IOC Report
Papago.Plus_1.0.0_x64-setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Papago.Plus_1.0.0_x64-setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\cn.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\en.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\id.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\ja.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\ko.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\tw.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\_up_\src\langs\vi.json
JSON data
dropped
C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Papago Plus\uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\1179d6f7-a5a8-4b83-a158-ab1b93d1778d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 231674
modified
C:\Users\user\AppData\Local\Temp\3a08e40f-6253-4bc6-a175-3866276b5b3f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\3e906415-5e5d-4450-8924-a21c8a139cf6.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\6913fb4f-0acc-4a77-a182-f127ba4214b5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\723ed2e5-e279-4260-bfd6-16077be302e5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\79f0c55f-2ec9-4c4f-95e3-520d2adeb157.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\87ef32e3-625c-4f23-ba36-4391be061d2d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\926c3fe6-6c40-49b3-b031-b4dfd3fe7b08.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\e0539ede-ea9e-42a9-82ef-23c404633c18.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\e7444031-c9f7-4064-9454-b49f06753b7f.tmp
PNG image data, 1072 x 291, 8-bit/color RGBA, non-interlaced
modified
C:\Users\user\AppData\Local\Temp\f9a551ef-7b07-473b-b561-4e46b83e812c.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\fdbe38b4-ffb3-482e-9551-abb941dd0d79.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2166350
modified
C:\Users\user\AppData\Local\Temp\nsk4D0F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 150 x 57 x 32, resolution 11811 x 11811 px/m, cbSize 34254, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 32, resolution 11811 x 11811 px/m, cbSize 206038, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp4D2F.tmp\nsis_tauri_utils.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\3da6f01e-d197-402c-a10c-a70bf235b487.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\4f6ca950-ef83-4833-99f6-b591cb361caf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\92345e15-afec-41dc-9f2d-e86126a4195d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\9e226e7f-94e2-4fdf-9042-6c07f0a602e0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\BrowserMetrics\BrowserMetrics-6704C468-1EE8.pma
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\47484a70-b49f-4c0b-ae51-e95f9913dd88.tmp
JSON data
modified
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\4862ee42-0f24-445c-908e-89912293dcea.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\6655691a-488e-4cbe-af4b-9a84450e1111.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\91e69a5c-0a3a-4f46-b708-b2a3e8f35565.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000001
ASCII text, with very long lines (16975)
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000002
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000003
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000004
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000005
ASCII text, with very long lines (57751)
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000006
Unicode text, UTF-8 text, with very long lines (65342), with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000007
Unicode text, UTF-8 text, with very long lines (65502), with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\f_000008
Unicode text, UTF-8 text, with very long lines (17318)
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\0bd958ffceadd47f_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\0e5deb4684d55dc3_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\113708608bfb0a61_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\11cb47d42fc2befe_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\18aec1929f1c1678_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\29cfe2c18c748826_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\2c6d278e8c6cb526_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\40f4b959219de741_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\46f3fc861737d24f_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\5b77cd7630c4f1cc_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\610dc6f461cc78ca_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\620fb405f7202701_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6ae4c7797c63ca43_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6d0e3171141dfceb_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\6f39ad8b1740b814_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\78d2ea91c56d1d68_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\7ba8005d902e503d_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\8e06c23a2c52c992_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\991c6c69e4718e61_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9c2a0b62fe40bc60_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9cee2c796f197867_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\9edbcbe2499b698e_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\a43f3c81ebd6f55d_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\c51be6f37a35bd1b_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\d634a54afeba8145_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\d68640305f1fb0dc_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\da7ecd3fa4f599d9_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\defc3d746e09cc02_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\fb1a55d8c34219d0_0
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF558455.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 13, cookie 0x8, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\0526e3e7-e3a4-4ce1-95cc-0e572c0d3a6a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\22ee898e-8444-411a-bcdc-2665de4d5979.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\2de52058-fa56-4d21-9121-2ad7d4bf02c9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\534d40eb-ded5-4603-a776-0a1a9398595e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\7605c362-49ca-419b-a5b1-72dea92247b0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\941a229a-ee05-4818-a661-c639a2da3715.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State~RF553829.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Network Persistent State~RF55d331.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\SCT Auditing Pending Reports~RF54ab79.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF54f777.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF552126.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Preferences~RF55bb44.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\da6b48dc-a4c0-4b54-af92-e3ed59bd400d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54a88b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54a8ba.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54cff9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF54faa3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF55226f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Local State~RF55b9cd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\c75cd8bb-f20c-4d1d-90b8-2bcdff84a29b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\cd22afcf-b58b-4290-8c5d-80dd48324229.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.papago-plus\EBWebView\d281619f-80e2-49f9-b7be-8995fc90df98.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Papago Plus.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 23 01:19:44 2024, mtime=Tue Oct 8 04:34:18 2024, atime=Mon Sep 23 01:19:44 2024, length=12311216, window=hide
dropped
C:\Users\user\Desktop\Papago Plus.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 23 01:19:44 2024, mtime=Tue Oct 8 04:34:29 2024, atime=Mon Sep 23 01:19:44 2024, length=12311216, window=hide
dropped
There are 202 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Papago.Plus_1.0.0_x64-setup.exe
"C:\Users\user\Desktop\Papago.Plus_1.0.0_x64-setup.exe"
C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe
"C:\Users\user\AppData\Local\Papago Plus\papago-plus.exe"
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=MojoIpcz --lang=en-GB --mojo-named-platform-channel-pipe=7816.7908.8323693247663805206
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\com.papago-plus\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\com.papago-plus\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ffdfb508e88,0x7ffdfb508e98,0x7ffdfb508ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1780 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --mojo-platform-channel-handle=2844 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --mojo-platform-channel-handle=3068 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5548653942 --mojo-platform-channel-handle=3316 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5550154672 --mojo-platform-channel-handle=3928 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5551248804 --mojo-platform-channel-handle=4104 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5552634586 --mojo-platform-channel-handle=4276 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5556940838 --mojo-platform-channel-handle=4684 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5559462037 --mojo-platform-channel-handle=5084 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5562238683 --mojo-platform-channel-handle=5236 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5564302324 --mojo-platform-channel-handle=5636 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5564872825 --mojo-platform-channel-handle=5764 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5565507872 --mojo-platform-channel-handle=5972 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5565959933 --mojo-platform-channel-handle=6328 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.papago-plus\EBWebView" --webview-exe-name=papago-plus.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1728360124248909 --launch-time-ticks=5567112456 --mojo-platform-channel-handle=6720 --field-trial-handle=1784,i,914866330101827378,2628499376099974977,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://account.papago-plus.com/signup/email?url=https%3A%2F%2Fpapago-plus.com
210.89.168.48
https://update.papago-plus.com/update/
unknown
https://account.papago-plus.com/_next/static/chunks/app/not-found.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://account.papago-plus.com/_next/static/css/cebd1a14e6c2fb8c.css
210.89.168.48
https://issuetracker.google.com/284462263
unknown
https://permanently-removed.invalid/chrome/blank.htmlhttps://permanently-removed.invalid/LogoutYxABs
unknown
https://docs.rs/getrandom#nodejs-es-module-supportcargo
unknown
http://tauri.localhostpA
unknown
https://account.papago-plus.com/_next/static/chunks/9964.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
https://anglebug.com/7714
unknown
https://account.papago-plus.com/_next/static/chunks/6dd5e7ea.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
https://www.microsoftnews.cn/
unknown
http://tauri.localhost/welcome
unknown
http://anglebug.com/6248
unknown
https://account.papago-plus.com/_next/static/css/7b51cb7d19f701b9.css
210.89.168.48
http://tauri.localhost/update-history
unknown
https://account.papago-plus.com/_next/static/chunks/app/error.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
http://tauri.localhost/update-check
unknown
http://anglebug.com/6929
unknown
https://github.com/tauri-apps/tauri/issues/8306)
unknown
http://tauri.localhostcontent-type:text/html
unknown
http://anglebug.com/5281
unknown
https://openjsf.org/
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLPretendardVariableWeightThinPretendardVariable-T
unknown
https://issuetracker.google.com/255411748
unknown
https://account.papago-plus.com/_next/static/media/icon-show-eye.fad13419.svg
210.89.168.48
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://account.papago-plus.com/signup?url=https%3A%2F%2Fpapago-plus.com%2F&_rsc=15y08
210.89.168.48
https://papago-plus.com
unknown
http://tauri.localhost/assets/PretendardVariable-CJuje-Rk.woff2P
unknown
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
unknown
https://issuetracker.google.com/161903006
unknown
https://account.papago-plus.com/_next/static/css/ab3914a7715d4111.css
210.89.168.48
https://account.papago-plus.com/_next/static/chunks/9463.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
https://account.papago-plus.com/_next/static/chunks/app/(root)/login/template.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
http://no.url.provided.local
unknown
https://github.com/webpack-contrib/style-loader#insertat)
unknown
http://underscorejs.org/LICENSE
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://update.papago-plus.com/
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://github.com/swsnr/gethostname.rs/issues
unknown
http://anglebug.com/7556
unknown
https://update.papago-plus.com/sentry
unknown
http://tauri.localhost/setting
unknown
http://tauri.localhost/update-check=
unknown
http://tauri.localhost/exit
unknown
http://html4/loose.dtd
unknown
https://account.papago-plus.com/_next/static/chunks/6199.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
https://npms.io/search?q=ponyfill.
