000
|
trusted library allocation
|
page read and write
|
||
19EC003C4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
76BC03504000
|
trusted library allocation
|
page read and write
|
||
279672E0000
|
trusted library allocation
|
page read and write
|
||
324001D3C000
|
trusted library allocation
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
324002064000
|
trusted library allocation
|
page read and write
|
||
7D1001FD4000
|
trusted library allocation
|
page read and write
|
||
76BC0405C000
|
trusted library allocation
|
page read and write
|
||
793000294000
|
trusted library allocation
|
page read and write
|
||
22C87854000
|
heap
|
page read and write
|
||
19EC0203A000
|
trusted library allocation
|
page read and write
|
||
76BC04050000
|
trusted library allocation
|
page read and write
|
||
1ED244E0000
|
remote allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE72000
|
heap
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
76BC0243C000
|
trusted library allocation
|
page read and write
|
||
696000A40000
|
trusted library allocation
|
page read and write
|
||
79D8006A0000
|
trusted library allocation
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
3C4000298000
|
direct allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333800788000
|
trusted library allocation
|
page read and write
|
||
19EC00B30000
|
trusted library allocation
|
page read and write
|
||
22C874D4000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
7FF7C93F1000
|
unkown
|
page execute read
|
||
13583511000
|
heap
|
page read and write
|
||
696001D74000
|
trusted library allocation
|
page read and write
|
||
135FD96F000
|
heap
|
page read and write
|
||
696000AC8000
|
trusted library allocation
|
page read and write
|
||
135FD981000
|
heap
|
page read and write
|
||
3F38007BC000
|
trusted library allocation
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
22C8774E000
|
heap
|
page read and write
|
||
324000694000
|
trusted library allocation
|
page read and write
|
||
333801FC8000
|
trusted library allocation
|
page read and write
|
||
696001D8C000
|
trusted library allocation
|
page read and write
|
||
7930002B8000
|
trusted library allocation
|
page read and write
|
||
696001ED8000
|
trusted library allocation
|
page read and write
|
||
22C875FF000
|
heap
|
page read and write
|
||
69600238C000
|
trusted library allocation
|
page read and write
|
||
259F000
|
stack
|
page read and write
|
||
19EC01CE8000
|
trusted library allocation
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
79D8002DC000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
1CF6FE82000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
696000BB0000
|
trusted library allocation
|
page read and write
|
||
333801DAC000
|
trusted library allocation
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
696000770000
|
trusted library allocation
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
333800B61000
|
trusted library allocation
|
page read and write
|
||
7D10009D8000
|
trusted library allocation
|
page read and write
|
||
79D800A0C000
|
trusted library allocation
|
page read and write
|
||
4B0800294000
|
trusted library allocation
|
page read and write
|
||
19EC01DB0000
|
trusted library allocation
|
page read and write
|
||
19EC02050000
|
trusted library allocation
|
page read and write
|
||
333800B5F000
|
trusted library allocation
|
page read and write
|
||
333801DA4000
|
trusted library allocation
|
page read and write
|
||
7D1001FF4000
|
trusted library allocation
|
page read and write
|
||
333801D34000
|
trusted library allocation
|
page read and write
|
||
333801CBC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
32400031C000
|
trusted library allocation
|
page read and write
|
||
22C8B5E1000
|
heap
|
page read and write
|
||
447C0028C000
|
trusted library allocation
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
333801EBC000
|
trusted library allocation
|
page read and write
|
||
62400310000
|
direct allocation
|
page read and write
|
||
9EC00418000
|
trusted library allocation
|
page read and write
|
||
19EC01E0C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0A000
|
heap
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
696000818000
|
trusted library allocation
|
page read and write
|
||
22C8770B000
|
heap
|
page read and write
|
||
333801D34000
|
trusted library allocation
|
page read and write
|
||
333802054000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C8B5EA000
|
heap
|
page read and write
|
||
324001DD4000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
79D800684000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
324001CFC000
|
trusted library allocation
|
page read and write
|
||
76BC04004000
|
trusted library allocation
|
page read and write
|
||
79D8006AC000
|
trusted library allocation
|
page read and write
|
||
19EC007C0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
32400074C000
|
trusted library allocation
|
page read and write
|
||
3240003E8000
|
trusted library allocation
|
page read and write
|
||
19EC01568000
|
trusted library allocation
|
page read and write
|
||
3148002AC000
|
trusted library allocation
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
13583412000
|
heap
|
page read and write
|
||
19EC01F18000
|
trusted library allocation
|
page read and write
|
||
324001FEC000
|
trusted library allocation
|
page read and write
|
||
3F3800C04000
|
trusted library allocation
|
page read and write
|
||
3F380078C000
|
trusted library allocation
|
page read and write
|
||
135FD92A000
|
heap
|
page read and write
|
||
19EC00A24000
|
trusted library allocation
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
19EC01E0C000
|
trusted library allocation
|
page read and write
|
||
3F3801004000
|
trusted library allocation
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
562C00324000
|
trusted library allocation
|
page read and write
|
||
324000788000
|
trusted library allocation
|
page read and write
|
||
696000E88000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
1ED24A74000
|
heap
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
9EC00408000
|
trusted library allocation
|
page read and write
|
||
3338003DC000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
333801D3C000
|
trusted library allocation
|
page read and write
|
||
324001CF4000
|
trusted library allocation
|
page read and write
|
||
696001D84000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
76BC03030000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
4C18002C0000
|
trusted library allocation
|
page read and write
|
||
3240009E4000
|
trusted library allocation
|
page read and write
|
||
22C8B702000
|
heap
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
333801F38000
|
trusted library allocation
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
135FD988000
|
heap
|
page read and write
|
||
76BC03268000
|
trusted library allocation
|
page read and write
|
||
19EC01D60000
|
trusted library allocation
|
page read and write
|
||
7D1001DE0000
|
trusted library allocation
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
19EC00AC3000
|
trusted library allocation
|
page read and write
|
||
4B08002C4000
|
trusted library allocation
|
page read and write
|
||
324002054000
|
trusted library allocation
|
page read and write
|
||
1CF6FE3C000
|
heap
|
page read and write
|
||
7D1000E04000
|
trusted library allocation
|
page read and write
|
||
19EC006AC000
|
trusted library allocation
|
page read and write
|
||
275400168000
|
trusted library allocation
|
page read and write
|
||
22C875FB000
|
heap
|
page read and write
|
||
19EC014FC000
|
trusted library allocation
|
page read and write
|
||
6960003DC000
|
trusted library allocation
|
page read and write
|
||
696001F84000
|
trusted library allocation
|
page read and write
|
||
3C4000244000
|
direct allocation
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
7D10009F0000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
333801F58000
|
trusted library allocation
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
1CF6F8F0000
|
remote allocation
|
page read and write
|
||
76BC03E04000
|
trusted library allocation
|
page read and write
|
||
5FC00019C000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
3240009F0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
3F3800248000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC0366C000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696001D54000
|
trusted library allocation
|
page read and write
|
||
696002054000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
324001D7C000
|
trusted library allocation
|
page read and write
|
||
5FC000138000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
19EC0208C000
|
trusted library allocation
|
page read and write
|
||
19EC01FD0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
696000EB8000
|
trusted library allocation
|
page read and write
|
||
696001DCC000
|
trusted library allocation
|
page read and write
|
||
19EC01D10000
|
trusted library allocation
|
page read and write
|
||
7D1000A7C000
|
trusted library allocation
|
page read and write
|
||
3F3801804000
|
trusted library allocation
|
page read and write
|
||
696001DF4000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
2C1800294000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
696000B89000
|
trusted library allocation
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
696002C04000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
19EC02070000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
3F380078C000
|
trusted library allocation
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
333801CF4000
|
trusted library allocation
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3F38007D8000
|
trusted library allocation
|
page read and write
|
||
19EC02010000
|
trusted library allocation
|
page read and write
|
||
19EC01FE8000
|
trusted library allocation
|
page read and write
|
||
19EC01074000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
76BC0351C000
|
trusted library allocation
|
page read and write
|
||
19EC00B5F000
|
trusted library allocation
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
22C87655000
|
heap
|
page read and write
|
||
324001CCC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC01FE0000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
358800294000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
696001E48000
|
trusted library allocation
|
page read and write
|
||
324001DCC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333802014000
|
trusted library allocation
|
page read and write
|
||
76BC033C4000
|
trusted library allocation
|
page read and write
|
||
324000BA4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
696000AEC000
|
trusted library allocation
|
page read and write
|
||
696001E24000
|
trusted library allocation
|
page read and write
|
||
333801D04000
|
trusted library allocation
|
page read and write
|
||
19EC01D88000
|
trusted library allocation
|
page read and write
|
||
696001EE0000
|
trusted library allocation
|
page read and write
|
||
9EC00304000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
1CF6FE6B000
|
heap
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01DD0000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
333800BD0000
|
trusted library allocation
|
page read and write
|
||
1EEAB07B000
|
heap
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
7930002CC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
696001CBC000
|
trusted library allocation
|
page read and write
|
||
333801FF0000
|
trusted library allocation
|
page read and write
|
||
1ED24A63000
|
heap
|
page read and write
|
||
7D1001DD8000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
76BC03924000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
76BC039E0000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
19EC01C2C000
|
trusted library allocation
|
page read and write
|
||
696000890000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
696001E14000
|
trusted library allocation
|
page read and write
|
||
333800A24000
|
trusted library allocation
|
page read and write
|
||
6960002CC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
7D1002080000
|
trusted library allocation
|
page read and write
|
||
2A7800294000
|
trusted library allocation
|
page read and write
|
||
22C874D4000
|
heap
|
page read and write
|
||
22C878F7000
|
heap
|
page read and write
|
||
19EC01F18000
|
trusted library allocation
|
page read and write
|
||
19EC01EEC000
|
trusted library allocation
|
page read and write
|
||
76BC04134000
|
trusted library allocation
|
page read and write
|
||
333802108000