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://tauri.localhost/settingPapago
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
http://tauri.localhost/assets/PretendardVariable-CJuje-Rk.woff2PP
unknown
http://tauri.localhost/update-history/
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://localhost.msn.com/
unknown
https://orioncactus.com/5)
unknown
https://papago-plus.com/login?url=https%3A%2F%2Fpapago-plus.com
61.247.192.225
https://account.papago-plus.com/_next/static/chunks/7664.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
http://anglebug.com/4384
unknown
http://localhost:1420/../disticons/128x128.pngicons/128x128
unknown
https://account.papago-plus.com/_next/static/chunks/8872.583237ab565a4f97fc6ae8c1f98088dcd98633a3.js
210.89.168.48
http://anglebug.com/3970
unknown
https://account.papago-plus.com/favicon.ico
210.89.168.48
http://www.sandoll.co.kr
unknown
http://.jpg
unknown
https://orioncactus.com/
unknown
https://urlpattern.spec.whatwg.org/)
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://account.papago-plus.com/signup/email?url=https%3A%2F%2Fpapago-plus.com%2F
210.89.168.48
http://anglebug.com/7760
unknown
http://json-schema.org/draft-07/schema#A
unknown
https://account.papago-plus.com/login?url=https%3A%2F%2Fpapago-plus.com
210.89.168.48
http://anglebug.com/5901
unknown
http://tauri.localhost/update-checkPapago
unknown
http://anglebug.com/3965
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
update.papago-plus.com.nheos.com
210.89.168.83
update.papago-plus.com
unknown

IPs

IP
Domain
Country
Malicious
210.89.168.83
update.papago-plus.com.nheos.com
Korea Republic of
162.159.61.3
chrome.cloudflare-dns.com
United States
61.247.192.225
unknown
Korea Republic of
210.89.168.48
unknown
Korea Republic of
204.79.197.239
unknown
United States
125.209.233.25
unknown
Korea Republic of
96.17.65.14
unknown
United States
127.0.0.1
unknown
unknown
172.64.41.3
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\papago-plus
URL Protocol
HKEY_CURRENT_USER_Classes\papago-plus
NULL
HKEY_CURRENT_USER_Classes\papago-plus\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\papago-plus\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\papago-plus\Papago Plus
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Papago Plus
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\papago-plus\Papago Plus
Installer Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
There are 38 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7D1001D50000
trusted library allocation
page read and write
19EC01678000
trusted library allocation
page read and write
324001F64000
trusted library allocation
page read and write
333800638000
trusted library allocation
page read and write
76BC03A18000
trusted library allocation
page read and write
19EC01044000
trusted library allocation
page read and write
696001F34000
trusted library allocation
page read and write
333801ECC000
trusted library allocation
page read and write
696001204000
trusted library allocation
page read and write
7D10003C4000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC01E5C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC01C0C000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
3338009E4000
trusted library allocation
page read and write
7D1002088000
trusted library allocation
page read and write
135FD92F000
heap
page read and write
324001F24000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
324001D8C000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
2B00B280000
remote allocation
page read and write
6960008A0000
trusted library allocation
page read and write
333802178000
trusted library allocation
page read and write
19EC01DF0000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
333801D9C000
trusted library allocation
page read and write
324001DBC000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
22C85C39000
heap
page read and write
22C87610000
heap
page read and write
550000
heap
page read and write
1CF6FE75000
heap
page read and write
76BC044A4000
trusted library allocation
page read and write
19EC01E3C000
trusted library allocation
page read and write
3338002A0000
trusted library allocation
page read and write
324001E14000
trusted library allocation
page read and write
71A8022D8000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
696000B6C000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
22C8785B000
heap
page read and write
135FD944000
heap
page read and write
19EC00B61000
trusted library allocation
page read and write
333801DBC000
trusted library allocation
page read and write
19EC0074C000
trusted library allocation
page read and write
19EC00634000
trusted library allocation
page read and write
33380061C000
trusted library allocation
page read and write
333800BE8000
trusted library allocation
page read and write
79D8002DC000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
22C8B7FC000
heap
page read and write
1ED24A2C000
heap
page read and write
1ED24A34000
heap
page read and write
7D100040C000
trusted library allocation
page read and write
22C87845000
heap
page read and write
135FD8A2000
heap
page read and write
19EC01064000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
27964902000
heap
page read and write
12F4002D8000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
69600205C000
trusted library allocation
page read and write
696001C1C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C87563000
heap
page read and write
1CF6FE25000
heap
page read and write
3F380030C000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
19EC01FE8000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
76BC03060000
trusted library allocation
page read and write
2A7800280000
trusted library allocation
page read and write
22C876CB000
heap
page read and write
19EC00BA0000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
19EC01CD8000
trusted library allocation
page read and write
1CF6FE74000
heap
page read and write
324001D5C000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
7D1002085000
trusted library allocation
page read and write
25DD1A2B000
heap
page read and write
56C000
heap
page read and write
1EEAB025000
heap
page read and write
19EC01F28000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
1CF6FE6A000
heap
page read and write
3148002D4000
trusted library allocation
page read and write
19EC00AC8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
22C876EB000
heap
page read and write
1EEAB02B000
heap
page read and write
22C8785E000
heap
page read and write
22C874CE000
heap
page read and write
19EC00AD4000
trusted library allocation
page read and write
324000614000
trusted library allocation
page read and write
79D800614000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
79D80040C000
trusted library allocation
page read and write
275400150000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001C8C000
trusted library allocation
page read and write
25DD1A2B000
heap
page read and write
33380206C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
333801D84000
trusted library allocation
page read and write
2C18002C8000
trusted library allocation
page read and write
22C8752C000
heap
page read and write
1EEAB02B000
heap
page read and write
1EEAB076000
heap
page read and write
324000BB4000
trusted library allocation
page read and write
19EC01204000
trusted library allocation
page read and write
19EC00BB0000
trusted library allocation
page read and write
333800B90000
trusted library allocation
page read and write
324000824000
trusted library allocation
page read and write
19EC0077C000
trusted library allocation
page read and write
7D1001FCC000
trusted library allocation
page read and write
696000614000
trusted library allocation
page read and write
19EC02040000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
696000348000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
696001EE8000
trusted library allocation
page read and write
324002054000
trusted library allocation
page read and write
3F38007A4000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
333802018000
trusted library allocation
page read and write
696001CFC000
trusted library allocation
page read and write
19EC0074C000
trusted library allocation
page read and write
135FD92A000
heap
page read and write
76BC03060000
trusted library allocation
page read and write
324001D84000
trusted library allocation
page read and write
3148002BC000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
696001F08000
trusted library allocation
page read and write
1ED24A73000
heap
page read and write
1CF6FE34000
heap
page read and write
5FC0003AC000
trusted library allocation
page read and write
696001D94000
trusted library allocation
page read and write
696002098000
trusted library allocation
page read and write
1ED24A57000
heap
page read and write
76BC03C9C000
trusted library allocation
page read and write
19AC00298000
direct allocation
page read and write
1CF6FE55000
heap
page read and write
696000E44000
trusted library allocation
page read and write
324000334000
trusted library allocation
page read and write
19EC00894000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
19EC01E74000
trusted library allocation
page read and write
7D10003E8000
trusted library allocation
page read and write
19EC003DC000
trusted library allocation
page read and write
7D100061C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
2A78002C8000
trusted library allocation
page read and write
69600033C000
trusted library allocation
page read and write
324000ABC000
trusted library allocation
page read and write
3FB4002B8000
trusted library allocation
page read and write
1CF6FE6E000
heap
page read and write
3F3800804000
trusted library allocation
page read and write
2754001E0000
trusted library allocation
page read and write
76BC03504000
trusted library allocation
page read and write
696001C9C000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
4B0800280000
trusted library allocation
page read and write
3F380030C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
6960021A4000
trusted library allocation
page read and write
69600238C000
trusted library allocation
page read and write
76BC03018000
trusted library allocation
page read and write
25DE7857000
heap
page read and write
59E000
heap
page read and write
9EC00240000
trusted library allocation
page read and write
76BC03194000
trusted library allocation
page read and write
3240009D4000
trusted library allocation
page read and write
79D800770000
trusted library allocation
page read and write
79D80080C000
trusted library allocation
page read and write
19EC00BB8000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
1EEAB03C000
heap
page read and write
324001D7C000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
19EC01204000
trusted library allocation
page read and write
33380074C000
trusted library allocation
page read and write
79D8003B8000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
3F3800340000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
76BC03510000
trusted library allocation
page read and write
3338009E4000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
333800A0C000
trusted library allocation
page read and write
76BC03510000
trusted library allocation
page read and write
4B0800280000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
22C8752C000
heap
page read and write
7D1002064000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
3F3800340000
trusted library allocation
page read and write
69600080C000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
3FB400280000
trusted library allocation
page read and write
7D1001E38000
trusted library allocation
page read and write
2A7800280000
trusted library allocation
page read and write
4948002C8000
trusted library allocation
page read and write
324001004000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
3148002D8000
trusted library allocation
page read and write
3CE000298000
direct allocation
page read and write
76BC027A8000
trusted library allocation
page read and write
3338006A0000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
3F3800744000
trusted library allocation
page read and write
3338021A8000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
1CF6FE3C000
heap
page read and write
1CF6FE2B000
heap
page read and write
79D800334000
trusted library allocation
page read and write
6960009C6000
trusted library allocation
page read and write
696000E38000
trusted library allocation
page read and write
3F38007BC000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
25DE7809000
heap
page read and write
19EC0107C000
trusted library allocation
page read and write
76BC044B0000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1CF6FE10000
heap
page read and write
333801404000
trusted library allocation
page read and write
76BC04418000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
7C800032C000
trusted library allocation
page read and write
32400208D000
trusted library allocation
page read and write
562C00408000
trusted library allocation
page read and write
494800294000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
6960020CE000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1EEAB024000
heap
page read and write
2A7800280000
trusted library allocation
page read and write
2A7800280000
trusted library allocation
page read and write
4B0800280000
trusted library allocation
page read and write
324000BD4000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
333801DB4000
trusted library allocation
page read and write
22C875DF000
heap
page read and write
22C874C7000
heap
page read and write
1EEAB02B000
heap
page read and write
76BC03074000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
22C874D1000
heap
page read and write
33380203C000
trusted library allocation
page read and write
1ED24A6E000
heap
page read and write
1CF6FE2B000
heap
page read and write
3F380072C000
trusted library allocation
page read and write
22C8773F000
heap
page read and write
76BC03C90000
trusted library allocation
page read and write
3240006AC000
trusted library allocation
page read and write
1CF6FE73000
heap
page read and write
7D1000634000
trusted library allocation
page read and write
19EC00A18000
trusted library allocation
page read and write
7D1001F2C000
trusted library allocation
page read and write
22C87638000
heap
page read and write
76BC04034000
trusted library allocation
page read and write
19EC01C88000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC01FC8000
trusted library allocation
page read and write
696000E4C000
trusted library allocation
page read and write
368C00338000
trusted library allocation
page read and write
4C0000
heap
page read and write
1ED24A25000
heap
page read and write
22C8772E000
heap
page read and write
3F3800804000
trusted library allocation
page read and write
7D1002054000
trusted library allocation
page read and write
696001E80000
trusted library allocation
page read and write
324001204000
trusted library allocation
page read and write
19EC014C4000
trusted library allocation
page read and write
7D1000284000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
3F3800334000
trusted library allocation
page read and write
76BC0316C000
trusted library allocation
page read and write
3148002D4000
trusted library allocation
page read and write
79D800614000
trusted library allocation
page read and write
6960008A0000
trusted library allocation
page read and write
2A78002C8000
trusted library allocation
page read and write
19EC00694000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
324000BAC000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
79D8002CC000
trusted library allocation
page read and write
1CF6FE6F000
heap
page read and write
333800614000
trusted library allocation
page read and write
696001E88000
trusted library allocation
page read and write
7D100078C000
trusted library allocation
page read and write
2A78002C8000
trusted library allocation
page read and write
273C000
heap
page read and write
1ED24A25000
heap
page read and write
1CF6FE55000
heap
page read and write
19EC01DC0000
trusted library allocation
page read and write
2C18002C8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
333801DE4000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
324000614000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
696000A14000
trusted library allocation
page read and write
333802046000
trusted library allocation
page read and write
7D10002A0000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
3F3800744000
trusted library allocation
page read and write
19EC0028C000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
7C8000344000
trusted library allocation
page read and write
22C8B70C000
heap
page read and write
25DD1A09000
heap
page read and write
368C00240000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
76BC03A18000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696000334000
trusted library allocation
page read and write
1CF6FE0C000
heap
page read and write
3F380066C000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
22C876B9000
heap
page read and write
19EC01FE8000
trusted library allocation
page read and write
33380078C000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
20F4000
heap
page read and write
76BC04C04000
trusted library allocation
page read and write
79D80031C000
trusted library allocation
page read and write
324001C5C000
trusted library allocation
page read and write
22C8753D000
heap
page read and write
696000E34000
trusted library allocation
page read and write
22C875F5000
heap
page read and write
22C875CE000
heap
page read and write
1EEAB02B000
heap
page read and write
76BC044BC000
trusted library allocation
page read and write
324001DC4000
trusted library allocation
page read and write
2A78002A4000
trusted library allocation
page read and write
314E000
stack
page read and write
79D8003C4000
trusted library allocation
page read and write
696000AE0000
trusted library allocation
page read and write
324001EE8000
trusted library allocation
page read and write
76BC038E0000
trusted library allocation
page read and write
69600100B000
trusted library allocation
page read and write
7D10009F0000
trusted library allocation
page read and write
22C87900000
heap
page read and write
32400202E000
trusted library allocation
page read and write
324001F2C000
trusted library allocation
page read and write
696001E0C000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
333800A18000
trusted library allocation
page read and write
7D1002080000
trusted library allocation
page read and write
19EC00B4C000
trusted library allocation
page read and write
3FB400280000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
2A7800280000
trusted library allocation
page read and write
22C876EB000
heap
page read and write
1CF6FE2B000
heap
page read and write
2A78002C8000
trusted library allocation
page read and write
696000E90000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
324001D9C000
trusted library allocation
page read and write
76BC0396C000
trusted library allocation
page read and write
2A78002CC000
trusted library allocation
page read and write
19EC00724000
trusted library allocation
page read and write
333800AC3000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696001F24000
trusted library allocation
page read and write
12F4002D4000
trusted library allocation
page read and write
76BC0320C000
trusted library allocation
page read and write
19EC0208C000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
2C18002C8000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
3338007D8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
22C87563000
heap
page read and write
19EC01CF0000
trusted library allocation
page read and write
76BC0480C000
trusted library allocation
page read and write
22C875F6000
heap
page read and write
7D1001DC8000
trusted library allocation
page read and write
458000
unkown
page readonly
696000E3C000
trusted library allocation
page read and write
3338003D0000
trusted library allocation
page read and write
324000894000
trusted library allocation
page read and write
696000E64000
trusted library allocation
page read and write
324001ED0000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
333801D1C000
trusted library allocation
page read and write
696002036000
trusted library allocation
page read and write
76BC039E0000
trusted library allocation
page read and write
3F3801004000
trusted library allocation
page read and write
1ED24A09000
heap
page read and write
79D800284000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696000638000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
696000890000
trusted library allocation
page read and write
19EC0033C000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
1CF6FE25000
heap
page read and write
3A3C00298000
direct allocation
page read and write
696000724000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
3338003D0000
trusted library allocation
page read and write
6960022B4000
trusted library allocation
page read and write
76BC03624000
trusted library allocation
page read and write
3338007A4000
trusted library allocation
page read and write
696001E3C000
trusted library allocation
page read and write
696001EB8000
trusted library allocation
page read and write
19EC01F30000
trusted library allocation
page read and write
333800A4C000
trusted library allocation
page read and write
333802098000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1EEAB02B000
heap
page read and write
22C87663000
heap
page read and write
76BC03908000
trusted library allocation
page read and write
19EC00BE8000
trusted library allocation
page read and write
3F38007DC000
trusted library allocation
page read and write
19EC00B3C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
79D800AB4000
trusted library allocation
page read and write
12F4002BC000
trusted library allocation
page read and write
19EC00B5F000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
7D1000730000
trusted library allocation
page read and write
333801E74000
trusted library allocation
page read and write
3FB4002C8000
trusted library allocation
page read and write
279649B4000
heap
page read and write
19EC01D20000
trusted library allocation
page read and write
19EC01D80000
trusted library allocation
page read and write
19EC01FF8000
trusted library allocation
page read and write
76BC03D84000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333801D6C000
trusted library allocation
page read and write
333800B88000
trusted library allocation
page read and write
22C87638000
heap
page read and write
25DE782B000
heap
page read and write
1CF6FE3C000
heap
page read and write
333802064000
trusted library allocation
page read and write
7D1000730000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
6960009E4000
trusted library allocation
page read and write
76BC0405C000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
1ED24A2C000
heap
page read and write
1EEAB024000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC00B44000
trusted library allocation
page read and write
7D1001D28000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
2C18002CC000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
3F38002A4000
trusted library allocation
page read and write
22C8B7FE000
heap
page read and write
1ED24A6D000
heap
page read and write
324000284000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
22C8785B000
heap
page read and write
135FD93B000
heap
page read and write
13583511000
heap
page read and write
19EC0080C000
trusted library allocation
page read and write
76BC03D84000
trusted library allocation
page read and write
1E34002D4000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333801FD8000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
76BC03230000
trusted library allocation
page read and write
696002036000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
358800294000
trusted library allocation
page read and write
1EEAB079000
heap
page read and write
76BC0363C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
19EC0101C000
trusted library allocation
page read and write
19EC01DC0000
trusted library allocation
page read and write
6960002DC000
trusted library allocation
page read and write
324000674000
trusted library allocation
page read and write
3240002DC000
trusted library allocation
page read and write
69600205C000
trusted library allocation
page read and write
562C00240000
trusted library allocation
page read and write
324001C6C000
trusted library allocation
page read and write
19EC02E04000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333801DC4000
trusted library allocation
page read and write
76BC02CB8000
trusted library allocation
page read and write
3338002DC000
trusted library allocation
page read and write
333802095000
trusted library allocation
page read and write
4B08002C8000
trusted library allocation
page read and write
19EC01D70000
trusted library allocation
page read and write
79D800334000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
19EC0103C000
trusted library allocation
page read and write
324001CF4000
trusted library allocation
page read and write
135FD92F000
heap
page read and write
7D1000334000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
76BC0300C000
trusted library allocation
page read and write
19EC01F78000
trusted library allocation
page read and write
19EC00A38000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
3FB4002B8000
trusted library allocation
page read and write
696001E44000
trusted library allocation
page read and write
19EC01DD8000
trusted library allocation
page read and write
1ED24A09000
heap
page read and write
3148002BC000
trusted library allocation
page read and write
22C87742000
heap
page read and write
530000
heap
page read and write
333801C24000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
333801D24000
trusted library allocation
page read and write
33380204C000
trusted library allocation
page read and write
324001F5C000
trusted library allocation
page read and write
333801D2C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
7D1001D18000
trusted library allocation
page read and write
696003204000
trusted library allocation
page read and write
4FF000
heap
page read and write
333800788000
trusted library allocation
page read and write
696000B64000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
333801C2C000
trusted library allocation
page read and write
79D80033C000
trusted library allocation
page read and write
696003004000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
696000AEA000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
135FD8A0000
heap
page read and write
1ED24A2B000
heap
page read and write
22C87726000
heap
page read and write
7D100061C000
trusted library allocation
page read and write
324000620000
trusted library allocation
page read and write
76BC031B8000
trusted library allocation
page read and write
696000B60000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
696001DB4000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
696001D74000
trusted library allocation
page read and write
333800674000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
1EEAB02B000
heap
page read and write
324001CD4000
trusted library allocation
page read and write
2A78002A4000
trusted library allocation
page read and write
3338007F0000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
1CF6FE62000
heap
page read and write
7D1000AC8000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
7D1000788000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
76BC03C04000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
1CF6FE34000
heap
page read and write
1ED24A09000
heap
page read and write
324001DCC000
trusted library allocation
page read and write
696001EF0000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
7D1000ABC000
trusted library allocation
page read and write
79D800334000
trusted library allocation
page read and write
324001C64000
trusted library allocation
page read and write
7D10006A0000
trusted library allocation
page read and write
19EC00B78000
trusted library allocation
page read and write
19EC01CC0000
trusted library allocation
page read and write
76BC027B8000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
19EC01D58000
trusted library allocation
page read and write
19EC0200C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
324001D4C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
32400204C000
trusted library allocation
page read and write
333800834000
trusted library allocation
page read and write
696000E94000
trusted library allocation
page read and write
19EC009D4000
trusted library allocation
page read and write
3588002B8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
32400201C000
trusted library allocation
page read and write
76BC039D4000
trusted library allocation
page read and write
4B08002A8000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
1EEAB009000
heap
page read and write
333800718000
trusted library allocation
page read and write
7D1001FF4000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
22C87538000
heap
page read and write
427000
unkown
page read and write
6960006AC000
trusted library allocation
page read and write
333800284000
trusted library allocation
page read and write
76BC0366C000
trusted library allocation
page read and write
696001E2C000
trusted library allocation
page read and write
3F3800744000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1EEAB02B000
heap
page read and write
696001C0C000
trusted library allocation
page read and write
22C874D7000
heap
page read and write
62400320000
direct allocation
page read and write
76BC03FE4000
trusted library allocation
page read and write
324001FEC000
trusted library allocation
page read and write
2C18002A4000
trusted library allocation
page read and write
76BC031C4000
trusted library allocation
page read and write
135FD93B000
heap
page read and write
19EC01060000
trusted library allocation
page read and write
2754001B8000
trusted library allocation
page read and write
7D10003C4000
trusted library allocation
page read and write
333800694000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
135FD93B000
heap
page read and write
19EC01D28000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
1CF6FE66000
heap
page read and write
7D1001CC4000
trusted library allocation
page read and write
1ED24A25000
heap
page read and write
324001D24000
trusted library allocation
page read and write
3338009EC000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC00B61000
trusted library allocation
page read and write
32400028C000
trusted library allocation
page read and write
19EC00624000
trusted library allocation
page read and write
22C87563000
heap
page read and write
324001D74000
trusted library allocation
page read and write
19EC009D4000
trusted library allocation
page read and write
7D1002036000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
3810000
heap
page read and write
2A78002A4000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC01D08000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
19EC00C04000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
19AC00244000
direct allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB009000
heap
page read and write
1CF6FE24000
heap
page read and write
76BC03088000
trusted library allocation
page read and write
76BC03924000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
624002EC000
direct allocation
page read and write
696000BA0000
trusted library allocation
page read and write
135FD928000
heap
page read and write
1CF6FE25000
heap
page read and write
5A1000
heap
page read and write
76BC0363C000
trusted library allocation
page read and write
696000E68000
trusted library allocation
page read and write
249E000
stack
page read and write
324000A18000
trusted library allocation
page read and write
22C87606000
heap
page read and write
333800634000
trusted library allocation
page read and write
6960009E4000
trusted library allocation
page read and write
22C8752C000
heap
page read and write
13583402000
heap
page read and write
333801D94000
trusted library allocation
page read and write
19EC00B5F000
trusted library allocation
page read and write
333800AB0000
trusted library allocation
page read and write
135FD929000
heap
page read and write
3F3800C04000
trusted library allocation
page read and write
333801C14000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
1CF6FE24000
heap
page read and write
2C18002A4000
trusted library allocation
page read and write
59E000
heap
page read and write
430000
unkown
page read and write
2C18002A4000
trusted library allocation
page read and write
3CE000244000
direct allocation
page read and write
696000AE2000
trusted library allocation
page read and write
76BC03930000
trusted library allocation
page read and write
696000AEC000
trusted library allocation
page read and write
3338009E4000
trusted library allocation
page read and write
76BC03970000
trusted library allocation
page read and write
19EC01C58000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
333800B98000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
22C87601000
heap
page read and write
12F4002D4000
trusted library allocation
page read and write
408000
unkown
page readonly
22C8774E000
heap
page read and write
79D80074C000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
22C876F7000
heap
page read and write
6960009EC000
trusted library allocation
page read and write
7D1001D78000
trusted library allocation
page read and write
1CF6FE57000
heap
page read and write
696000694000
trusted library allocation
page read and write
696000ABC000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
2480000C000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
76BC02434000
trusted library allocation
page read and write
1EEAB077000
heap
page read and write
2B900040000
trusted library allocation
page read and write
1ED24A79000
heap
page read and write
19EC008A4000
trusted library allocation
page read and write
12F4002D4000
trusted library allocation
page read and write
76BC03654000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
2FC5000
heap
page read and write
1CF6FE0F000
heap
page read and write
22C8760F000
heap
page read and write
333802098000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
3F380030C000
trusted library allocation
page read and write
19EC01FB8000
trusted library allocation
page read and write
22C87854000
heap
page read and write
22C8755D000
heap
page read and write
1EEAB010000
heap
page read and write
76BC03194000
trusted library allocation
page read and write
696000E80000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
19EC00614000
trusted library allocation
page read and write
324001F34000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
7D100204C000
trusted library allocation
page read and write
22C87559000
heap
page read and write
7D100031C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
22C876EB000
heap
page read and write
76BC03924000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
76BC03504000
trusted library allocation
page read and write
324001EF0000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
5FC000134000
trusted library allocation
page read and write
3240002A0000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
3F3800328000
trusted library allocation
page read and write
3240002A0000
trusted library allocation
page read and write
696002324000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
7D1001DC0000
trusted library allocation
page read and write
7C8000344000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
19EC00AC6000
trusted library allocation
page read and write
76BC03218000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1EEAB02B000
heap
page read and write
1CF6FE0A000
heap
page read and write
1CF6FE24000
heap
page read and write
19EC01D48000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1ED24A2B000
heap
page read and write
79D800674000
trusted library allocation
page read and write
333801D3C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE70000
heap
page read and write
7D1000334000