|
trusted library allocation
|
page read and write
|
||
2A78002B8000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
19EC014FC000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333801EF4000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
19EC00624000
|
trusted library allocation
|
page read and write
|
||
696001C5C000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
324001D2C000
|
trusted library allocation
|
page read and write
|
||
1ED24A71000
|
heap
|
page read and write
|
||
324001FD4000
|
trusted library allocation
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
4C18002B4000
|
trusted library allocation
|
page read and write
|
||
333800614000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333801E9C000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
7D10002DC000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696000334000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696001CCC000
|
trusted library allocation
|
page read and write
|
||
1ED24A5B000
|
heap
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
69600077C000
|
trusted library allocation
|
page read and write
|
||
79D80061C000
|
trusted library allocation
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
696001C24000
|
trusted library allocation
|
page read and write
|
||
76BC02478000
|
trusted library allocation
|
page read and write
|
||
76BC02AC0000
|
trusted library allocation
|
page read and write
|
||
7D1000828000
|
trusted library allocation
|
page read and write
|
||
696002054000
|
trusted library allocation
|
page read and write
|
||
19EC00B54000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
22C8B5E7000
|
heap
|
page read and write
|
||
333800BB0000
|
trusted library allocation
|
page read and write
|
||
324000634000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
7FF7C9F7A000
|
unkown
|
page write copy
|
||
13583511000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
7D1001D58000
|
trusted library allocation
|
page read and write
|
||
333801D8C000
|
trusted library allocation
|
page read and write
|
||
333800B78000
|
trusted library allocation
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
1CF6FE71000
|
heap
|
page read and write
|
||
6960009ED000
|
trusted library allocation
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
1ED24A6C000
|
heap
|
page read and write
|
||
76BC03930000
|
trusted library allocation
|
page read and write
|
||
9EC00328000
|
trusted library allocation
|
page read and write
|
||
76BC04804000
|
trusted library allocation
|
page read and write
|
||
324001CA4000
|
trusted library allocation
|
page read and write
|
||
76BC03504000
|
trusted library allocation
|
page read and write
|
||
19EC00AC0000
|
trusted library allocation
|
page read and write
|
||
69600203C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
76BC03E04000
|
trusted library allocation
|
page read and write
|
||
33380205C000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
76BC034BC000
|
trusted library allocation
|
page read and write
|
||
696000AE7000
|
trusted library allocation
|
page read and write
|
||
33380209C000
|
trusted library allocation
|
page read and write
|
||
333801E8C000
|
trusted library allocation
|
page read and write
|
||
22C874B8000
|
heap
|
page read and write
|
||
333801D6C000
|
trusted library allocation
|
page read and write
|
||
1EEAB05E000
|
heap
|
page read and write
|
||
6960002D4000
|
trusted library allocation
|
page read and write
|
||
7C8000418000
|
trusted library allocation
|
page read and write
|
||
19EC02048000
|
trusted library allocation
|
page read and write
|
||
3FB400294000
|
trusted library allocation
|
page read and write
|
||
32400078C000
|
trusted library allocation
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
79D8006AC000
|
trusted library allocation
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
3F3801804000
|
trusted library allocation
|
page read and write
|
||
7D1000408000
|
trusted library allocation
|
page read and write
|
||
7D10006A0000
|
trusted library allocation
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
2796499C000
|
heap
|
page read and write
|
||
7D1001CF0000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
19EC00620000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC01D78000
|
trusted library allocation
|
page read and write
|
||
696000E58000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
2C18002B8000
|
trusted library allocation
|
page read and write
|
||
333800334000
|
trusted library allocation
|
page read and write
|
||
4B08002B8000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC0360C000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
696001D0C000
|
trusted library allocation
|
page read and write
|
||
1EEAB057000
|
heap
|
page read and write
|
||
3148002C8000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
333800B61000
|
trusted library allocation
|
page read and write
|
||
696001E48000
|
trusted library allocation
|
page read and write
|
||
333801ED4000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
696001CEC000
|
trusted library allocation
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
333800ABE000
|
trusted library allocation
|
page read and write
|
||
22C875C5000
|
heap
|
page read and write
|
||
2C1800294000
|
trusted library allocation
|
page read and write
|
||
696001FE4000
|
trusted library allocation
|
page read and write
|
||
696000A74000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
19EC01CB0000
|
trusted library allocation
|
page read and write
|
||
22C87647000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
25DD1A66000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
324001E88000
|
trusted library allocation
|
page read and write
|
||
5FC000130000
|
trusted library allocation
|
page read and write
|
||
19EC02050000
|
trusted library allocation
|
page read and write
|
||
69600060C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
3832000
|
heap
|
page read and write
|
||
19EC0202A000
|
trusted library allocation
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
19EC009D4000
|
trusted library allocation
|
page read and write
|
||
22C87894000
|
heap
|
page read and write
|
||
69600077C000
|
trusted library allocation
|
page read and write
|
||
324001DD4000
|
trusted library allocation
|
page read and write
|
||
324000624000
|
trusted library allocation
|
page read and write
|
||
324001D94000
|
trusted library allocation
|
page read and write
|
||
25DE782B000
|
heap
|
page read and write
|
||
76BC0247B000
|
trusted library allocation
|
page read and write
|
||
6960020CC000
|
trusted library allocation
|
page read and write
|
||
19EC01D50000
|
trusted library allocation
|
page read and write
|
||
2C1800294000
|
trusted library allocation
|
page read and write
|
||
22C8B7E6000
|
heap
|
page read and write
|
||
6960009E4000
|
trusted library allocation
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
368C00240000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
696002114000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
7D10006AC000
|
trusted library allocation
|
page read and write
|
||
3F38007D4000
|
trusted library allocation
|
page read and write
|
||
76BC043C4000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C8788F000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7D1002026000
|
trusted library allocation
|
page read and write
|
||
19EC02050000
|
trusted library allocation
|
page read and write
|
||
4C5000
|
heap
|
page read and write
|
||
696000E8C000
|
trusted library allocation
|
page read and write
|
||
696001EA8000
|
trusted library allocation
|
page read and write
|
||
7D1001DB8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801E64000
|
trusted library allocation
|
page read and write
|
||
6960021C8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
2A7800294000
|
trusted library allocation
|
page read and write
|
||
696001FC4000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
22C875B0000
|
heap
|
page read and write
|
||
79D80028C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001D04000
|
trusted library allocation
|
page read and write
|
||
19EC01F70000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC03CD0000
|
trusted library allocation
|
page read and write
|
||
33380202C000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
3FB4002B8000
|
trusted library allocation
|
page read and write
|
||
7C800034C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
19EC00AB0000
|
trusted library allocation
|
page read and write
|
||
6960009E4000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
324001C8C000
|
trusted library allocation
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
22C8B700000
|
heap
|
page read and write
|
||
4B0800294000
|
trusted library allocation
|
page read and write
|
||
7D1000A98000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
1ED24A6A000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1ED24A57000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
696002095000
|
trusted library allocation
|
page read and write
|
||
324001D44000
|
trusted library allocation
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
76BC0360C000
|
trusted library allocation
|
page read and write
|
||
696000788000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
27964912000
|
heap
|
page read and write
|
||
19EC002A0000
|
trusted library allocation
|
page read and write
|
||
79D8009EC000
|
trusted library allocation
|
page read and write
|
||
19EC0108C000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
19EC002DC000
|
trusted library allocation
|
page read and write
|
||
333801FF0000
|
trusted library allocation
|
page read and write
|
||
33380216C000
|
trusted library allocation
|
page read and write
|
||
76BC04A04000
|
trusted library allocation
|
page read and write
|
||
22C85C27000
|
heap
|
page read and write
|
||
324001C7C000
|
trusted library allocation
|
page read and write
|
||
4B0800294000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
19EC00654000
|
trusted library allocation
|
page read and write
|
||
696001F4C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
25DD1A5C000
|
heap
|
page read and write
|
||
696001204000
|
trusted library allocation
|
page read and write
|
||
333801CCC000
|
trusted library allocation
|
page read and write
|
||
22C87563000
|
heap
|
page read and write
|
||
76BC027A8000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
324000AD4000
|
trusted library allocation
|
page read and write
|
||
76BC031D0000
|
trusted library allocation
|
page read and write
|
||
3F38007BC000
|
trusted library allocation
|
page read and write
|
||
79D800408000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
333800B30000
|
trusted library allocation
|
page read and write
|
||
696000E48000
|
trusted library allocation
|
page read and write
|
||
7D10009E6000
|
trusted library allocation
|
page read and write
|
||
79D800348000
|
trusted library allocation
|
page read and write
|
||
2A78002B8000
|
trusted library allocation
|
page read and write
|
||
19EC01CC8000
|
trusted library allocation
|
page read and write
|
||
324000834000
|
trusted library allocation
|
page read and write
|
||
324000B9C000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
19EC01C4C000
|
trusted library allocation
|
page read and write
|
||
696001DD4000
|
trusted library allocation
|
page read and write
|
||
19EC01D40000
|
trusted library allocation
|
page read and write
|
||
333800730000
|
trusted library allocation
|
page read and write
|
||
7D1000A18000
|
trusted library allocation
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
19EC01080000
|
trusted library allocation
|
page read and write
|
||
324001D8C000
|
trusted library allocation
|
page read and write
|
||
3F3800744000
|
trusted library allocation
|
page read and write
|
||
1CF6FE73000
|
heap
|
page read and write
|
||
19EC00614000
|
trusted library allocation
|
page read and write
|
||
76BC03D6C000
|
trusted library allocation
|
page read and write
|
||
25DE782B000
|
heap
|
page read and write
|
||
696001DB4000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1EEAB03C000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1EEAB06C000
|
heap
|
page read and write
|
||
19EC01DC8000
|
trusted library allocation
|
page read and write
|
||
3588002A4000
|
trusted library allocation
|
page read and write
|
||
7D100205C000
|
trusted library allocation
|
page read and write
|
||
62400335000
|
direct allocation
|
page read and write
|
||
333802046000
|
trusted library allocation
|
page read and write
|
||
27964902000
|
heap
|
page read and write
|
||
324001D4C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
696001E24000
|
trusted library allocation
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
1358351F000
|
heap
|
page read and write
|
||
22C874E6000
|
heap
|
page read and write
|
||
19EC0208C000
|
trusted library allocation
|
page read and write
|
||
333801E44000
|
trusted library allocation
|
page read and write
|
||
79D800620000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
324000BB4000
|
trusted library allocation
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
33380061C000
|
trusted library allocation
|
page read and write
|
||
324001DE4000
|
trusted library allocation
|
page read and write
|
||
19EC0040C000
|
trusted library allocation
|
page read and write
|
||
324000BEC000
|
trusted library allocation
|
page read and write
|
||
76BC03A18000
|
trusted library allocation
|
page read and write
|
||
793000294000
|
trusted library allocation
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
3F3800744000
|
trusted library allocation
|
page read and write
|
||
3F38007D5000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
7D1001FF4000
|
trusted library allocation
|
page read and write
|
||
696001D94000
|
trusted library allocation
|
page read and write
|
||
696001F2C000
|
trusted library allocation
|
page read and write
|
||
1ED24A0C000
|
heap
|
page read and write
|
||
7D1001DF0000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
333800B61000
|
trusted library allocation
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
333800AF4000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
333802098000
|
trusted library allocation
|
page read and write
|
||
33380205C000
|
trusted library allocation
|
page read and write
|
||
135FD94D000
|
heap
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
324002074000
|
trusted library allocation
|
page read and write
|
||
19EC01ECC000
|
trusted library allocation
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
696000E98000
|
trusted library allocation
|
page read and write
|
||
135FD951000
|
heap
|
page read and write
|
||
7FF7C9F7E000
|
unkown
|
page readonly
|
||
76BC031DC000
|
trusted library allocation
|
page read and write
|
||
22C876CB000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1E34002AC000
|
trusted library allocation
|
page read and write
|
||
333801E94000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
333801D7C000
|
trusted library allocation
|
page read and write
|
||
333802054000
|
trusted library allocation
|
page read and write
|
||
1CF6FE78000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
69600210C000
|
trusted library allocation
|
page read and write
|
||
76BC043B8000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
19EC00AC8000
|
trusted library allocation
|
page read and write
|
||
76BC04454000
|
trusted library allocation
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
7D1000614000
|
trusted library allocation
|
page read and write
|
||
19EC01FF8000
|
trusted library allocation
|
page read and write
|
||
324000408000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
22C87540000
|
heap
|
page read and write
|
||
324001D3C000
|
trusted library allocation
|
page read and write
|
||
1ED24A77000
|
heap
|
page read and write
|
||
7C8000424000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
6240032A000
|
direct allocation
|
page read and write
|
||
35E00040000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
4C1800300000
|
trusted library allocation
|
page read and write
|
||
3F380066C000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
1ED24A3C000
|
heap
|
page read and write
|
||
324001C24000
|
trusted library allocation
|
page read and write
|
||
333801D0C000
|
trusted library allocation
|
page read and write
|
||
696000A2C000
|
trusted library allocation
|
page read and write
|
||
19EC01DE0000
|
trusted library allocation
|
page read and write
|
||
696000B89000
|
trusted library allocation
|
page read and write
|
||
324000AC8000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
333801D4C000
|
trusted library allocation
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
19EC00BD0000
|
trusted library allocation
|
page read and write
|
||
7D100077C000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
19EC00A0C000
|
trusted library allocation
|
page read and write
|
||
7D1001D80000
|
trusted library allocation
|
page read and write
|
||
33380078C000
|
trusted library allocation
|
page read and write
|
||
32400204C000
|
trusted library allocation
|
page read and write
|
||
19EC02084000
|
trusted library allocation
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
1B6000298000
|
direct allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
6960009EC000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
3240007A4000
|
trusted library allocation
|
page read and write
|
||
2A78002C8000
|
trusted library allocation
|
page read and write
|
||
696001D5C000
|
trusted library allocation
|
page read and write
|
||
333801F20000
|
trusted library allocation
|
page read and write
|
||
333800730000
|
trusted library allocation
|
page read and write
|
||
69600205C000
|
trusted library allocation
|
page read and write
|
||
135FF708000
|
heap
|
page read and write
|
||
696001F54000
|
trusted library allocation
|
page read and write
|
||
2B00B62B000
|
heap
|
page read and write
|
||
36600040000
|
trusted library allocation
|
page read and write
|
||
1EEAB070000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
19EC02089000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
333800E04000
|
trusted library allocation
|
page read and write
|
||
324000894000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
2B00B452000
|
heap
|
page read and write
|
||
19EC00B04000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
9EC0040C000
|
trusted library allocation
|
page read and write
|
||
19EC00BD8000
|
trusted library allocation
|
page read and write
|
||
32400074C000
|
trusted library allocation
|
page read and write
|
||
324000AC8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE62000
|
heap
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
333801C8C000
|
trusted library allocation
|
page read and write
|
||
19EC01EF4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C875FB000
|
heap
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
7D1002014000
|
trusted library allocation
|
page read and write
|
||
3240003D0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
3F38007D5000
|
trusted library allocation
|
page read and write
|
||
19EC009D4000
|
trusted library allocation
|
page read and write
|
||
3588002CC000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
7D1000614000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
4C18002C0000
|
trusted library allocation
|
page read and write
|
||
696000674000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC0061C000
|
trusted library allocation
|
page read and write
|
||
324001C1C000
|
trusted library allocation
|
page read and write
|
||
19EC01D48000
|
trusted library allocation
|
page read and write
|
||
79D8008A4000
|
trusted library allocation
|
page read and write
|
||
79D800A18000
|
trusted library allocation
|
page read and write
|
||
333801D64000
|
trusted library allocation
|
page read and write
|
||
79D800818000
|
trusted library allocation
|
page read and write
|
||
696002020000
|
trusted library allocation
|
page read and write
|
||
19EC01D18000
|
trusted library allocation
|
page read and write
|
||
6960022EC000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333801FC0000
|
trusted library allocation
|
page read and write
|
||
69600078C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
76BC03194000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
562C0032C000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
1EEAB034000
|
heap
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
7D1001FF4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
1CF6FE74000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
19EC01E94000
|
trusted library allocation
|
page read and write
|
||
69600240B000
|
trusted library allocation
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
79D80074C000
|
trusted library allocation
|
page read and write
|
||
22C874E2000
|
heap
|
page read and write
|
||
696000EB0000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C87666000
|
heap
|
page read and write
|
||
19EC00B88000
|
trusted library allocation
|
page read and write
|
||
324001CBC000
|
trusted library allocation
|
page read and write
|
||
7D1002044000
|
trusted library allocation
|
page read and write
|
||
1E34002C8000
|
trusted library allocation
|
page read and write
|
||
69600300B000
|
trusted library allocation
|
page read and write
|
||
3338009E4000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
696001FEC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
7D100080C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
696000B8C000
|
trusted library allocation
|
page read and write
|
||
7D1001DA0000
|
trusted library allocation
|
page read and write
|
||
333800284000
|
trusted library allocation
|
page read and write
|
||
19EC00334000
|
trusted library allocation
|
page read and write
|
||
279649A4000
|
heap
|
page read and write
|
||
324001D74000
|
trusted library allocation
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
12F4002BC000
|
trusted library allocation
|
page read and write
|
||
7D1000724000
|
trusted library allocation
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
1CF6FE7B000
|
heap
|
page read and write
|
||
324001EC0000
|
trusted library allocation
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
22C875FA000
|
heap
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
33380061C000
|
trusted library allocation
|
page read and write
|
||
76BC03268000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
22C87717000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
19EC0203A000
|
trusted library allocation
|
page read and write
|
||
4948002A8000
|
trusted library allocation
|
page read and write
|
||
333800730000
|
trusted library allocation
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
2C18002CC000
|
trusted library allocation
|
page read and write
|
||
3240009D4000
|
trusted library allocation
|
page read and write
|
||
4948002B8000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696001CB4000
|
trusted library allocation
|
page read and write
|
||
324001DF4000
|
trusted library allocation
|
page read and write
|
||
333801C74000
|
trusted library allocation
|
page read and write
|
||
19EC01EFC000
|
trusted library allocation
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
7D1001D98000
|
trusted library allocation
|
page read and write
|
||
3338006A0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
7D1001D40000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
696000E84000
|
trusted library allocation
|
page read and write
|
||
324001E90000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
1EEAB034000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC00788000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
324000730000
|
trusted library allocation
|
page read and write
|
||
33380060C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
69600061C000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
696000284000
|
trusted library allocation
|
page read and write
|
||
696000BA8000
|
trusted library allocation
|
page read and write
|
||
696000BD0000
|
trusted library allocation
|
page read and write
|
||
324001D9C000
|
trusted library allocation
|
page read and write
|
||
696002014000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
7D1001404000
|
trusted library allocation
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333800B68000
|
trusted library allocation
|
page read and write
|
||
19EC00730000
|
trusted library allocation
|
page read and write
|
||
1CF6FE27000
|
heap
|
page read and write
|
||
7D1000694000
|
trusted library allocation
|
page read and write
|
||
2C18002C4000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
27964912000
|
heap
|
page read and write
|
||
76BC039EC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE55000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
7D1000AC8000
|
trusted library allocation
|
page read and write
|
||
6960022EC000
|
trusted library allocation
|
page read and write
|
||
19EC00A88000
|
trusted library allocation
|
page read and write
|
||
76BC039C8000
|
trusted library allocation
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
12F4002D8000
|
trusted library allocation
|
page read and write
|
||
696001D7C000
|
trusted library allocation