trusted library allocation
page read and write
324001E0C000
trusted library allocation
page read and write
368C0032C000
trusted library allocation
page read and write
1ED24A79000
heap
page read and write
22C877CE000
heap
page read and write
76BC03060000
trusted library allocation
page read and write
19EC02014000
trusted library allocation
page read and write
19EC01048000
trusted library allocation
page read and write
36BE000
stack
page read and write
1EEAB02B000
heap
page read and write
19EC0061C000
trusted library allocation
page read and write
696000A40000
trusted library allocation
page read and write
76BC02224000
trusted library allocation
page read and write
7D1001FE4000
trusted library allocation
page read and write
7D1001F1C000
trusted library allocation
page read and write
22C8773F000
heap
page read and write
696000614000
trusted library allocation
page read and write
3F380036C000
trusted library allocation
page read and write
696001D7C000
trusted library allocation
page read and write
447C002A0000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
324001DAC000
trusted library allocation
page read and write
333800BA8000
trusted library allocation
page read and write
333801DF4000
trusted library allocation
page read and write
19EC00334000
trusted library allocation
page read and write
12F4002C8000
trusted library allocation
page read and write
76BC0316C000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
22C8786B000
heap
page read and write
19EC01CF8000
trusted library allocation
page read and write
1ED24A66000
heap
page read and write
7FF7C9F41000
unkown
page readonly
135FD92F000
heap
page read and write
3240009F0000
trusted library allocation
page read and write
1ED24A6E000
heap
page read and write
19EC01EC4000
trusted library allocation
page read and write
76BC03E04000
trusted library allocation
page read and write
324001F1C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
696000E50000
trusted library allocation
page read and write
19EC01FD8000
trusted library allocation
page read and write
696001DD4000
trusted library allocation
page read and write
333802180000
trusted library allocation
page read and write
3F38007A4000
trusted library allocation
page read and write
19EC02084000
trusted library allocation
page read and write
19EC01030000
trusted library allocation
page read and write
3338009ED000
trusted library allocation
page read and write
76BC02754000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
12F400298000
trusted library allocation
page read and write
3F3801A04000
trusted library allocation
page read and write
76BC039EC000
trusted library allocation
page read and write
19EC00894000
trusted library allocation
page read and write
1ED24A0E000
heap
page read and write
19EC003B8000
trusted library allocation
page read and write
76BC03194000
trusted library allocation
page read and write
7D1002026000
trusted library allocation
page read and write
333800A38000
trusted library allocation
page read and write
333802024000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
333801D44000
trusted library allocation
page read and write
333801EFC000
trusted library allocation
page read and write
19EC003B8000
trusted library allocation
page read and write
333800348000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1ED24A76000
heap
page read and write
1EEAB024000
heap
page read and write
22C8785B000
heap
page read and write
324001D54000
trusted library allocation
page read and write
333801F04000
trusted library allocation
page read and write
696001D9C000
trusted library allocation
page read and write
333801D5C000
trusted library allocation
page read and write
553000
heap
page read and write
76BC035E5000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
358800280000
trusted library allocation
page read and write
2A78002CC000
trusted library allocation
page read and write
696001F6C000
trusted library allocation
page read and write
562C0032C000
trusted library allocation
page read and write
324000BB4000
trusted library allocation
page read and write
324001F00000
trusted library allocation
page read and write
32400080C000
trusted library allocation
page read and write
19EC02018000
trusted library allocation
page read and write
76BC0360C000
trusted library allocation
page read and write
135FD929000
heap
page read and write
19EC00E0B000
trusted library allocation
page read and write
2AEF000
heap
page read and write
22C8755D000
heap
page read and write
1EEAB03C000
heap
page read and write
1ED24A6E000
heap
page read and write
7D1000AA4000
trusted library allocation
page read and write
3240003DC000
trusted library allocation
page read and write
7930002B8000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
5FC000114000
trusted library allocation
page read and write
1CF6FE62000
heap
page read and write
333801C3C000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
910000
heap
page read and write
3F3800340000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
333801F50000
trusted library allocation
page read and write
696000A2C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
22C876F7000
heap
page read and write
3FB4002A8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
76BC03074000
trusted library allocation
page read and write
4B0800294000
trusted library allocation
page read and write
324001E70000
trusted library allocation
page read and write
1E34002D4000
trusted library allocation
page read and write
76BC0363C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
494800294000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
7D100061C000
trusted library allocation
page read and write
22C878FB000
heap
page read and write
1CF6FE10000
heap
page read and write
22C87854000
heap
page read and write
333800BA0000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
324001C84000
trusted library allocation
page read and write
33380033C000
trusted library allocation
page read and write
76BC04E04000
trusted library allocation
page read and write
4B08002C8000
trusted library allocation
page read and write
3481000
heap
page read and write
7D10003B8000
trusted library allocation
page read and write
135FD96C000
heap
page read and write
1CF6FE2B000
heap
page read and write
22C85C6B000
heap
page read and write
76BC04004000
trusted library allocation
page read and write
19EC02048000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
3FB400294000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
333801C9C000
trusted library allocation
page read and write
3F3800328000
trusted library allocation
page read and write
333801F20000
trusted library allocation
page read and write
3FB400294000
trusted library allocation
page read and write
7D1000894000
trusted library allocation
page read and write
19EC00B5F000
trusted library allocation
page read and write
1ED24A3C000
heap
page read and write
3F380060C000
trusted library allocation
page read and write
76BC03C04000
trusted library allocation
page read and write
333800B5F000
trusted library allocation
page read and write
33380080C000
trusted library allocation
page read and write
19EC00674000
trusted library allocation
page read and write
333800A6C000
trusted library allocation
page read and write
19EC00684000
trusted library allocation
page read and write
2C1800294000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
1ED24A25000
heap
page read and write
422000
unkown
page read and write
696000EA0000
trusted library allocation
page read and write
333801EE4000
trusted library allocation
page read and write
19EC00A24000
trusted library allocation
page read and write
19EC01C14000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
324000A0C000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
333800A98000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
76BC027A8000
trusted library allocation
page read and write
1ED24A08000
heap
page read and write
793000280000
trusted library allocation
page read and write
19EC01D90000
trusted library allocation
page read and write
3588002A4000
trusted library allocation
page read and write
324001D5C000
trusted library allocation
page read and write
22C8761E000
heap
page read and write
696000E60000
trusted library allocation
page read and write
19EC0104C000
trusted library allocation
page read and write
7D1000730000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
696002064000
trusted library allocation
page read and write
19EC007F0000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
32400202E000
trusted library allocation
page read and write
33380060C000
trusted library allocation
page read and write
333800B4C000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
696002024000
trusted library allocation
page read and write
22C875F7000
heap
page read and write
1EEAB009000
heap
page read and write
19EC00730000
trusted library allocation
page read and write
2FC0000
heap
page read and write
135FD980000
heap
page read and write
1CF6FE10000
heap
page read and write
135FD94C000
heap
page read and write
3F3800364000
trusted library allocation
page read and write
1CF6FE6E000
heap
page read and write
1E34002BC000
trusted library allocation
page read and write
324000AB0000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
696002C0B000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
6960002DC000
trusted library allocation
page read and write
1ED24A81000
heap
page read and write
696001C34000
trusted library allocation
page read and write
3F38007D8000
trusted library allocation
page read and write
79D800788000
trusted library allocation
page read and write
76BC03554000
trusted library allocation
page read and write
19EC01C24000
trusted library allocation
page read and write
696001470000
trusted library allocation
page read and write
333801F78000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
33380074C000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
22C874D7000
heap
page read and write
3F380034C000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1EEAB02B000
heap
page read and write
333801FF0000
trusted library allocation
page read and write
79D80060C000
trusted library allocation
page read and write
76BC0320C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC00BB0000
trusted library allocation
page read and write
69600031C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
333800BB0000
trusted library allocation
page read and write
19EC01D30000
trusted library allocation
page read and write
2A78002CC000
trusted library allocation
page read and write
324001F7C000
trusted library allocation
page read and write
7D1001FE4000
trusted library allocation
page read and write
25DE782B000
heap
page read and write
32400074C000
trusted library allocation
page read and write
7D1000ABC000
trusted library allocation
page read and write
324000A98000
trusted library allocation
page read and write
1CF6FE7F000
heap
page read and write
1EEAB057000
heap
page read and write
447C0028C000
trusted library allocation
page read and write
19EC02090000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
5AC000
heap
page read and write
79D8003DC000
trusted library allocation
page read and write
7D10003D0000
trusted library allocation
page read and write
1ED24A0A000
heap
page read and write
7D1000718000
trusted library allocation
page read and write
76BC04204000
trusted library allocation
page read and write
6960007A4000
trusted library allocation
page read and write
19EC01DB8000
trusted library allocation
page read and write
79D800718000
trusted library allocation
page read and write
19EC009DD000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
333800B5F000
trusted library allocation
page read and write
33380077C000
trusted library allocation
page read and write
7930002B8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB009000
heap
page read and write
76BC0351C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C874CE000
heap
page read and write
33380028C000
trusted library allocation
page read and write
19EC01EA4000
trusted library allocation
page read and write
333801D7C000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
19EC01DE8000
trusted library allocation
page read and write
4B0800280000
trusted library allocation
page read and write
4E8000
heap
page read and write
1EEAB024000
heap
page read and write
324000A40000
trusted library allocation
page read and write
333801D4C000
trusted library allocation
page read and write
696001ED0000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
79D800730000
trusted library allocation
page read and write
696000B87000
trusted library allocation
page read and write
6960003C4000
trusted library allocation
page read and write
696002114000
trusted library allocation
page read and write
333801E7C000
trusted library allocation
page read and write
358800280000
trusted library allocation
page read and write
3F3801604000
trusted library allocation
page read and write
3240006A0000
trusted library allocation
page read and write
19EC007D8000
trusted library allocation
page read and write
76BC03C9C000
trusted library allocation
page read and write
696000B7C000
trusted library allocation
page read and write
19EC01090000
trusted library allocation
page read and write
3148002D4000
trusted library allocation
page read and write
333800AC8000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
76BC03158000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
333800AD4000
trusted library allocation
page read and write
324001D0C000
trusted library allocation
page read and write
3F3800408000
trusted library allocation
page read and write
1358351B000
heap
page read and write
22C875CE000
heap
page read and write
5FC000281000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
76BC03074000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
1CF6FE6E000
heap
page read and write
2A78002A4000
trusted library allocation
page read and write
19EC0148C000
trusted library allocation
page read and write
3F38003A8000
trusted library allocation
page read and write
793000280000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
5FC000290000
trusted library allocation
page read and write
76BC02AC1000
trusted library allocation
page read and write
19EC0060C000
trusted library allocation
page read and write
333801EAC000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
79D8003AC000
trusted library allocation
page read and write
324001FEC000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
76BC03054000
trusted library allocation
page read and write
19EC01004000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
19EC01C34000
trusted library allocation
page read and write
279649AC000
heap
page read and write
696000E74000
trusted library allocation
page read and write
13583502000
heap
page read and write
6960006AC000
trusted library allocation
page read and write
19EC00BE0000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
3F380034C000
trusted library allocation
page read and write
1ED24A6F000
heap
page read and write
22C874CE000
heap
page read and write
1ED24A0A000
heap
page read and write
324001E54000
trusted library allocation
page read and write
1ED24A6E000
heap
page read and write
3338006AC000
trusted library allocation
page read and write
3148002D4000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
3FB4002CC000
trusted library allocation
page read and write
696002064000
trusted library allocation
page read and write
7C8000408000
trusted library allocation
page read and write
333801004000
trusted library allocation
page read and write
22C85C42000
heap
page read and write
324001D6C000
trusted library allocation
page read and write
696001D24000
trusted library allocation
page read and write
22C87638000
heap
page read and write
22C87717000
heap
page read and write
69600204C000
trusted library allocation
page read and write
7D1001D30000
trusted library allocation
page read and write
19EC002A0000
trusted library allocation
page read and write
32400060C000
trusted library allocation
page read and write
1ED24A3C000
heap
page read and write
1EEAB024000
heap
page read and write
6960007F0000
trusted library allocation
page read and write
1EEAB00B000
heap
page read and write
696000730000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
324000684000
trusted library allocation
page read and write
324001CE4000
trusted library allocation
page read and write
76BC03C84000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC02A0B000
trusted library allocation
page read and write
696001FF4000
trusted library allocation
page read and write
19EC02050000
trusted library allocation
page read and write
324001E80000
trusted library allocation
page read and write
76BC04204000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
32400060C000
trusted library allocation
page read and write
696002324000
trusted library allocation
page read and write
696001C54000
trusted library allocation
page read and write
19EC01D30000
trusted library allocation
page read and write
19EC01C1C000
trusted library allocation
page read and write
2C18002A8000
trusted library allocation
page read and write
696001E1C000
trusted library allocation
page read and write
19EC01CE0000
trusted library allocation
page read and write
79D8002CC000
trusted library allocation
page read and write
696001D54000
trusted library allocation
page read and write
696001EC0000
trusted library allocation
page read and write
6960002A0000
trusted library allocation
page read and write
696000B89000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
33380201C000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
1CF6FE2B000
heap
page read and write
22C875CE000
heap
page read and write
76BC03218000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001E2C000
trusted library allocation
page read and write
333800AFC000
trusted library allocation
page read and write
19EC01DE8000
trusted library allocation
page read and write
76BC04134000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
1ED24A3C000
heap
page read and write
6240032F000
direct allocation
page read and write
19EC01D78000
trusted library allocation