|
page read and write
|
||
696001D3C000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
6960021BC000
|
trusted library allocation
|
page read and write
|
||
696001E0C000
|
trusted library allocation
|
page read and write
|
||
324001EC8000
|
trusted library allocation
|
page read and write
|
||
79D800634000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
696000A20000
|
trusted library allocation
|
page read and write
|
||
696000AE4000
|
trusted library allocation
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
696002098000
|
trusted library allocation
|
page read and write
|
||
76BC04140000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1EEAB00C000
|
heap
|
page read and write
|
||
4B08002B8000
|
trusted library allocation
|
page read and write
|
||
696000EA4000
|
trusted library allocation
|
page read and write
|
||
19EC01CA0000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
3338020A0000
|
trusted library allocation
|
page read and write
|
||
696001DBC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
324000770000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
76BC03A04000
|
trusted library allocation
|
page read and write
|
||
7D1002085000
|
trusted library allocation
|
page read and write
|
||
1CF6FE3C000
|
heap
|
page read and write
|
||
76BC031C4000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
19EC002CC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801F30000
|
trusted library allocation
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
76BC030C0000
|
trusted library allocation
|
page read and write
|
||
7D1000614000
|
trusted library allocation
|
page read and write
|
||
19EC00770000
|
trusted library allocation
|
page read and write
|
||
69600205C000
|
trusted library allocation
|
page read and write
|
||
1B6000244000
|
direct allocation
|
page read and write
|
||
1CF6FE66000
|
heap
|
page read and write
|
||
333800B0C000
|
trusted library allocation
|
page read and write
|
||
1EEAB034000
|
heap
|
page read and write
|
||
1CF6FE5D000
|
heap
|
page read and write
|
||
368C00408000
|
trusted library allocation
|
page read and write
|
||
6960009F0000
|
trusted library allocation
|
page read and write
|
||
19EC00AFC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001D1C000
|
trusted library allocation
|
page read and write
|
||
76BC03074000
|
trusted library allocation
|
page read and write
|
||
76BC030C4000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
696000730000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
5FC000188000
|
trusted library allocation
|
page read and write
|
||
696000408000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
76BC0476C000
|
trusted library allocation
|
page read and write
|
||
22C87749000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
33380200C000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
19EC00638000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
7930002A8000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
7D1001FF4000
|
trusted library allocation
|
page read and write
|
||
69600206C000
|
trusted library allocation
|
page read and write
|
||
696000B87000
|
trusted library allocation
|
page read and write
|
||
7D10009E4000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
368C0040C000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
6960009ED000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1358351F000
|
heap
|
page read and write
|
||
76BC03D6C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
696000620000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
324002044000
|
trusted library allocation
|
page read and write
|
||
333801C54000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
333800A7C000
|
trusted library allocation
|
page read and write
|
||
696001DF4000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
19EC01D90000
|
trusted library allocation
|
page read and write
|
||
19EC01E1C000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
333801EB4000
|
trusted library allocation
|
page read and write
|
||
19EC01088000
|
trusted library allocation
|
page read and write
|
||
19EC01F40000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
76BC02230000
|
trusted library allocation
|
page read and write
|
||
3F3800248000
|
trusted library allocation
|
page read and write
|
||
76BC04A04000
|
trusted library allocation
|
page read and write
|
||
19EC02204000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
324001EA0000
|
trusted library allocation
|
page read and write
|
||
3F3801804000
|
trusted library allocation
|
page read and write
|
||
6960009BC000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
19EC0202A000
|
trusted library allocation
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
3FB4002C8000
|
trusted library allocation
|
page read and write
|
||
2B00B661000
|
heap
|
page read and write
|
||
3588002C8000
|
trusted library allocation
|
page read and write
|
||
3240003C4000
|
trusted library allocation
|
page read and write
|
||
19EC01F50000
|
trusted library allocation
|
page read and write
|
||
76BC0405C000
|
trusted library allocation
|
page read and write
|
||
3240002D4000
|
trusted library allocation
|
page read and write
|
||
696000334000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
19EC01C90000
|
trusted library allocation
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
76BC0320C000
|
trusted library allocation
|
page read and write
|
||
324001D54000
|
trusted library allocation
|
page read and write
|
||
32400204C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB06F000
|
heap
|
page read and write
|
||
333800AC6000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
7D1001DA8000
|
trusted library allocation
|
page read and write
|
||
7D10007A4000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696000BD8000
|
trusted library allocation
|
page read and write
|
||
3240002DC000
|
trusted library allocation
|
page read and write
|
||
76BC04A04000
|
trusted library allocation
|
page read and write
|
||
79D800788000
|
trusted library allocation
|
page read and write
|
||
19EC01EBC000
|
trusted library allocation
|
page read and write
|
||
76BC030F4000
|
trusted library allocation
|
page read and write
|
||
2B00B62B000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
19EC01D28000
|
trusted library allocation
|
page read and write
|
||
3240008A4000
|
trusted library allocation
|
page read and write
|
||
19EC01DB0000
|
trusted library allocation
|
page read and write
|
||
696001DE4000
|
trusted library allocation
|
page read and write
|
||
69600238C000
|
trusted library allocation
|
page read and write
|
||
19EC002D4000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
333800ABC000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
2C18002CC000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
696000BF0000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
7D1001FE4000
|
trusted library allocation
|
page read and write
|
||
324000B94000
|
trusted library allocation
|
page read and write
|
||
19EC003D0000
|
trusted library allocation
|
page read and write
|
||
19EC01C70000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
7D10002CC000
|
trusted library allocation
|
page read and write
|
||
22C876EA000
|
heap
|
page read and write
|
||
333800620000
|
trusted library allocation
|
page read and write
|
||
324001CAC000
|
trusted library allocation
|
page read and write
|
||
696000BC8000
|
trusted library allocation
|
page read and write
|
||
333800A74000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
696001D64000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
324000788000
|
trusted library allocation
|
page read and write
|
||
22C87563000
|
heap
|
page read and write
|
||
3FB4002B8000
|
trusted library allocation
|
page read and write
|
||
25DE785C000
|
heap
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
1ED24A75000
|
heap
|
page read and write
|
||
696002046000
|
trusted library allocation
|
page read and write
|
||
696000E40000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333801D64000
|
trusted library allocation
|
page read and write
|
||
1EEAB03C000
|
heap
|
page read and write
|
||
22C8772B000
|
heap
|
page read and write
|
||
19EC01EAC000
|
trusted library allocation
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
3338009E4000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
19EC01F78000
|
trusted library allocation
|
page read and write
|
||
1ED24A74000
|
heap
|
page read and write
|
||
324000AA4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
696001DAC000
|
trusted library allocation
|
page read and write
|
||
696001F64000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
19EC01568000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
19EC0140C000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
7D1002044000
|
trusted library allocation
|
page read and write
|
||
333801DEC000
|
trusted library allocation
|
page read and write
|
||
324001EA8000
|
trusted library allocation
|
page read and write
|
||
76BC034E4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
696002118000
|
trusted library allocation
|
page read and write
|
||
7C8000244000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7FF7C9E08000
|
unkown
|
page readonly
|
||
22C87612000
|
heap
|
page read and write
|
||
3F38003A8000
|
trusted library allocation
|
page read and write
|
||
19EC00BA8000
|
trusted library allocation
|
page read and write
|
||
76BC02224000
|
trusted library allocation
|
page read and write
|
||
7D1001DE8000
|
trusted library allocation
|
page read and write
|
||
27964902000
|
heap
|
page read and write
|
||
79D800284000
|
trusted library allocation
|
page read and write
|
||
696000B89000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
324001D1C000
|
trusted library allocation
|
page read and write
|
||
696001FCC000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
76BC03E04000
|
trusted library allocation
|
page read and write
|
||
5FC00027C000
|
trusted library allocation
|
page read and write
|
||
333800654000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01DC8000
|
trusted library allocation
|
page read and write
|
||
324001D1C000
|
trusted library allocation
|
page read and write
|
||
3A3C00244000
|
direct allocation
|
page read and write
|
||
333800BD8000
|
trusted library allocation
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
19EC01D38000
|
trusted library allocation
|
page read and write
|
||
333801F80000
|
trusted library allocation
|
page read and write
|
||
4B08002CC000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
696001D9C000
|
trusted library allocation
|
page read and write
|
||
76BC03FDC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
324000BC4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
7D1001FE4000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
333801DB4000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
76BC03924000
|
trusted library allocation
|
page read and write
|
||
562C00338000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
135FD93B000
|
heap
|
page read and write
|
||
76BC03024000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01D60000
|
trusted library allocation
|
page read and write
|
||
696000EAC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
324001CD4000
|
trusted library allocation
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
76BC0316C000
|
trusted library allocation
|
page read and write
|
||
3588002B8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
76BC044D4000
|
trusted library allocation
|
page read and write
|
||
32400077C000
|
trusted library allocation
|
page read and write
|
||
333801204000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696000E28000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
19EC01DB8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC00E04000
|
trusted library allocation
|
page read and write
|
||
76BC044F0000
|
trusted library allocation
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
22C87601000
|
heap
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE7B000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
7D1001D70000
|
trusted library allocation
|
page read and write
|
||
333801DD4000
|
trusted library allocation
|
page read and write
|
||
624002EC000
|
direct allocation
|
page read and write
|
||
19EC003E8000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
135FD8E1000
|
heap
|
page read and write
|
||
22C8752C000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696001FF4000
|
trusted library allocation
|
page read and write
|
||
324000730000
|
trusted library allocation
|
page read and write