page read and write
33380205C000
trusted library allocation
page read and write
50F000
heap
page read and write
1CF6FE78000
heap
page read and write
25DE7866000
heap
page read and write
324001DDC000
trusted library allocation
page read and write
76BC03088000
trusted library allocation
page read and write
76BC031D0000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001DC4000
trusted library allocation
page read and write
3F3800340000
trusted library allocation
page read and write
1EEAB074000
heap
page read and write
19EC01DA8000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE24000
heap
page read and write
7D100204C000
trusted library allocation
page read and write
13583511000
heap
page read and write
79D800AC0000
trusted library allocation
page read and write
447C0028C000
trusted library allocation
page read and write
696001D0C000
trusted library allocation
page read and write
2C1800280000
trusted library allocation
page read and write
7D1002054000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
324001CDC000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
324001CB4000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
79D800894000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
19EC00770000
trusted library allocation
page read and write
76BC03924000
trusted library allocation
page read and write
333800614000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
3F3801404000
trusted library allocation
page read and write
324000818000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1ED24A34000
heap
page read and write
19EC01058000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
5FC000160000
trusted library allocation
page read and write
3F3800340000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
19EC01D70000
trusted library allocation
page read and write
2A78002B8000
trusted library allocation
page read and write
3600000C000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
1EEAB03C000
heap
page read and write
3588002A4000
trusted library allocation
page read and write
19EC01DA0000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
1EEAB02B000
heap
page read and write
333800BF0000
trusted library allocation
page read and write
1CF6FE55000
heap
page read and write
3338003A8000
trusted library allocation
page read and write
22C87894000
heap
page read and write
2C18002B8000
trusted library allocation
page read and write
324001C14000
trusted library allocation
page read and write
696001D1C000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
1CF6FE2B000
heap
page read and write
333800BB8000
trusted library allocation
page read and write
324001F3C000
trusted library allocation
page read and write
2B00B62B000
heap
page read and write
9EC00338000
trusted library allocation
page read and write
76BC0367C000
trusted library allocation
page read and write
333800408000
trusted library allocation
page read and write
324000334000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
333800818000
trusted library allocation
page read and write
1ED24A6B000
heap
page read and write
1CF6FE24000
heap
page read and write
19EC0106C000
trusted library allocation
page read and write
3FB400294000
trusted library allocation
page read and write
696000BB8000
trusted library allocation
page read and write
29B6000
heap
page read and write
2A7800294000
trusted library allocation
page read and write
696000834000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
1ED24A74000
heap
page read and write
19EC00BF0000
trusted library allocation
page read and write
79D80061C000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
19EC00E04000
trusted library allocation
page read and write
7D100204C000
trusted library allocation
page read and write
1E34002D4000
trusted library allocation
page read and write
12F4002D4000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
314800298000
trusted library allocation
page read and write
32400203E000
trusted library allocation
page read and write
24500040000
trusted library allocation
page read and write
19EC00818000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE09000
heap
page read and write
696002C04000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
19EC021D0000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
1EEAB06D000
heap
page read and write
696002018000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
3F3800328000
trusted library allocation
page read and write
3240002CC000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
333800624000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
25DD1A62000
heap
page read and write
135FD974000
heap
page read and write
1EEAB00B000
heap
page read and write
22C8782C000
heap
page read and write
696001C14000
trusted library allocation
page read and write
3240002CC000
trusted library allocation
page read and write
324001DB4000
trusted library allocation
page read and write
2A7800294000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
76BC03654000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
3240003C4000
trusted library allocation
page read and write
563000
heap
page read and write
333800B5F000
trusted library allocation
page read and write
696002064000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
19EC00BC0000
trusted library allocation
page read and write
76BC03C9C000
trusted library allocation
page read and write
7D100202C000
trusted library allocation
page read and write
19EC01D40000
trusted library allocation
page read and write
19EC02E0B000
trusted library allocation
page read and write
19EC00B14000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
696000788000
trusted library allocation
page read and write
7C8000320000
trusted library allocation
page read and write
324001F74000
trusted library allocation
page read and write
333800B28000
trusted library allocation
page read and write
425000
unkown
page read and write
333801F68000
trusted library allocation
page read and write
19EC009E8000
trusted library allocation
page read and write
19EC00284000
trusted library allocation
page read and write
76BC02FD8000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
22C8785E000
heap
page read and write
696000C04000
trusted library allocation
page read and write
696002054000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
2A78002A4000
trusted library allocation
page read and write
19EC0077C000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
3F3800C04000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
1ED24A6E000
heap
page read and write
59E000
heap
page read and write
32400203E000
trusted library allocation
page read and write
333801D5C000
trusted library allocation
page read and write
7D1000894000
trusted library allocation
page read and write
333800770000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
2A7800280000
trusted library allocation
page read and write
22C874DD000
heap
page read and write
1EEAB024000
heap
page read and write
1ED24A25000
heap
page read and write
1EEAB06A000
heap
page read and write
5A5000
heap
page read and write
62400318000
direct allocation
page read and write
19EC01EDC000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
135FD92F000
heap
page read and write
19EC0202A000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
76BC0316C000
trusted library allocation
page read and write
333801E44000
trusted library allocation
page read and write
4B0800294000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
6960003D0000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
3F38003A8000
trusted library allocation
page read and write
19EC0213C000
trusted library allocation
page read and write
22C8B5EE000
heap
page read and write
22C877CE000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
696000BD8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
22C8763D000
heap
page read and write
1EEAB02B000
heap
page read and write
696000EA8000
trusted library allocation
page read and write
19EC02050000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
22C8B5E2000
heap
page read and write
324001D6C000
trusted library allocation
page read and write
76BC0366C000
trusted library allocation
page read and write
2C18002A4000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
3F38007A4000
trusted library allocation
page read and write
696000E70000
trusted library allocation
page read and write
19EC01ED4000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
1EEAB010000
heap
page read and write
7D10009E0000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
314800240000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
1EEAB025000
heap
page read and write
324001EF8000
trusted library allocation
page read and write
1358351F000
heap
page read and write
1ED24A78000
heap
page read and write
1EEAB024000
heap
page read and write
333802036000
trusted library allocation
page read and write
7C800040C000
trusted library allocation
page read and write
7D1001CCC000
trusted library allocation
page read and write
333800624000
trusted library allocation
page read and write
324001EB8000
trusted library allocation
page read and write
3618002B4000
direct allocation
page read and write
1EEAB02C000
heap
page read and write
76BC0448C000
trusted library allocation
page read and write
3F3801004000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
76BC03194000
trusted library allocation
page read and write
19EC01F58000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
79D800730000
trusted library allocation
page read and write
69600219C000
trusted library allocation
page read and write
135FF702000
heap
page read and write
135FD93B000
heap
page read and write
324001DDC000
trusted library allocation
page read and write
3338002CC000
trusted library allocation
page read and write
76BC03074000
trusted library allocation
page read and write
696001C74000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
3F3800384000
trusted library allocation
page read and write
3F3800384000
trusted library allocation
page read and write
76BC03030000
trusted library allocation
page read and write
2754001A4000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
333801C7C000
trusted library allocation
page read and write
696000B48000
trusted library allocation
page read and write
42B000
unkown
page read and write
19EC00ABE000
trusted library allocation
page read and write
19EC0074C000
trusted library allocation
page read and write
22C87627000
heap
page read and write
1CF6FE85000
heap
page read and write
76BC02754000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
696001C64000
trusted library allocation
page read and write
135FD94E000
heap
page read and write
324001DBC000
trusted library allocation
page read and write
696001DC4000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
7D10002D4000
trusted library allocation
page read and write
1358351B000
heap
page read and write
135FD8E3000
heap
page read and write
76BC0402C000
trusted library allocation
page read and write
79D800AD8000
trusted library allocation
page read and write
324001DAC000
trusted library allocation
page read and write
135FD950000
heap
page read and write
3F3800774000
trusted library allocation
page read and write
69600078C000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
4B08002CC000
trusted library allocation
page read and write
13583511000
heap
page read and write
76BC03158000
trusted library allocation
page read and write
1ED24A7A000
heap
page read and write
3F3801604000
trusted library allocation
page read and write
76BC04404000
trusted library allocation
page read and write
3F3800340000
trusted library allocation
page read and write
324000724000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
4C18002D0000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
696001CA4000
trusted library allocation
page read and write
696001EB0000
trusted library allocation
page read and write
19EC02058000
trusted library allocation
page read and write
3F380030C000
trusted library allocation
page read and write
1CF6FE5C000
heap
page read and write
793000280000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
3F380036C000
trusted library allocation
page read and write
7D10009D8000
trusted library allocation
page read and write
19EC02100000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
1EEAB02B000
heap
page read and write
2C18002A4000
trusted library allocation
page read and write
447C002C8000
trusted library allocation
page read and write
333801C34000
trusted library allocation
page read and write
3F380060C000
trusted library allocation
page read and write
3588002A4000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
1CF6FE66000
heap
page read and write
3F3800390000
trusted library allocation
page read and write
69600205C000
trusted library allocation
page read and write
135FD93B000
heap
page read and write
324001D34000
trusted library allocation
page read and write
22C87536000
heap
page read and write
333800B61000
trusted library allocation
page read and write
324002054000
trusted library allocation
page read and write
76BC03624000
trusted library allocation
page read and write
696002404000
trusted library allocation
page read and write
696001F00000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
19EC009DC000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
1CF6FE08000
heap
page read and write
76BC027A8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
19EC00BC8000
trusted library allocation
page read and write
358800280000
trusted library allocation
page read and write
324001FDC000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
3F3800358000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
76BC04404000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
22C8773F000
heap
page read and write
22C8B5EF000
heap
page read and write
76BC03624000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
333801D9C000
trusted library allocation
page read and write
324001C44000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC01DD8000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
76BC04204000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
79D800770000
trusted library allocation
page read and write
333801C6C000
trusted library allocation
page read and write
3F3801004000
trusted library allocation
page read and write
33380040C000
trusted library allocation
page read and write
39D00040000
trusted library allocation
page read and write
400000
unkown
page readonly
333801D54000
trusted library allocation
page read and write
19EC01EB4000
trusted library allocation
page read and write
76BC027A8000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
76BC031B8000
trusted library allocation
page read and write
324000AD4000
trusted library allocation
page read and write
3F38007A4000
trusted library allocation
page read and write
19EC01C60000
trusted library allocation
page read and write
19EC00730000
trusted library allocation
page read and write
1EEAB008000
heap
page read and write
793000280000
trusted library allocation
page read and write
324000718000
trusted library allocation
page read and write
22C87742000
heap
page read and write
333801DAC000
trusted library allocation
page read and write
696001DCC000
trusted library allocation
page read and write
333801C4C000
trusted library allocation
page read and write
1E3400240000
trusted library allocation
page read and write
22C87726000
heap
page read and write
7D1002054000
trusted library allocation
page read and write
7D10002DC000
trusted library allocation
page read and write
324000BBC000
trusted library allocation
page read and write
696001DEC000
trusted library allocation
page read and write
7D1000624000
trusted library allocation
page read and write
696001D6C000
trusted library allocation
page read and write
333801DDC000
trusted library allocation
page read and write
3FB400294000
trusted library allocation
page read and write
22C875A9000
heap
page read and write
19EC02A04000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
696000B34000
trusted library allocation
page read and write
3FB4002C8000
trusted library allocation
page read and write
696000B1C000
trusted library allocation
page read and write
696001EC8000
trusted library allocation
page read and write
19EC01568000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
3338007C0000
trusted library allocation
page read and write
19EC01D50000
trusted library allocation
page read and write
1358351F000
heap
page read and write
135FD93B000
heap
page read and write
19EC006A0000
trusted library allocation
page read and write
22C85C5F000
heap
page read and write
22C875CE000
heap
page read and write
447C002C8000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1ED24A2C000
heap
page read and write
3FB4002C8000
trusted library allocation
page read and write
562C00298000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1CF6FE2B000
heap
page read and write
696001FF4000
trusted library allocation
page read and write
135FF708000
heap
page read and write
1ED24A24000
heap
page read and write
4C18002D4000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
333801CE4000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
696001004000
trusted library allocation
page read and write
7D1002064000
trusted library allocation
page read and write
1CF6FE55000
heap
page read and write
2A78002B8000
trusted library allocation
page read and write
7D1001CE0000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
19EC01068000
trusted library allocation
page read and write
76BC03694000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
3F3800384000
trusted library allocation
page read and write
324001C34000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
2B00B62B000
heap
page read and write
76BC030EC000
trusted library allocation
page read and write
7D1000620000
trusted library allocation
page read and write
3338009EC000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
333800B38000
trusted library allocation
page read and write
19EC01DD0000
trusted library allocation
page read and write
76BC03D4C000
trusted library allocation
page read and write
324001C54000