|
||
696001004000
|
trusted library allocation
|
page read and write
|
||
3F380072C000
|
trusted library allocation
|
page read and write
|
||
62400326000
|
direct allocation
|
page read and write
|
||
696000614000
|
trusted library allocation
|
page read and write
|
||
1ED24A6E000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
19EC02060000
|
trusted library allocation
|
page read and write
|
||
696001D5C000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
3F38003A8000
|
trusted library allocation
|
page read and write
|
||
696000AF8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
76BC038CC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
333801DCC000
|
trusted library allocation
|
page read and write
|
||
19EC0105C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C87559000
|
heap
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
69600028C000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
2A78002A4000
|
trusted library allocation
|
page read and write
|
||
7D1001D68000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
333800BC8000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
324001E34000
|
trusted library allocation
|
page read and write
|
||
76BC031C4000
|
trusted library allocation
|
page read and write
|
||
5FC000290000
|
trusted library allocation
|
page read and write
|
||
22C8788F000
|
heap
|
page read and write
|
||
696001C4C000
|
trusted library allocation
|
page read and write
|
||
3F380060C000
|
trusted library allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
5FC000138000
|
trusted library allocation
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
696001D14000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC01CF8000
|
trusted library allocation
|
page read and write
|
||
696001E98000
|
trusted library allocation
|
page read and write
|
||
76BC04050000
|
trusted library allocation
|
page read and write
|
||
696001D8C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
19EC0078C000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
7D1000A18000
|
trusted library allocation
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
13583402000
|
heap
|
page read and write
|
||
76BC03024000
|
trusted library allocation
|
page read and write
|
||
324000E04000
|
trusted library allocation
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
2754001CC000
|
trusted library allocation
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
33380207C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
19EC01CD0000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
333800A24000
|
trusted library allocation
|
page read and write
|
||
32400061C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
368C00338000
|
trusted library allocation
|
page read and write
|
||
19EC01D58000
|
trusted library allocation
|
page read and write
|
||
333801F48000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
7930002CC000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
19EC01FE8000
|
trusted library allocation
|
page read and write
|
||
324001D44000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
324001404000
|
trusted library allocation
|
page read and write
|
||
22C87663000
|
heap
|
page read and write
|
||
333800BB0000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
4948002B8000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696002178000
|
trusted library allocation
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
324000284000
|
trusted library allocation
|
page read and write
|
||
324001D14000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
333802074000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
324001C3C000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
22C87536000
|
heap
|
page read and write
|
||
1CF6FE28000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
333801DA4000
|
trusted library allocation
|
page read and write
|
||
7D1000770000
|
trusted library allocation
|
page read and write
|
||
2C1800294000
|
trusted library allocation
|
page read and write
|
||
696001DA4000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
3240009E6000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
76BC0366C000
|
trusted library allocation
|
page read and write
|
||
22C87561000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
1CF6FE66000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
19EC01078000
|
trusted library allocation
|
page read and write
|
||
1E34002D4000
|
trusted library allocation
|
page read and write
|
||
19EC009D4000
|
trusted library allocation
|
page read and write
|
||
696001D4C000
|
trusted library allocation
|
page read and write
|
||
333800334000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
696002090000
|
trusted library allocation
|
page read and write
|
||
333801D8C000
|
trusted library allocation
|
page read and write
|
||
324001E78000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
79D8003C4000
|
trusted library allocation
|
page read and write
|
||
22C8763D000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
696002054000
|
trusted library allocation
|
page read and write
|
||
69600207C000
|
trusted library allocation
|
page read and write
|
||
696001DDC000
|
trusted library allocation
|
page read and write
|
||
324001D84000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
333801DE4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
25DD1A2B000
|
heap
|
page read and write
|
||
696001E44000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
7D100033C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
324000348000
|
trusted library allocation
|
page read and write
|
||
19EC01E1C000
|
trusted library allocation
|
page read and write
|
||
562C0030C000
|
trusted library allocation
|
page read and write
|
||
4948002B8000
|
trusted library allocation
|
page read and write
|
||
3F3801A04000
|
trusted library allocation
|
page read and write
|
||
62400310000
|
direct allocation
|
page read and write
|
||
7D1000788000
|
trusted library allocation
|
page read and write
|
||
76BC02BB8000
|
trusted library allocation
|
page read and write
|
||
19EC01D68000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
76BC03254000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
19EC003C4000
|
trusted library allocation
|
page read and write
|
||
2C18002B8000
|
trusted library allocation
|
page read and write
|
||
333800334000
|
trusted library allocation
|
page read and write
|
||
696000B86000
|
trusted library allocation
|
page read and write
|
||
525400244000
|
direct allocation
|
page read and write
|
||
7D1001204000
|
trusted library allocation
|
page read and write
|
||
3F3801404000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
4948002C8000
|
trusted library allocation
|
page read and write
|
||
324002054000
|
trusted library allocation
|
page read and write
|
||
19EC00ABC000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
696001DAC000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
76BC04004000
|
trusted library allocation
|
page read and write
|
||
5FC000120000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696000B74000
|
trusted library allocation
|
page read and write
|
||
22C875FB000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
19EC01CD8000
|
trusted library allocation
|
page read and write
|
||
333801CA4000
|
trusted library allocation
|
page read and write
|
||
7D1001F24000
|
trusted library allocation
|
page read and write
|
||
76BC05204000
|
trusted library allocation
|
page read and write
|
||
324001D34000
|
trusted library allocation
|
page read and write
|
||
3338003E8000
|
trusted library allocation
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
696001E44000
|
trusted library allocation
|
page read and write
|
||
76BC030EC000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC031DC000
|
trusted library allocation
|
page read and write
|
||
696001E90000
|
trusted library allocation
|
page read and write
|
||
19EC01E9C000
|
trusted library allocation
|
page read and write
|
||
333801EA4000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
333801CCC000
|
trusted library allocation
|
page read and write
|
||
76BC031B8000
|
trusted library allocation
|
page read and write
|
||
7D100204C000
|
trusted library allocation
|
page read and write
|
||
447C00240000
|
trusted library allocation
|
page read and write
|
||
333801CD4000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
79D80061C000
|
trusted library allocation
|
page read and write
|
||
12F400298000
|
trusted library allocation
|
page read and write
|
||
324001CE4000
|
trusted library allocation
|
page read and write
|
||
79D8003D0000
|
trusted library allocation
|
page read and write
|
||
19EC002CC000
|
trusted library allocation
|
page read and write
|
||
696001D64000
|
trusted library allocation
|
page read and write
|
||
19EC02048000
|
trusted library allocation
|
page read and write
|
||
696000E04000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
275400190000
|
trusted library allocation
|
page read and write
|
||
135FD929000
|
heap
|
page read and write
|
||
3588002A8000
|
trusted library allocation
|
page read and write
|
||
76BC03624000
|
trusted library allocation
|
page read and write
|
||
19EC01098000
|
trusted library allocation
|
page read and write
|
||
696001F84000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
7D1001D38000
|
trusted library allocation
|
page read and write
|
||
79D801404000
|
trusted library allocation
|
page read and write
|
||
3F3800378000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
79D800624000
|
trusted library allocation
|
page read and write
|
||
324001F4C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
79D800638000
|
trusted library allocation
|
page read and write
|
||
275400184000
|
trusted library allocation
|
page read and write
|
||
19EC00B80000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
4948002B8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
696000624000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
333801F40000
|
trusted library allocation
|
page read and write
|
||
324001C74000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
333801D1C000
|
trusted library allocation
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801D74000
|
trusted library allocation
|
page read and write
|
||
6960002A0000
|
trusted library allocation
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
7D1000674000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
22C87666000
|
heap
|
page read and write
|
||
19EC01FE8000
|
trusted library allocation
|
page read and write
|
||
3F3800358000
|
trusted library allocation
|
page read and write
|
||
696002234000
|
trusted library allocation
|
page read and write
|
||
2B00B624000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
1CF6FE76000
|
heap
|
page read and write
|
||
7D100028C000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
333800A0C000
|
trusted library allocation
|
page read and write
|
||
7D1000770000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
324000B8C000
|
trusted library allocation
|
page read and write
|
||
79D8007A4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801D54000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
19EC00788000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
333801C84000
|
trusted library allocation
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
62400338000
|
direct allocation
|
page read and write
|
||
696001C7C000
|
trusted library allocation
|
page read and write
|
||
19EC00AA4000
|
trusted library allocation
|
page read and write
|
||
13583502000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
7930002CC000
|
trusted library allocation
|
page read and write
|
||
13583602000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
76BC03980000
|
trusted library allocation
|
page read and write
|
||
1ED24A6A000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
4948002CC000
|
trusted library allocation
|
page read and write
|
||
22C8B5EC000
|
heap
|
page read and write
|
||
333800A38000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333801E14000
|
trusted library allocation
|
page read and write
|
||
696002C0B000
|
trusted library allocation
|
page read and write
|
||
22C85C6A000
|
heap
|
page read and write
|
||
696001DE4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
19EC00B61000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
135FD92F000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
7D100203C000
|
trusted library allocation
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
696001CD4000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1EEAB06B000
|
heap
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
324002090000
|
trusted library allocation
|
page read and write
|
||
1CF6FE74000
|
heap
|
page read and write
|
||
333801D84000
|
trusted library allocation
|
page read and write
|
||
333800AD4000
|
trusted library allocation
|
page read and write
|
||
324001DB4000
|
trusted library allocation
|
page read and write
|
||
76BC03D6C000
|
trusted library allocation
|
page read and write
|
||
7D100074C000
|
trusted library allocation
|
page read and write
|
||
3F3800248000
|
trusted library allocation
|
page read and write
|
||
1CF6FE57000
|
heap
|
page read and write
|
||
2754001CC000
|
trusted library allocation
|
page read and write
|
||
19EC00A0C000
|
trusted library allocation
|
page read and write
|
||
696001D4C000
|
trusted library allocation
|
page read and write
|
||
696002324000
|
trusted library allocation
|
page read and write
|
||
19EC01DE0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
324002034000
|
trusted library allocation
|
page read and write
|
||
324001D64000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
22C87638000
|
heap
|
page read and write
|
||
696000718000
|
trusted library allocation
|
page read and write
|
||
76BC0405C000
|
trusted library allocation
|
page read and write
|
||
19EC00408000
|
trusted library allocation
|
page read and write
|
||
696002095000
|
trusted library allocation
|
page read and write
|
||
1CF6FE40000
|
heap
|
page read and write
|
||
333801C44000
|
trusted library allocation
|
page read and write
|
||
22C87559000
|
heap
|
page read and write
|
||
22C874B9000
|
heap
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
22C875F7000
|
heap
|
page read and write
|
||
19EC00348000
|
trusted library allocation
|
page read and write
|
||
22C87666000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
62400328000
|
direct allocation
|
page read and write
|
||
696000E1C000
|
trusted library allocation
|
page read and write
|
||
76BC034F4000
|
trusted library allocation
|
page read and write
|
||
1E3400298000
|
trusted library allocation
|
page read and write
|
||
696002064000
|
trusted library allocation
|
page read and write
|
||
333801EDC000
|
trusted library allocation
|
page read and write
|
||
2C18002C8000
|
trusted library allocation
|
page read and write
|
||
79D800624000
|
trusted library allocation
|
page read and write
|
||
3FB4002CC000
|
trusted library allocation
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
79D800730000
|
trusted library allocation
|
page read and write
|
||
793000294000
|
trusted library allocation
|
page read and write
|
||
696001C3C000
|
trusted library allocation
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC02AB5000
|
trusted library allocation
|
page read and write
|
||
696001F44000
|
trusted library allocation
|
page read and write
|
||
19EC00B90000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333802090000
|
trusted library allocation
|
page read and write
|
||
76BC04604000
|
trusted library allocation
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
76BC04804000
|
trusted library allocation
|
page read and write
|
||
79D80078C000
|
trusted library allocation
|
page read and write
|
||
696001D6C000
|
trusted library allocation
|
page read and write
|
||
324001D24000
|
trusted library allocation
|
page read and write
|
||
76BC03960000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
324002088000
|
trusted library allocation
|
page read and write
|
||
333800B44000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
135FD97A000
|
heap
|
page read and write
|
||
76BC03094000
|
trusted library allocation
|
page read and write
|
||
6960002CC000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
heap
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
19EC01F20000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
22C8772E000
|
heap
|
page read and write
|
||
4B08002B8000
|
trusted library allocation
|
page read and write
|
||
33380120C000
|
trusted library allocation
|
page read and write
|
||
19EC00828000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC03094000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
76BC03FDC000
|
trusted library allocation
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
3338009ED000
|
trusted library allocation
|
page read and write
|
||
3338002DC000
|
trusted library allocation
|
page read and write
|
||
69600061C000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
2754000FC000
|
trusted library allocation
|
page read and write
|
||
3338009D8000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
19EC0061C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
76BC03088000
|
trusted library allocation
|
page read and write
|
||
19EC01C80000
|
trusted library allocation
|
page read and write
|
||
62400321000
|
direct allocation
|
page read and write
|
||
32400078C000
|
trusted library allocation
|
page read and write
|
||
22C8772B000
|
heap
|
page read and write
|
||
22C87757000
|
heap
|
page read and write
|
||
76BC039E0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE3C000
|
heap
|
page read and write
|
||
333801EC4000
|
trusted library allocation
|
page read and write
|
||
76BC04050000
|
trusted library allocation
|
page read and write
|
||
368C00324000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
19EC014C4000
|
trusted library allocation
|
page read and write
|
||
358800280000
|
trusted library allocation
|
page read and write
|
||
6960007C0000
|
trusted library allocation
|
page read and write
|
||
19EC00B98000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
333801EEC000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
333802036000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
7FF7C99E1000
|
unkown
|
page readonly
|
||
5FC00027C000
|
trusted library allocation
|
page read and write
|
||
1ED24A7C000
|
heap
|
page read and write
|
||
696000E9C000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
76BC05004000
|
trusted library allocation
|
page read and write
|
||
6960006A0000
|
trusted library allocation
|
page read and write
|
||
7C8000290000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
19EC02A0B000
|
trusted library allocation
|
page read and write
|
||
4C18002A0000
|
trusted library allocation
|
page read and write
|
||
3240009DC000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
7D1002054000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
324002024000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
1CF6FE57000
|
heap
|
page read and write
|
||
696000E7C000
|
trusted library allocation
|
page read and write
|
||
79D800614000
|
trusted library allocation
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
1ED24A5F000
|
heap
|
page read and write
|
||
2B00B656000
|
heap
|
page read and write
|
||
19EC02058000
|
trusted library allocation
|
page read and write
|
||
19EC006AC000
|
trusted library allocation
|
page read and write
|
||
6960009E4000
|
trusted library allocation
|
page read and write
|
||
76BC02A95000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
19EC00718000
|
trusted library allocation
|
page read and write
|
||
76BC043C4000
|
trusted library allocation
|
page read and write
|
||
76BC043B8000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
22C87742000
|
heap
|
page read and write
|
||
19EC009DC000
|
trusted library allocation
|
page read and write
|
||
494800294000
|
trusted library allocation
|
page read and write
|
||
333801CD4000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696000624000
|
trusted library allocation
|
page read and write
|
||
1CF6FE73000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
76BC044E0000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
135FF702000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
333800A88000
|
trusted library allocation
|
page read and write
|
||
19EC01CE0000
|
trusted library allocation
|
page read and write
|
||
135FD944000
|
heap
|
page read and write
|
||
333801CC4000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
333800770000
|
trusted library allocation
|
page read and write
|
||
333802054000
|
trusted library allocation
|
page read and write
|
||
28100040000
|
trusted library allocation
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
333800684000
|
trusted library allocation
|
page read and write
|
||
76BC03230000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
333801FE0000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
76BC03054000
|
trusted library allocation
|
page read and write
|
||
333801C94000
|
trusted library allocation
|
page read and write
|
||
19EC01EE4000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
32400061C000
|
trusted library allocation
|
page read and write
|
||
3F380060C000
|
trusted library allocation
|
page read and write
|
||
324002088000
|
trusted library allocation
|
page read and write
|
||
22C876EB000
|
heap
|
page read and write
|
||
333801DCC000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
3338006AC000
|
trusted library allocation
|
page read and write
|
||
69600209C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
333800A54000
|
trusted library allocation
|
page read and write
|
||
19EC007A4000
|
trusted library allocation
|
page read and write
|
||
324000BF4000
|
trusted library allocation
|
page read and write
|
||
696001DA4000
|
trusted library allocation
|
page read and write
|
||
1ED24A6A000
|
heap
|
page read and write
|
||
76BC030EC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
2B00B665000
|
heap
|
page read and write
|
||
3F380036C000
|
trusted library allocation
|
page read and write
|
||
324000A18000
|
trusted library allocation
|
page read and write
|
||
25DE7360000
|
remote allocation
|
page read and write
|
||
333800ABC000
|
trusted library allocation
|
page read and write
|
||
22C874CE000
|
heap
|
page read and write
|
||
7D1000334000
|
trusted library allocation
|
page read and write
|
||
696001CAC000
|
trusted library allocation
|
page read and write
|
||
22C875AE000
|
heap
|
page read and write
|
||
69600202C000
|
trusted library allocation
|
page read and write
|
||
333800AEC000
|
trusted library allocation
|
page read and write
|
||
7930002C8000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
696001E68000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
7D1001D20000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
7D1001D88000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
3338009DA000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
19EC02089000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
2C18002A4000
|
trusted library allocation
|
page read and write
|
||
696001EF8000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
22C85C2C000
|
heap
|
page read and write
|
||
1ED24A6F000
|
heap
|
page read and write
|
||
1CF6FE6E000
|
heap
|
page read and write
|
||
33380205C000
|
trusted library allocation
|
page read and write
|
||
76BC03218000
|
trusted library allocation
|
page read and write
|
||
696000E54000
|
trusted library allocation
|
page read and write
|
||
6960003D0000
|
trusted library allocation
|
page read and write
|
||
6960006A0000
|
trusted library allocation
|
page read and write
|
||
135FD89B000
|
heap
|
page read and write
|
||
333800724000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
22C8BC01000
|
heap
|
page read and write
|
||
19EC00B68000
|
trusted library allocation
|
page read and write
|
||
22C875DB000
|
heap
|
page read and write
|
||
25DD14F0000
|
remote allocation
|
page read and write
|
||
1ED24A73000
|
heap
|
page read and write
|
||
7D1001DD0000
|
trusted library allocation
|
page read and write
|
||
324002054000
|
trusted library allocation
|
page read and write
|
||
33380077C000
|
trusted library allocation
|
page read and write
|
||
696000BC0000
|
trusted library allocation
|
page read and write
|
||
696000AAC000
|
trusted library allocation
|
page read and write
|
||
76BC047F0000
|
trusted library allocation
|
page read and write
|
||
33380031C000
|
trusted library allocation
|
page read and write
|
||
3FB4002A4000
|
trusted library allocation
|
page read and write
|
||
324001CC4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
3338002D4000
|
trusted library allocation
|
page read and write
|
||
32400204C000
|
trusted library allocation
|
page read and write
|
||
7D1002036000
|
trusted library allocation
|
page read and write
|
||
76BC02478000
|
trusted library allocation
|
page read and write
|
||
7D1000A8C000
|
trusted library allocation
|
page read and write
|
||
19EC01094000
|
trusted library allocation
|
page read and write
|
||
22C87561000
|
heap
|
page read and write
|
||
22C8B5E5000
|