trusted library allocation
page read and write
25DD1A2B000
heap
page read and write
76BC04204000
trusted library allocation
page read and write
69600061C000
trusted library allocation
page read and write
4B08002C8000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
19EC00A38000
trusted library allocation
page read and write
22C875E9000
heap
page read and write
333800B3C000
trusted library allocation
page read and write
1ED24A6A000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC02058000
trusted library allocation
page read and write
7D1002064000
trusted library allocation
page read and write
368C0030C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE6E000
heap
page read and write
22C8752C000
heap
page read and write
19EC01CE8000
trusted library allocation
page read and write
79D800A38000
trusted library allocation
page read and write
4C18002E4000
trusted library allocation
page read and write
324001EB0000
trusted library allocation
page read and write
333801F60000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
333801CFC000
trusted library allocation
page read and write
7D1000ACB000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
4C18002A0000
trusted library allocation
page read and write
2B00B441000
heap
page read and write
2A78002A8000
trusted library allocation
page read and write
333801D44000
trusted library allocation
page read and write
696000654000
trusted library allocation
page read and write
19EC01568000
trusted library allocation
page read and write
76BC0363C000
trusted library allocation
page read and write
79D80077C000
trusted library allocation
page read and write
19EC01DF0000
trusted library allocation
page read and write
7D100077C000
trusted library allocation
page read and write
76BC03074000
trusted library allocation
page read and write
3FB4002C4000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
19EC00A98000
trusted library allocation
page read and write
696002036000
trusted library allocation
page read and write
19EC01F48000
trusted library allocation
page read and write
7D1000ACB000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
1CF6FE71000
heap
page read and write
22C8785B000
heap
page read and write
2A78002C8000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
696000A54000
trusted library allocation
page read and write
333802064000
trusted library allocation
page read and write
19EC0100C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
76BC02434000
trusted library allocation
page read and write
7D1002054000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
69600060C000
trusted library allocation
page read and write
22C8B5E5000
heap
page read and write
54A000
heap
page read and write
1EEAB010000
heap
page read and write
3F3800328000
trusted library allocation
page read and write
22C8B7FA000
heap
page read and write
696002164000
trusted library allocation
page read and write
22C8766B000
heap
page read and write
19EC0060C000
trusted library allocation
page read and write
696001CC4000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
275400158000
trusted library allocation
page read and write
25B0000
heap
page read and write
4948002CC000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
1EEAB024000
heap
page read and write
135FD92A000
heap
page read and write
19EC01CB8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696002098000
trusted library allocation
page read and write
324001DEC000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
333801DC4000
trusted library allocation
page read and write
3F3800328000
trusted library allocation
page read and write
19EC01FF8000
trusted library allocation
page read and write
7D1000638000
trusted library allocation
page read and write
696000E5C000
trusted library allocation
page read and write
7FF7C93F0000
unkown
page readonly
19EC01E6C000
trusted library allocation
page read and write
696001F24000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
135FD934000
heap
page read and write
7D10006AC000
trusted library allocation
page read and write
19EC01040000
trusted library allocation
page read and write
79D8009D0000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
696001E44000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1CF6FE10000
heap
page read and write
1CF6FE24000
heap
page read and write
400000
unkown
page readonly
1CF6FE0B000
heap
page read and write
324000624000
trusted library allocation
page read and write
324000BB4000
trusted library allocation
page read and write
3338002CC000
trusted library allocation
page read and write
368C00298000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696001F7C000
trusted library allocation
page read and write
333801D2C000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
275400178000
trusted library allocation
page read and write
19EC006A0000
trusted library allocation
page read and write
135FD92F000
heap
page read and write
22C878EB000
heap
page read and write
696001C94000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
1EEAB02B000
heap
page read and write
7D10003DC000
trusted library allocation
page read and write
19EC01CD0000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1EEAB02B000
heap
page read and write
6960009F2000
trusted library allocation
page read and write
333800BE0000
trusted library allocation
page read and write
3F380066C000
trusted library allocation
page read and write
19EC00284000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
19EC01D88000
trusted library allocation
page read and write
324001F1C000
trusted library allocation
page read and write
6240032C000
direct allocation
page read and write
333801E84000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
696000B89000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
3338003C4000
trusted library allocation
page read and write
3F380036C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
76BC03030000
trusted library allocation
page read and write
696000BD8000
trusted library allocation
page read and write
76BC04404000
trusted library allocation
page read and write
76BC03D6D000
trusted library allocation
page read and write
324001E98000
trusted library allocation
page read and write
696001E3C000
trusted library allocation
page read and write
324000334000
trusted library allocation
page read and write
7930002B8000
trusted library allocation
page read and write
333801CDC000
trusted library allocation
page read and write
551000
heap
page read and write
12F4002D4000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
1CF6FE09000
heap
page read and write
3338006AC000
trusted library allocation
page read and write
3F3800328000
trusted library allocation
page read and write
4948002C4000
trusted library allocation
page read and write
19EC02030000
trusted library allocation
page read and write
79D8003E8000
trusted library allocation
page read and write
3F3801A04000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
19EC00BB0000
trusted library allocation
page read and write
1CF6FE26000
heap
page read and write
135FF708000
heap
page read and write
19EC01F38000
trusted library allocation
page read and write
324001FEC000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
62400328000
direct allocation
page read and write
76BC03060000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
2A78002A4000
trusted library allocation
page read and write
4B08002B8000
trusted library allocation
page read and write
2A78002C4000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
32400040C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
7D100078C000
trusted library allocation
page read and write
19EC02020000
trusted library allocation
page read and write
22C8B7FC000
heap
page read and write
324000770000
trusted library allocation
page read and write
76BC04804000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB009000
heap
page read and write
7D1000348000
trusted library allocation
page read and write
22C8766B000
heap
page read and write
1EEAB009000
heap
page read and write
22C8755D000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
324001C4C000
trusted library allocation
page read and write
6960006AC000
trusted library allocation
page read and write
1EEAB06A000
heap
page read and write
7D1002044000
trusted library allocation
page read and write
19EC01050000
trusted library allocation
page read and write
7D100204C000
trusted library allocation
page read and write
1ED24A09000
heap
page read and write
333800B04000
trusted library allocation
page read and write
12F4002D4000
trusted library allocation
page read and write
4C1800244000
trusted library allocation
page read and write
19EC01E84000
trusted library allocation
page read and write
19EC01D98000
trusted library allocation
page read and write
22C87757000
heap
page read and write
32400206C000
trusted library allocation
page read and write
76BC03804000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
27964912000
heap
page read and write
1EEAB040000
heap
page read and write
3148002D8000
trusted library allocation
page read and write
562C00338000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
76BC0360C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
696000AD4000
trusted library allocation
page read and write
555000
heap
page read and write
333800B80000
trusted library allocation
page read and write
76BC03254000
trusted library allocation
page read and write
696001FF4000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
22C874CE000
heap
page read and write
696002064000
trusted library allocation
page read and write
3240006AC000
trusted library allocation
page read and write
40A000
unkown
page read and write
76BC03110000
trusted library allocation
page read and write
3F38003A8000
trusted library allocation
page read and write
696001D04000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
6960003C4000
trusted library allocation
page read and write
696001DDC000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
7D1000A2C000
trusted library allocation
page read and write
696000770000
trusted library allocation
page read and write
22C876EB000
heap
page read and write
22C87638000
heap
page read and write
76BC030EC000
trusted library allocation
page read and write
3FB400280000
trusted library allocation
page read and write
22C87637000
heap
page read and write
333801DEC000
trusted library allocation
page read and write
3338003C4000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
79D800A8C000
trusted library allocation
page read and write
1EEAB06A000
heap
page read and write
1CF6FE2B000
heap
page read and write
1EEAB02B000
heap
page read and write
32400033C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
3F3800334000
trusted library allocation
page read and write
19EC00A4C000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
3F380066C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
135FD934000
heap
page read and write
22C8785B000
heap
page read and write
19EC02170000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
333801E0C000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
333801C0C000
trusted library allocation
page read and write
1ED24A6B000
heap
page read and write
22C876EB000
heap
page read and write
1ED24A34000
heap
page read and write
1EEAB009000
heap
page read and write
1CF6FE2C000
heap
page read and write
76BC02804000
trusted library allocation
page read and write
324000614000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
27964912000
heap
page read and write
1CF6FE2B000
heap
page read and write
3240003AC000
trusted library allocation
page read and write
3FB4002CC000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
32400077C000
trusted library allocation
page read and write
562C0040C000
trusted library allocation
page read and write
793000280000
trusted library allocation
page read and write
37BF000
stack
page read and write
19EC0031C000
trusted library allocation
page read and write
3240006A0000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
333801DD4000
trusted library allocation
page read and write
76BC031B8000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
6240031A000
direct allocation
page read and write
19EC01D00000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
22C8770B000
heap
page read and write
1ED24A24000
heap
page read and write
1CF6FE2B000
heap
page read and write
76BC03194000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
3F38007D8000
trusted library allocation
page read and write
333800BC0000
trusted library allocation
page read and write
22C87561000
heap
page read and write
1ED24A70000
heap
page read and write
76BC03054000
trusted library allocation
page read and write
19EC01D80000
trusted library allocation
page read and write
324001CCC000
trusted library allocation
page read and write
22C8764A000
heap
page read and write
696000684000
trusted library allocation
page read and write
79D80077C000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
32400208D000
trusted library allocation
page read and write
79D800A24000
trusted library allocation
page read and write
76BC027A8000
trusted library allocation
page read and write
333800824000
trusted library allocation
page read and write
135FD96E000
heap
page read and write
22C874BE000
heap
page read and write
1ED24A40000
heap
page read and write
1ED24A2C000
heap
page read and write
76BC04004000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
22C87638000
heap
page read and write
76BC04204000
trusted library allocation
page read and write
76BC03694000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
696000BE8000
trusted library allocation
page read and write
76BC03264000
trusted library allocation
page read and write
7D1001FB4000
trusted library allocation
page read and write
7D10003B8000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1ED24A2B000
heap
page read and write
696001E44000
trusted library allocation
page read and write
333802054000
trusted library allocation
page read and write
7D1002088000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
696001D34000
trusted library allocation
page read and write
1ED24A70000
heap
page read and write
69600201C000
trusted library allocation
page read and write
76BC0363C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
19EC02A04000
trusted library allocation
page read and write
19EC01D20000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
1ED24A74000
heap
page read and write
1ED24A76000
heap
page read and write
22C876EB000
heap
page read and write
1E34002D4000
trusted library allocation
page read and write
3338002A0000
trusted library allocation
page read and write
76BC034F4000
trusted library allocation
page read and write
12F4002AC000
trusted library allocation
page read and write
696001E48000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
76BC04080000
trusted library allocation
page read and write
1ED24A7C000
heap
page read and write
696001CF4000
trusted library allocation
page read and write
1ED24A6C000
heap
page read and write
76BC04404000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
1ED24A24000
heap
page read and write
76BC030F4000
trusted library allocation
page read and write
19EC02048000
trusted library allocation
page read and write
7D1000284000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
7D10002A0000
trusted library allocation
page read and write
76BC03E04000
trusted library allocation
page read and write
69600074C000
trusted library allocation
page read and write
19EC003C4000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
76BC03504000
trusted library allocation
page read and write
279672E0000
trusted library allocation
page read and write
324001D3C000
trusted library allocation
page read and write
3F380036C000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
358800280000
trusted library allocation
page read and write
324002064000
trusted library allocation
page read and write
7D1001FD4000
trusted library allocation
page read and write
76BC0405C000
trusted library allocation
page read and write
793000294000
trusted library allocation
page read and write
22C87854000
heap
page read and write
19EC0203A000
trusted library allocation
page read and write
76BC04050000
trusted library allocation
page read and write
1ED244E0000
remote allocation
page read and write
135FD94C000
heap
page read and write
1ED24A2B000
heap
page read and write
1CF6FE72000
heap
page read and write
4B0800280000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
2C1800280000
trusted library allocation
page read and write
1EEAB00B000
heap
page read and write
76BC0243C000
trusted library allocation
page read and write
696000A40000
trusted library allocation
page read and write
79D8006A0000
trusted library allocation
page read and write
3FB4002C8000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
3C4000298000
direct allocation
page read and write
1CF6FE09000
heap
page read and write
333800788000
trusted library allocation
page read and write
19EC00B30000
trusted library allocation
page read and write
22C874D4000
heap
page read and write
1CF6FE24000
heap
page read and write
7FF7C93F1000
unkown
page execute read
13583511000
heap
page read and write
696001D74000
trusted library allocation
page read and write
135FD96F000
heap
page read and write
696000AC8000
trusted library allocation
page read and write
135FD981000
heap
page read and write
3F38007BC000
trusted library allocation
page read and write
4B0800280000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
22C8774E000
heap
page read and write
324000694000
trusted library allocation
page read and write
333801FC8000
trusted library allocation
page read and write
696001D8C000
trusted library allocation
page read and write
7930002B8000
trusted library allocation
page read and write
696001ED8000
trusted library allocation
page read and write
22C875FF000
heap
page read and write
69600238C000
trusted library allocation
page read and write
259F000
stack
page read and write
19EC01CE8000
trusted library allocation
page read and write
76BC034F4000
trusted library allocation
page read and write
79D8002DC000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