heap
|
page read and write
|
||
1CF6FE6F000
|
heap
|
page read and write
|
||
333801FE8000
|
trusted library allocation
|
page read and write
|
||
7C8000314000
|
trusted library allocation
|
page read and write
|
||
19EC01C78000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
562C00324000
|
trusted library allocation
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
1EEAB06E000
|
heap
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
333801C1C000
|
trusted library allocation
|
page read and write
|
||
525400298000
|
direct allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1ED24A6D000
|
heap
|
page read and write
|
||
793000294000
|
trusted library allocation
|
page read and write
|
||
19EC00334000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1EEAB068000
|
heap
|
page read and write
|
||
3240003D0000
|
trusted library allocation
|
page read and write
|
||
22C874C7000
|
heap
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
22C874DD000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
76BC03930000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
324001DC4000
|
trusted library allocation
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
696001E34000
|
trusted library allocation
|
page read and write
|
||
696001E3C000
|
trusted library allocation
|
page read and write
|
||
4B08002C8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE0E000
|
heap
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C87536000
|
heap
|
page read and write
|
||
19EC01E3C000
|
trusted library allocation
|
page read and write
|
||
696001C2C000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
62400318000
|
direct allocation
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
3F38007A4000
|
trusted library allocation
|
page read and write
|
||
135FD978000
|
heap
|
page read and write
|
||
3F3801604000
|
trusted library allocation
|
page read and write
|
||
22C87645000
|
heap
|
page read and write
|
||
1EEAB026000
|
heap
|
page read and write
|
||
333801CAC000
|
trusted library allocation
|
page read and write
|
||
1ED24A5E000
|
heap
|
page read and write
|
||
3F3800340000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
33380205C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
333800B1C000
|
trusted library allocation
|
page read and write
|
||
1ED24A0A000
|
heap
|
page read and write
|
||
7D10006AC000
|
trusted library allocation
|
page read and write
|
||
76BC04E04000
|
trusted library allocation
|
page read and write
|
||
7D1001EF8000
|
trusted library allocation
|
page read and write
|
||
19EC01C98000
|
trusted library allocation
|
page read and write
|
||
76BC036A4000
|
trusted library allocation
|
page read and write
|
||
4948002A4000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
19EC01E14000
|
trusted library allocation
|
page read and write
|
||
22C8766B000
|
heap
|
page read and write
|
||
135FD970000
|
heap
|
page read and write
|
||
333801D24000
|
trusted library allocation
|
page read and write
|
||
7D1002026000
|
trusted library allocation
|
page read and write
|
||
19EC01C68000
|
trusted library allocation
|
page read and write
|
||
324001EE0000
|
trusted library allocation
|
page read and write
|
||
333801CB4000
|
trusted library allocation
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
27964902000
|
heap
|
page read and write
|
||
22C8BBF9000
|
heap
|
page read and write
|
||
19EC01CA8000
|
trusted library allocation
|
page read and write
|
||
696001DEC000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
7D100074C000
|
trusted library allocation
|
page read and write
|
||
6960007D8000
|
trusted library allocation
|
page read and write
|
||
3F3800384000
|
trusted library allocation
|
page read and write
|
||
696000824000
|
trusted library allocation
|
page read and write
|
||
696001E78000
|
trusted library allocation
|
page read and write
|
||
494800280000
|
trusted library allocation
|
page read and write
|
||
324000638000
|
trusted library allocation
|
page read and write
|
||
696000B90000
|
trusted library allocation
|
page read and write
|
||
19EC006AC000
|
trusted library allocation
|
page read and write
|
||
62400244000
|
direct allocation
|
page read and write
|
||
76BC04204000
|
trusted library allocation
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
19EC02068000
|
trusted library allocation
|
page read and write
|
||
696000EB4000
|
trusted library allocation
|
page read and write
|
||
4B08002CC000
|
trusted library allocation
|
page read and write
|
||
333801CF4000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
76BC03088000
|
trusted library allocation
|
page read and write
|
||
696001FF4000
|
trusted library allocation
|
page read and write
|
||
1EEAABE0000
|
remote allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
19EC01E7C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2C000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
696001CFC000
|
trusted library allocation
|
page read and write
|
||
6240031B000
|
direct allocation
|
page read and write
|
||
696001D44000
|
trusted library allocation
|
page read and write
|
||
19EC002DC000
|
trusted library allocation
|
page read and write
|
||
314800298000
|
trusted library allocation
|
page read and write
|
||
696001480000
|
trusted library allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
19EC0078C000
|
trusted library allocation
|
page read and write
|
||
7D1000684000
|
trusted library allocation
|
page read and write
|
||
1EEAB02C000
|
heap
|
page read and write
|
||
1ED24A0E000
|
heap
|
page read and write
|
||
19EC00BB0000
|
trusted library allocation
|
page read and write
|
||
135FD94E000
|
heap
|
page read and write
|
||
76BC03D4C000
|
trusted library allocation
|
page read and write
|
||
898002B4000
|
direct allocation
|
page read and write
|
||
76BC035F0000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
333802064000
|
trusted library allocation
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
1ED24A5F000
|
heap
|
page read and write
|
||
696000B87000
|
trusted library allocation
|
page read and write
|
||
324001D64000
|
trusted library allocation
|
page read and write
|
||
22C8785B000
|
heap
|
page read and write
|
||
333801F28000
|
trusted library allocation
|
page read and write
|
||
333800890000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
1CF6FE5E000
|
heap
|
page read and write
|
||
1CF6FE72000
|
heap
|
page read and write
|
||
5FC000134000
|
trusted library allocation
|
page read and write
|
||
32400061C000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
22C8B5E6000
|
heap
|
page read and write
|
||
7D1001F14000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
22C8764A000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
22C87601000
|
heap
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
76BC03694000
|
trusted library allocation
|
page read and write
|
||
3F3800C04000
|
trusted library allocation
|
page read and write
|
||
3A00000C000
|
trusted library allocation
|
page read and write
|
||
7D1001DB0000
|
trusted library allocation
|
page read and write
|
||
76BC02804000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
3240006AC000
|
trusted library allocation
|
page read and write
|
||
76BC030EC000
|
trusted library allocation
|
page read and write
|
||
324001F44000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
333801CDC000
|
trusted library allocation
|
page read and write
|
||
2A7800294000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
324001DA4000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
7930002C4000
|
trusted library allocation
|
page read and write
|
||
3F3800774000
|
trusted library allocation
|
page read and write
|
||
3588002C8000
|
trusted library allocation
|
page read and write
|
||
696001F5C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
79D800724000
|
trusted library allocation
|
page read and write
|
||
696001D44000
|
trusted library allocation
|
page read and write
|
||
333800BB0000
|
trusted library allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
76BC04470000
|
trusted library allocation
|
page read and write
|
||
76BC03504000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
19EC01688000
|
trusted library allocation
|
page read and write
|
||
19EC01054000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
3F380072C000
|
trusted library allocation
|
page read and write
|
||
62400338000
|
direct allocation
|
page read and write
|
||
333800AA4000
|
trusted library allocation
|
page read and write
|
||
79D8006A0000
|
trusted library allocation
|
page read and write
|
||
7D100206C000
|
trusted library allocation
|
page read and write
|
||
1EEAB082000
|
heap
|
page read and write
|
||
7D1002064000
|
trusted library allocation
|
page read and write
|
||
333802036000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
22C87610000
|
heap
|
page read and write
|
||
7D10008A4000
|
trusted library allocation
|
page read and write
|
||
22C875F6000
|
heap
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
7D1000818000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
7D1000AB0000
|
trusted library allocation
|
page read and write
|
||
22C87655000
|
heap
|
page read and write
|
||
4C18002F4000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
324001CEC000
|
trusted library allocation
|
page read and write
|
||
79D8002D4000
|
trusted library allocation
|
page read and write
|
||
22C874D1000
|
heap
|
page read and write
|
||
3F3801604000
|
trusted library allocation
|
page read and write
|
||
333802138000
|
trusted library allocation
|
page read and write
|
||
3148002D4000
|
trusted library allocation
|
page read and write
|
||
135FD94C000
|
heap
|
page read and write
|
||
333801FF0000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
135FD944000
|
heap
|
page read and write
|
||
135FD92A000
|
heap
|
page read and write
|
||
76BC03060000
|
trusted library allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
696002046000
|
trusted library allocation
|
page read and write
|
||
2C1800280000
|
trusted library allocation
|
page read and write
|
||
2C18002B8000
|
trusted library allocation
|
page read and write
|
||
79D8002A0000
|
trusted library allocation
|
page read and write
|
||
333801CE4000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
562C00358000
|
trusted library allocation
|
page read and write
|
||
324000BE4000
|
trusted library allocation
|
page read and write
|
||
368C00324000
|
trusted library allocation
|
page read and write
|
||
696001F3C000
|
trusted library allocation
|
page read and write
|
||
22C87536000
|
heap
|
page read and write
|
||
368C00358000
|
trusted library allocation
|
page read and write
|
||
79D800694000
|
trusted library allocation
|
page read and write
|
||
32400202E000
|
trusted library allocation
|
page read and write
|
||
1EEAB02B000
|
heap
|
page read and write
|
||
76BC02A64000
|
trusted library allocation
|
page read and write
|
||
333801FF0000
|
trusted library allocation
|
page read and write
|
||
76BC0363C000
|
trusted library allocation
|
page read and write
|
||
7D100060C000
|
trusted library allocation
|
page read and write
|
||
333801DDC000
|
trusted library allocation
|
page read and write
|
||
696002090000
|
trusted library allocation
|
page read and write
|
||
324000BCC000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
368C0032C000
|
trusted library allocation
|
page read and write
|
||
324000A88000
|
trusted library allocation
|
page read and write
|
||
324001C94000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
696001C84000
|
trusted library allocation
|
page read and write
|
||
333800B70000
|
trusted library allocation
|
page read and write
|
||
324001FBC000
|
trusted library allocation
|
page read and write
|
||
79D8002A0000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
69600074C000
|
trusted library allocation
|
page read and write
|
||
3F3800A04000
|
trusted library allocation
|
page read and write
|
||
22C87749000
|
heap
|
page read and write
|
||
333801DF4000
|
trusted library allocation
|
page read and write
|
||
76BC02C58000
|
trusted library allocation
|
page read and write
|
||
19EC01DA0000
|
trusted library allocation
|
page read and write
|
||
494800294000
|
trusted library allocation
|
page read and write
|
||
494800294000
|
trusted library allocation
|
page read and write
|
||
324002090000
|
trusted library allocation
|
page read and write
|
||
22C877FA000
|
heap
|
page read and write
|
||
6960020A0000
|
trusted library allocation
|
page read and write
|
||
76BC03094000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
19EC01FC0000
|
trusted library allocation
|
page read and write
|
||
333800B54000
|
trusted library allocation
|
page read and write
|
||
696000E78000
|
trusted library allocation
|
page read and write
|
||
19EC00A6C000
|
trusted library allocation
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
793000280000
|
trusted library allocation
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
696000B24000
|
trusted library allocation
|
page read and write
|
||
696000E6C000
|
trusted library allocation
|
page read and write
|
||
79D800ACC000
|
trusted library allocation
|
page read and write
|
||
333800B14000
|
trusted library allocation
|
page read and write
|
||
3588002A4000
|
trusted library allocation
|
page read and write
|
||
696000B87000
|
trusted library allocation
|
page read and write
|
||
696001CDC000
|
trusted library allocation
|
page read and write
|
||
696001C44000
|
trusted library allocation
|
page read and write
|
||
7D100201C000
|
trusted library allocation
|
page read and write
|
||
22C874C6000
|
heap
|
page read and write
|
||
7D1001FBC000
|
trusted library allocation
|
page read and write
|
||
13583511000
|
heap
|
page read and write
|
||
1ED24A25000
|
heap
|
page read and write
|
||
19EC01F68000
|
trusted library allocation
|
page read and write
|
||
333801C5C000
|
trusted library allocation
|
page read and write
|
||
1EEAB024000
|
heap
|
page read and write
|
||
333801CEC000
|
trusted library allocation
|
page read and write
|
||
7D100074C000
|
trusted library allocation
|
page read and write
|
||
793000294000
|
trusted library allocation
|
page read and write
|
||
19EC009EA000
|
trusted library allocation
|
page read and write
|
||
324001D2C000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
1CF6FE0B000
|
heap
|
page read and write
|
||
333800890000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
696000BE0000
|
trusted library allocation
|
page read and write
|
||
69600040C000
|
trusted library allocation
|
page read and write
|
||
76BC03030000
|
trusted library allocation
|
page read and write
|
||
19EC01500000
|
trusted library allocation
|
page read and write
|
||
333800C04000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
696001C6C000
|
trusted library allocation
|
page read and write
|
||
79D80074C000
|
trusted library allocation
|
page read and write
|
||
3F380034C000
|
trusted library allocation
|
page read and write
|
||
696001FDC000
|
trusted library allocation
|
page read and write
|
||
333800AC0000
|
trusted library allocation
|
page read and write
|
||
7D100060C000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
7D1001FE4000
|
trusted library allocation
|
page read and write
|
||
76BC04070000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
69600238C000
|
trusted library allocation
|
page read and write
|
||
696000B4C000
|
trusted library allocation
|
page read and write
|
||
22C85C5F000
|
heap
|
page read and write
|
||
447C0028C000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
76BC04090000
|
trusted library allocation
|
page read and write
|
||
4B08002A4000
|
trusted library allocation
|
page read and write
|
||
1EEAB034000
|
heap
|
page read and write
|
||
22C8762B000
|
heap
|
page read and write
|
||
324000730000
|
trusted library allocation
|
page read and write
|
||
1ED24A6B000
|
heap
|
page read and write
|
||
7D1001D48000
|
trusted library allocation
|
page read and write
|
||
4948002CC000
|
trusted library allocation
|
page read and write
|
||
1EEAB072000
|
heap
|
page read and write
|
||
33380074C000
|
trusted library allocation
|
page read and write
|
||
19EC00B28000
|
trusted library allocation
|
page read and write
|
||
333801D74000
|
trusted library allocation
|
page read and write
|
||
76BC03A04000
|
trusted library allocation
|
page read and write
|
||
76BC0443C000
|
trusted library allocation
|
page read and write
|
||
3F380078C000
|
trusted library allocation
|
page read and write
|
||
1EEAB034000
|
heap
|
page read and write
|
||
76BC03654000
|
trusted library allocation
|
page read and write
|
||
76BC0367C000
|
trusted library allocation
|
page read and write
|
||
7D1001D60000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
3809000
|
heap
|
page read and write
|
||
19EC01D38000
|
trusted library allocation
|
page read and write
|
||
696000AF8000
|
trusted library allocation
|
page read and write
|
||
22C8786B000
|
heap
|
page read and write
|
||
324000A2C000
|
trusted library allocation
|
page read and write
|
||
1ED24A7E000
|
heap
|
page read and write
|
||
324001DA4000
|
trusted library allocation
|
page read and write
|
||
696001D84000
|
trusted library allocation
|
page read and write
|
||
79D80078C000
|
trusted library allocation
|
page read and write
|
||
22C8784B000
|
heap
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
19EC00614000
|
trusted library allocation
|
page read and write
|
||
22C878F2000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7D1000A2C000
|
trusted library allocation
|
page read and write
|
||
1ED24A2C000
|
heap
|
page read and write
|
||
22C8785E000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
19EC00B61000
|
trusted library allocation
|
page read and write
|
||
3F3800334000
|
trusted library allocation
|
page read and write
|
||
4C18002D0000
|
trusted library allocation
|
page read and write
|
||
12F400240000
|
trusted library allocation
|
page read and write
|
||
1EEAB009000
|
heap
|
page read and write
|
||
19EC01070000
|
trusted library allocation
|
page read and write
|
||
76BC04404000
|
trusted library allocation
|
page read and write
|
||
19EC00AD4000
|
trusted library allocation
|
page read and write
|
||
324001CDC000
|
trusted library allocation
|
page read and write
|
||
1ED24A2B000
|
heap
|
page read and write
|
||
333800AC8000
|
trusted library allocation
|
page read and write
|
||
76BC03158000
|
trusted library allocation
|
page read and write
|
||
696001404000
|
trusted library allocation
|
page read and write
|
||
1ED24A28000
|
heap
|
page read and write
|
||
1ED24A24000
|
heap
|
page read and write
|
||
32400206C000
|
trusted library allocation
|
page read and write
|
||
19EC00B38000
|
trusted library allocation
|
page read and write
|
||
7D1000A0C000
|
trusted library allocation
|
page read and write
|
||
7D10002CC000
|
trusted library allocation
|
page read and write
|
||
324000A2C000
|
trusted library allocation
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
7C8000370000
|
trusted library allocation
|
page read and write
|
||
19EC03004000
|
trusted library allocation
|
page read and write
|
||
22C8773F000
|
heap
|
page read and write
|
||
3338008A0000
|
trusted library allocation
|
page read and write
|
||
324001DE4000
|
trusted library allocation
|
page read and write
|
||
19EC01E8C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
2A7800280000
|
trusted library allocation
|
page read and write
|
||
696000730000
|
trusted library allocation
|
page read and write
|
||
1CF6FE34000
|
heap
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
135FD980000
|
heap
|
page read and write
|
||
22C8B7ED000
|
heap
|
page read and write
|
||
324001FEC000
|
trusted library allocation
|
page read and write
|
||
22C875F5000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
333802095000
|
trusted library allocation
|
page read and write
|
||
69600074C000
|
trusted library allocation
|
page read and write
|
||
696000A14000
|
trusted library allocation
|
page read and write
|
||
19EC01084000
|
trusted library allocation
|
page read and write
|
||
76BC02230000
|
trusted library allocation
|
page read and write
|
||
333801C64000
|
trusted library allocation
|
page read and write
|
||
76BC044F0000
|
trusted library allocation
|
page read and write
|
||
1CF6FE7A000
|
heap
|
page read and write
|
||
22C8A80E000
|
heap
|
page read and write
|
||
76BC03D84000
|
trusted library allocation
|
page read and write
|
||
324001FC4000
|
trusted library allocation
|
page read and write
|
||
324001DEC000
|
trusted library allocation
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
333801D14000
|
trusted library allocation
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
7D1000A40000
|
trusted library allocation
|
page read and write
|
||
1ED24A57000
|
heap
|
page read and write
|
||
1EEAB010000
|
heap
|
page read and write
|
||
324000C04000
|
trusted library allocation
|
page read and write
|
||
696000634000
|
trusted library allocation
|
page read and write
|
||
7D1000624000
|
trusted library allocation
|
page read and write
|
||
1CF6FE09000
|
heap
|
page read and write
|
||
3F380030C000
|
trusted library allocation
|
page read and write
|
||
76BC031D0000
|
trusted library allocation
|
page read and write
|
||
79D80060C000
|
trusted library allocation
|
page read and write
|
||
7D1002044000
|
trusted library allocation
|
page read and write
|
||
7D1001CD8000
|
trusted library allocation
|
page read and write
|
||
696000B58000
|
trusted library allocation
|
page read and write
|
||
1CF6FE10000
|
heap
|
page read and write
|
||
19EC0220B000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
22C87647000
|
heap
|
page read and write
|
||
1CF6FE2B000
|
heap
|
page read and write
|
||
76BC03C9C000
|
trusted library allocation
|
page read and write
|
||
696001CF4000
|
trusted library allocation
|
page read and write
|
||
76BC03FC4000
|
trusted library allocation
|
page read and write
|
||
3F3801804000
|
trusted library allocation
|
page read and write
|
||
1ED24A66000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
530000
|
heap
|
page read and write
|
||
22C875DF000
|
heap
|
page read and write
|
||
76BC03604000
|
trusted library allocation
|
page read and write
|
||
696001CE4000
|
trusted library allocation
|
page read and write
|
||
358800294000
|
trusted library allocation
|
page read and write
|
||
3FB400280000
|
trusted library allocation
|
page read and write
|
||
3F3800390000
|
trusted library allocation
|
page read and write
|
||
19EC01D68000
|
trusted library allocation
|
page read and write
|
||
1ED24A34000
|
heap
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
22C875CE000
|
heap
|
page read and write
|
||
76BC0360C000
|
trusted library allocation
|
page read and write
|
||
1CF6FE25000
|
heap
|
page read and write
|
||
19EC01C3C000
|
trusted library allocation
|
page read and write
|
||
79D800828000
|
trusted library allocation
|
page read and write
|
||
22C8755D000
|
heap
|
page read and write
|
||
1EEAB025000
|
heap
|
page read and write
|
||
1EEAB00B000
|
heap
|
page read and write
|
||
696001E1C000
|
trusted library allocation
|
page read and write
|
||
19EC02094000
|
trusted library allocation
|
page read and write
|
||
7D1001D80000
|
trusted library allocation
|
page read and write
|
||
1ED24A09000
|
heap
|
page read and write
|
||
76BC03C90000
|
trusted library allocation
|
page read and write
|
||
696001D2C000
|
trusted library allocation
|
page read and write
|
||
19EC01DA8000
|
trusted library allocation
|
page read and write
|
||
1CF6FE24000
|
heap
|
page read and write
|
||
76BC04744000
|
trusted library allocation
|
page read and write
|
||
19EC01C44000
|
trusted library allocation
|
page read and write
|
||
696002074000
|
trusted library allocation
|
page read and write
|
||
19EC01F60000
|
trusted library allocation
|
page read and write
|
||
333801DBC000
|
trusted library allocation
|
page read and write
|
||
135FD928000
|
heap
|
page read and write
|
||
6960003E8000
|
trusted library allocation
|
page read and write
|
||
32400205C000
|
trusted library allocation
|
page read and write
|
||
76BC02434000
|
trusted library allocation
|
page read and write
|
||
696001EA0000
|
trusted library allocation
|
page read and write
|
||
4B0800280000
|
trusted library allocation
|
page read and write
|
||
3F3800804000
|
trusted library allocation
|
page read and write
|
||
1358351B000
|
heap
|
page read and write
|
||
333802194000
|
trusted library allocation
|
page read and write
|
||
22C87561000
|
heap
|
page read and write
|
||
696001E14000
|
trusted library allocation
|
page read and write
|
||
333802090000
|
trusted library allocation
|
page read and write
|
||
7930002A4000
|
trusted library allocation
|
page read and write
|
||
3F3801A04000
|
trusted library allocation
|
page read and write
|
||
696000B8F000
|
trusted library allocation
|
page read and write
|
||
3F380031C000
|
trusted library allocation
|
page read and write
|
||
696000BD8000
|
trusted library allocation
|
page read and write
|
||
22C85C6B000
|
heap
|
page read and write
|
||
19EC01404000
|
trusted library allocation
|
page read and write
|
||
79D8006AC000
|
trusted library allocation
|
page read and write
|
There are 4113 hidden memdumps, click here to show them.