1CF6FE82000
heap
page read and write
22C8786B000
heap
page read and write
696000BB0000
trusted library allocation
page read and write
333801DAC000
trusted library allocation
page read and write
76BC034F4000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
22C85C6B000
heap
page read and write
696000770000
trusted library allocation
page read and write
32400205C000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
333800B61000
trusted library allocation
page read and write
7D10009D8000
trusted library allocation
page read and write
79D800A0C000
trusted library allocation
page read and write
4B0800294000
trusted library allocation
page read and write
19EC01DB0000
trusted library allocation
page read and write
19EC02050000
trusted library allocation
page read and write
333800B5F000
trusted library allocation
page read and write
333801DA4000
trusted library allocation
page read and write
7D1001FF4000
trusted library allocation
page read and write
333801D34000
trusted library allocation
page read and write
333801CBC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
32400031C000
trusted library allocation
page read and write
22C8B5E1000
heap
page read and write
447C0028C000
trusted library allocation
page read and write
22C87742000
heap
page read and write
333801EBC000
trusted library allocation
page read and write
62400310000
direct allocation
page read and write
9EC00418000
trusted library allocation
page read and write
19EC01E0C000
trusted library allocation
page read and write
1CF6FE0A000
heap
page read and write
3F380036C000
trusted library allocation
page read and write
32400205C000
trusted library allocation
page read and write
696000818000
trusted library allocation
page read and write
22C8770B000
heap
page read and write
333801D34000
trusted library allocation
page read and write
333802054000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
22C8B5EA000
heap
page read and write
324001DD4000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
79D800684000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
76BC04604000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
324001CFC000
trusted library allocation
page read and write
76BC04004000
trusted library allocation
page read and write
79D8006AC000
trusted library allocation
page read and write
19EC007C0000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
32400074C000
trusted library allocation
page read and write
3240003E8000
trusted library allocation
page read and write
19EC01568000
trusted library allocation
page read and write
3148002AC000
trusted library allocation
page read and write
1ED24A6E000
heap
page read and write
13583412000
heap
page read and write
19EC01F18000
trusted library allocation
page read and write
324001FEC000
trusted library allocation
page read and write
3F3800C04000
trusted library allocation
page read and write
3F380078C000
trusted library allocation
page read and write
135FD92A000
heap
page read and write
19EC00A24000
trusted library allocation
page read and write
3F3800384000
trusted library allocation
page read and write
19EC01E0C000
trusted library allocation
page read and write
3F3801004000
trusted library allocation
page read and write
1ED24A25000
heap
page read and write
562C00324000
trusted library allocation
page read and write
324000788000
trusted library allocation
page read and write
696000E88000
trusted library allocation
page read and write
5A1000
heap
page read and write
1ED24A34000
heap
page read and write
1ED24A74000
heap
page read and write
19EC01FF8000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
9EC00408000
trusted library allocation
page read and write
3338003DC000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
333801D3C000
trusted library allocation
page read and write
324001CF4000
trusted library allocation
page read and write
696001D84000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
2C1800280000
trusted library allocation
page read and write
4948002C8000
trusted library allocation
page read and write
76BC03030000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
4C18002C0000
trusted library allocation
page read and write
3240009E4000
trusted library allocation
page read and write
22C8B702000
heap
page read and write
19EC01FF8000
trusted library allocation
page read and write
333801F38000
trusted library allocation
page read and write
19EC01FF8000
trusted library allocation
page read and write
135FD988000
heap
page read and write
76BC03268000
trusted library allocation
page read and write
19EC01D60000
trusted library allocation
page read and write
7D1001DE0000
trusted library allocation
page read and write
1EEAB00B000
heap
page read and write
76BC03624000
trusted library allocation
page read and write
19EC00AC3000
trusted library allocation
page read and write
4B08002C4000
trusted library allocation
page read and write
324002054000
trusted library allocation
page read and write
1CF6FE3C000
heap
page read and write
7D1000E04000
trusted library allocation
page read and write
19EC006AC000
trusted library allocation
page read and write
275400168000
trusted library allocation
page read and write
22C875FB000
heap
page read and write
19EC014FC000
trusted library allocation
page read and write
6960003DC000
trusted library allocation
page read and write
696001F84000
trusted library allocation
page read and write
3C4000244000
direct allocation
page read and write
22C8773F000
heap
page read and write
1CF6FE09000
heap
page read and write
96000
stack
page read and write
7D10009F0000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
3FB400280000
trusted library allocation
page read and write
22C87663000
heap
page read and write
333801F58000
trusted library allocation
page read and write
76BC03074000
trusted library allocation
page read and write
1CF6F8F0000
remote allocation
page read and write
76BC03E04000
trusted library allocation
page read and write
5FC00019C000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
3240009F0000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
3F3800248000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
76BC0366C000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696001D54000
trusted library allocation
page read and write
696002054000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
324001D7C000
trusted library allocation
page read and write
5FC000138000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
22C87663000
heap
page read and write
19EC0208C000
trusted library allocation
page read and write
19EC01FD0000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
696000EB8000
trusted library allocation
page read and write
696001DCC000
trusted library allocation
page read and write
19EC01D10000
trusted library allocation
page read and write
7D1000A7C000
trusted library allocation
page read and write
3F3801804000
trusted library allocation
page read and write
696001DF4000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
1CF6FE2B000
heap
page read and write
2C1800294000
trusted library allocation
page read and write
3360000
heap
page read and write
696000B89000
trusted library allocation
page read and write
2C18002C8000
trusted library allocation
page read and write
696002C04000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
3800000
heap
page read and write
19EC02070000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
3F3800358000
trusted library allocation
page read and write
3F380078C000
trusted library allocation
page read and write
22C876EB000
heap
page read and write
333801CF4000
trusted library allocation
page read and write
22C87663000
heap
page read and write
1CF6FE2B000
heap
page read and write
3F38007D8000
trusted library allocation
page read and write
19EC02010000
trusted library allocation
page read and write
19EC01FE8000
trusted library allocation
page read and write
19EC01074000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
22C85C6B000
heap
page read and write
76BC0351C000
trusted library allocation
page read and write
19EC00B5F000
trusted library allocation
page read and write
333802064000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
4948002C8000
trusted library allocation
page read and write
22C87655000
heap
page read and write
324001CCC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
19EC01FE0000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
358800294000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
696001E48000
trusted library allocation
page read and write
324001DCC000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
333802014000
trusted library allocation
page read and write
76BC033C4000
trusted library allocation
page read and write
324000BA4000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
696000AEC000
trusted library allocation
page read and write
696001E24000
trusted library allocation
page read and write
333801D04000
trusted library allocation
page read and write
19EC01D88000
trusted library allocation
page read and write
696001EE0000
trusted library allocation
page read and write
9EC00304000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
1CF6FE6B000
heap
page read and write
76BC03230000
trusted library allocation
page read and write
59E000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC01DD0000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
3F3800804000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
333800BD0000
trusted library allocation
page read and write
1EEAB07B000
heap
page read and write
4C18002D0000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
22C87638000
heap
page read and write
7930002CC000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
696001CBC000
trusted library allocation
page read and write
333801FF0000
trusted library allocation
page read and write
1ED24A63000
heap
page read and write
7D1001DD8000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
76BC03924000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
76BC039E0000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
3148002D4000
trusted library allocation
page read and write
19EC01C2C000
trusted library allocation
page read and write
696000890000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
696001E14000
trusted library allocation
page read and write
333800A24000
trusted library allocation
page read and write
6960002CC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
7D1002080000
trusted library allocation
page read and write
2A7800294000
trusted library allocation
page read and write
22C874D4000
heap
page read and write
22C878F7000
heap
page read and write
19EC01F18000
trusted library allocation
page read and write
19EC01EEC000
trusted library allocation
page read and write
76BC04134000
trusted library allocation
page read and write
333802108000
trusted library allocation
page read and write
2A78002B8000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
19EC014FC000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
333801EF4000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
19EC00624000
trusted library allocation
page read and write
696001C5C000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
324001D2C000
trusted library allocation
page read and write
1ED24A71000
heap
page read and write
324001FD4000
trusted library allocation
page read and write
76BC03654000
trusted library allocation
page read and write
4C18002B4000
trusted library allocation
page read and write
333800614000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
333801E9C000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
696001E3C000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
7D10002DC000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696000334000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696001CCC000
trusted library allocation
page read and write
1ED24A5B000
heap
page read and write
358800280000
trusted library allocation
page read and write
69600077C000
trusted library allocation
page read and write
79D80061C000
trusted library allocation
page read and write
19EC02058000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
696001C24000
trusted library allocation
page read and write
76BC02478000
trusted library allocation
page read and write
76BC02AC0000
trusted library allocation
page read and write
7D1000828000
trusted library allocation
page read and write
696002054000
trusted library allocation
page read and write
19EC00B54000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
22C8B5E7000
heap
page read and write
333800BB0000
trusted library allocation
page read and write
324000634000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1ED24A34000
heap
page read and write
7FF7C9F7A000
unkown
page write copy
13583511000
heap
page read and write
1EEAB02B000
heap
page read and write
22C8786B000
heap
page read and write
7D1001D58000
trusted library allocation
page read and write
333801D8C000
trusted library allocation
page read and write
333800B78000
trusted library allocation
page read and write
135FD92F000
heap
page read and write
1CF6FE71000
heap
page read and write
6960009ED000
trusted library allocation
page read and write
76BC04604000
trusted library allocation
page read and write
1ED24A6C000
heap
page read and write
76BC03930000
trusted library allocation
page read and write
9EC00328000
trusted library allocation
page read and write
76BC04804000
trusted library allocation
page read and write
324001CA4000
trusted library allocation
page read and write
76BC03504000
trusted library allocation
page read and write
19EC00AC0000
trusted library allocation
page read and write
69600203C000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
7930002A4000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB024000
heap
page read and write
76BC03E04000
trusted library allocation
page read and write
33380205C000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
76BC034BC000
trusted library allocation
page read and write
696000AE7000
trusted library allocation
page read and write
33380209C000
trusted library allocation
page read and write
333801E8C000
trusted library allocation
page read and write
22C874B8000
heap
page read and write
333801D6C000
trusted library allocation
page read and write
1EEAB05E000
heap
page read and write
6960002D4000
trusted library allocation
page read and write
7C8000418000
trusted library allocation
page read and write
19EC02048000
trusted library allocation
page read and write
3FB400294000
trusted library allocation
page read and write
32400078C000
trusted library allocation
page read and write
54A000
heap
page read and write
79D8006AC000
trusted library allocation
page read and write
3FB4002C8000
trusted library allocation
page read and write
3F3801804000
trusted library allocation
page read and write
7D1000408000
trusted library allocation
page read and write
7D10006A0000
trusted library allocation
page read and write
32400206C000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
3580000
trusted library allocation
page read and write
2796499C000
heap
page read and write
7D1001CF0000
trusted library allocation
page read and write
262E000
stack
page read and write
19EC00620000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC01D78000
trusted library allocation
page read and write
696000E58000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
2C18002B8000
trusted library allocation
page read and write
333800334000
trusted library allocation
page read and write
4B08002B8000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
22C8773F000
heap
page read and write
1CF6FE24000
heap
page read and write
76BC0360C000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
696001D0C000
trusted library allocation
page read and write
1EEAB057000
heap
page read and write
3148002C8000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
333800B61000
trusted library allocation
page read and write
696001E48000
trusted library allocation
page read and write
333801ED4000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
696001CEC000
trusted library allocation
page read and write
76BC0316C000
trusted library allocation
page read and write
333800ABE000
trusted library allocation
page read and write
22C875C5000
heap
page read and write
2C1800294000
trusted library allocation
page read and write
696001FE4000
trusted library allocation
page read and write
696000A74000
trusted library allocation
page read and write
4D0000
heap
page read and write
19EC01CB0000
trusted library allocation
page read and write
22C87647000
heap
page read and write
1ED24A2B000
heap
page read and write
25DD1A66000
heap
page read and write
1EEAB02B000
heap
page read and write
1EEAB02B000
heap
page read and write
324001E88000
trusted library allocation
page read and write
5FC000130000
trusted library allocation
page read and write
19EC02050000
trusted library allocation
page read and write
69600060C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
3832000
heap
page read and write
19EC0202A000
trusted library allocation
page read and write
1ED24A25000
heap
page read and write
19EC009D4000
trusted library allocation
page read and write
22C87894000
heap
page read and write
69600077C000
trusted library allocation
page read and write
324001DD4000
trusted library allocation
page read and write
324000624000
trusted library allocation
page read and write
324001D94000
trusted library allocation
page read and write
25DE782B000
heap
page read and write
76BC0247B000
trusted library allocation
page read and write
6960020CC000
trusted library allocation
page read and write
19EC01D50000
trusted library allocation
page read and write
2C1800294000
trusted library allocation
page read and write
22C8B7E6000
heap
page read and write
6960009E4000
trusted library allocation
page read and write
7D1002054000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
368C00240000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
696002114000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
7D10006AC000
trusted library allocation
page read and write
3F38007D4000
trusted library allocation
page read and write
76BC043C4000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C8788F000
heap
page read and write
1CF6FE2B000
heap
page read and write
7D1002026000
trusted library allocation
page read and write
19EC02050000
trusted library allocation
page read and write
4C5000
heap
page read and write
696000E8C000
trusted library allocation
page read and write
696001EA8000
trusted library allocation
page read and write
7D1001DB8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1ED24A2B000
heap
page read and write
333801E64000
trusted library allocation
page read and write
6960021C8000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
2A7800294000
trusted library allocation
page read and write
696001FC4000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
22C875B0000
heap
page read and write
79D80028C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001D04000
trusted library allocation
page read and write
19EC01F70000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
76BC03CD0000
trusted library allocation
page read and write
33380202C000
trusted library allocation
page read and write
13583511000
heap
page read and write
3FB4002B8000
trusted library allocation
page read and write
7C800034C000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
19EC00AB0000
trusted library allocation
page read and write
6960009E4000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
324001C8C000
trusted library allocation
page read and write
22C87742000
heap
page read and write
76BC02434000
trusted library allocation
page read and write
22C8B700000
heap
page read and write
4B0800294000
trusted library allocation
page read and write
7D1000A98000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
1ED24A6A000
heap
page read and write
1ED24A2B000
heap
page read and write
1ED24A57000
heap
page read and write
1CF6FE10000
heap
page read and write
696002095000
trusted library allocation
page read and write
324001D44000
trusted library allocation
page read and write
3F3800390000
trusted library allocation
page read and write
76BC0360C000
trusted library allocation
page read and write
696000788000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
27964912000
heap
page read and write
19EC002A0000
trusted library allocation
page read and write
79D8009EC000
trusted library allocation
page read and write
19EC0108C000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
19EC002DC000
trusted library allocation
page read and write
333801FF0000
trusted library allocation
page read and write
33380216C000
trusted library allocation
page read and write
76BC04A04000
trusted library allocation
page read and write
22C85C27000
heap
page read and write
324001C7C000
trusted library allocation
page read and write
4B0800294000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
19EC00654000
trusted library allocation
page read and write
696001F4C000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
25DD1A5C000
heap
page read and write
696001204000
trusted library allocation
page read and write
333801CCC000
trusted library allocation
page read and write
22C87563000
heap
page read and write
76BC027A8000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
22C876EB000
heap
page read and write
324000AD4000
trusted library allocation
page read and write
76BC031D0000
trusted library allocation
page read and write
3F38007BC000
trusted library allocation
page read and write
79D800408000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
333800B30000
trusted library allocation
page read and write
696000E48000
trusted library allocation
page read and write
7D10009E6000
trusted library allocation
page read and write
79D800348000
trusted library allocation
page read and write
2A78002B8000
trusted library allocation
page read and write
19EC01CC8000
trusted library allocation
page read and write
324000834000
trusted library allocation
page read and write
324000B9C000
trusted library allocation
page read and write
13583511000
heap
page read and write
19EC01C4C000
trusted library allocation
page read and write
696001DD4000
trusted library allocation
page read and write
19EC01D40000
trusted library allocation
page read and write
333800730000
trusted library allocation
page read and write
7D1000A18000
trusted library allocation
page read and write
22C875DF000
heap
page read and write
19EC01080000
trusted library allocation
page read and write
324001D8C000
trusted library allocation
page read and write
3F3800744000
trusted library allocation
page read and write
1CF6FE73000
heap
page read and write
19EC00614000
trusted library allocation
page read and write
76BC03D6C000
trusted library allocation
page read and write
25DE782B000
heap
page read and write
696001DB4000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1EEAB03C000
heap
page read and write
1EEAB009000
heap
page read and write
1EEAB06C000
heap
page read and write
19EC01DC8000
trusted library allocation
page read and write
3588002A4000
trusted library allocation
page read and write
7D100205C000
trusted library allocation
page read and write
62400335000
direct allocation
page read and write
333802046000
trusted library allocation
page read and write
27964902000
heap
page read and write
324001D4C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
76BC04604000
trusted library allocation
page read and write
696001E24000
trusted library allocation
page read and write
1ED24A25000
heap
page read and write
1358351F000
heap
page read and write
22C874E6000
heap
page read and write
19EC0208C000
trusted library allocation
page read and write
333801E44000
trusted library allocation
page read and write
79D800620000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
1CF6FE09000
heap
page read and write
324000BB4000
trusted library allocation
page read and write
76BC03218000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
33380061C000
trusted library allocation
page read and write
324001DE4000
trusted library allocation
page read and write
19EC0040C000
trusted library allocation
page read and write
324000BEC000
trusted library allocation
page read and write
76BC03A18000
trusted library allocation
page read and write
793000294000
trusted library allocation
page read and write
19EC02058000
trusted library allocation
page read and write
3F3800744000
trusted library allocation
page read and write
3F38007D5000
trusted library allocation
page read and write
918000
heap
page read and write
1EEAB010000
heap
page read and write
7D1001FF4000
trusted library allocation
page read and write
696001D94000
trusted library allocation
page read and write
696001F2C000
trusted library allocation
page read and write
1ED24A0C000
heap
page read and write
7D1001DF0000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
333800B61000
trusted library allocation
page read and write
583000
heap
page read and write
333800AF4000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
333802098000
trusted library allocation
page read and write
33380205C000
trusted library allocation
page read and write
135FD94D000
heap
page read and write
76BC04604000
trusted library allocation
page read and write
324002074000
trusted library allocation
page read and write
19EC01ECC000
trusted library allocation
page read and write
76BC03624000
trusted library allocation
page read and write
2A78002A4000
trusted library allocation
page read and write
696000E98000
trusted library allocation
page read and write
135FD951000
heap
page read and write
7FF7C9F7E000
unkown
page readonly
76BC031DC000
trusted library allocation
page read and write
22C876CB000
heap
page read and write
22C875CE000
heap
page read and write
1E34002AC000
trusted library allocation
page read and write
333801E94000
trusted library allocation
page read and write
401000
unkown
page execute read
333801D7C000
trusted library allocation
page read and write
333802054000
trusted library allocation
page read and write
1CF6FE78000
heap
page read and write
1EEAB02B000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
69600210C000
trusted library allocation
page read and write
76BC043B8000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
19EC00AC8000
trusted library allocation
page read and write
76BC04454000
trusted library allocation
page read and write
3F380036C000
trusted library allocation
page read and write
7D1000614000
trusted library allocation
page read and write
19EC01FF8000
trusted library allocation
page read and write
324000408000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
22C87540000
heap
page read and write
324001D3C000
trusted library allocation
page read and write
1ED24A77000
heap
page read and write
7C8000424000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
6240032A000
direct allocation
page read and write
35E00040000
trusted library allocation
page read and write
4BE000
stack
page read and write
4C1800300000
trusted library allocation
page read and write
3F380066C000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
1ED24A3C000
heap
page read and write
324001C24000
trusted library allocation
page read and write
333801D0C000
trusted library allocation
page read and write
696000A2C000
trusted library allocation
page read and write
19EC01DE0000
trusted library allocation
page read and write
696000B89000
trusted library allocation
page read and write
324000AC8000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
333801D4C000
trusted library allocation
page read and write
19EC02058000
trusted library allocation
page read and write
19EC00BD0000
trusted library allocation
page read and write
7D100077C000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
1EEAB024000
heap
page read and write
19EC00A0C000
trusted library allocation
page read and write
7D1001D80000
trusted library allocation
page read and write
33380078C000
trusted library allocation
page read and write
32400204C000
trusted library allocation
page read and write
19EC02084000
trusted library allocation
page read and write
2C18002A4000
trusted library allocation
page read and write
1B6000298000
direct allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
6960009EC000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
3240007A4000
trusted library allocation
page read and write
2A78002C8000
trusted library allocation
page read and write
696001D5C000
trusted library allocation
page read and write
333801F20000
trusted library allocation
page read and write
333800730000
trusted library allocation
page read and write
69600205C000
trusted library allocation
page read and write
135FF708000
heap
page read and write
696001F54000
trusted library allocation
page read and write
2B00B62B000
heap
page read and write
36600040000
trusted library allocation
page read and write
1EEAB070000
heap
page read and write
1ED24A24000
heap
page read and write
19EC02089000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C87663000
heap
page read and write
333800E04000
trusted library allocation
page read and write
324000894000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
2B00B452000
heap
page read and write
19EC00B04000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
9EC0040C000
trusted library allocation
page read and write
19EC00BD8000
trusted library allocation
page read and write
32400074C000
trusted library allocation
page read and write
324000AC8000
trusted library allocation
page read and write
1CF6FE62000
heap
page read and write
76BC03054000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
333801C8C000
trusted library allocation
page read and write
19EC01EF4000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
22C875FB000
heap
page read and write
76BC03054000
trusted library allocation
page read and write
7D1002014000
trusted library allocation
page read and write
3240003D0000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
2C1800280000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
3F38007D5000
trusted library allocation
page read and write
19EC009D4000
trusted library allocation
page read and write
3588002CC000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
7D1000614000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
4C18002C0000
trusted library allocation
page read and write
696000674000
trusted library allocation
page read and write
1358351B000
heap
page read and write
22C8755D000
heap
page read and write
1CF6FE24000
heap
page read and write
19EC0061C000
trusted library allocation
page read and write
324001C1C000
trusted library allocation
page read and write
19EC01D48000
trusted library allocation
page read and write
79D8008A4000
trusted library allocation
page read and write
79D800A18000
trusted library allocation
page read and write
333801D64000
trusted library allocation
page read and write
79D800818000
trusted library allocation
page read and write
696002020000
trusted library allocation
page read and write
19EC01D18000
trusted library allocation
page read and write
6960022EC000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
333801FC0000
trusted library allocation
page read and write
69600078C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
76BC03194000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
562C0032C000
trusted library allocation
page read and write
3480000
heap
page read and write
22C87638000
heap
page read and write
7D1002064000
trusted library allocation
page read and write
1EEAB034000
heap
page read and write
76BC034F4000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
7D1001FF4000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
22C8786B000
heap
page read and write
1CF6FE74000
heap
page read and write
1EEAB009000
heap
page read and write
13583511000
heap
page read and write
19EC01E94000
trusted library allocation
page read and write
69600240B000
trusted library allocation
page read and write
135FD93B000
heap
page read and write
1ED24A24000
heap
page read and write
79D80074C000
trusted library allocation
page read and write
22C874E2000
heap
page read and write
696000EB0000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C87666000
heap
page read and write
19EC00B88000
trusted library allocation
page read and write
324001CBC000
trusted library allocation
page read and write
7D1002044000
trusted library allocation
page read and write
1E34002C8000
trusted library allocation
page read and write
69600300B000
trusted library allocation
page read and write
3338009E4000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
696001FEC000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
3F3800358000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
76BC0316C000
trusted library allocation
page read and write
7D100080C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
5A4000
heap
page read and write
696000B8C000
trusted library allocation
page read and write
7D1001DA0000
trusted library allocation
page read and write
333800284000
trusted library allocation
page read and write
19EC00334000
trusted library allocation
page read and write
279649A4000
heap
page read and write
324001D74000
trusted library allocation
page read and write
199000
stack
page read and write
12F4002BC000
trusted library allocation
page read and write
7D1000724000
trusted library allocation
page read and write
3F3800390000
trusted library allocation
page read and write
1CF6FE7B000
heap
page read and write
324001EC0000
trusted library allocation
page read and write
3F3800384000
trusted library allocation
page read and write
22C875FA000
heap
page read and write
2C18002C8000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
33380061C000
trusted library allocation
page read and write
76BC03268000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
22C87663000
heap
page read and write
1EEAB02B000
heap
page read and write
22C87717000
heap
page read and write
22C874CE000
heap
page read and write
19EC0203A000
trusted library allocation
page read and write
4948002A8000
trusted library allocation
page read and write
333800730000
trusted library allocation
page read and write
1CF6FE55000
heap
page read and write
2C18002CC000
trusted library allocation
page read and write
3240009D4000
trusted library allocation
page read and write
4948002B8000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
1ED24A2B000
heap
page read and write
696001CB4000
trusted library allocation
page read and write
324001DF4000
trusted library allocation
page read and write
333801C74000
trusted library allocation
page read and write
19EC01EFC000
trusted library allocation
page read and write
324F000
stack
page read and write
7D1001D98000
trusted library allocation
page read and write
3338006A0000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
7D1001D40000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
4948002C8000
trusted library allocation
page read and write
696000E84000
trusted library allocation
page read and write
324001E90000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
1EEAB034000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC00788000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
324000730000
trusted library allocation
page read and write
33380060C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
69600061C000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
696000284000
trusted library allocation
page read and write
696000BA8000
trusted library allocation
page read and write
696000BD0000
trusted library allocation
page read and write
324001D9C000
trusted library allocation
page read and write
696002014000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
7D1001404000
trusted library allocation
page read and write
696001E3C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333800B68000
trusted library allocation
page read and write
19EC00730000
trusted library allocation
page read and write
1CF6FE27000
heap
page read and write
7D1000694000
trusted library allocation
page read and write
2C18002C4000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
27964912000
heap
page read and write
76BC039EC000
trusted library allocation
page read and write
1CF6FE55000
heap
page read and write
1ED24A2B000
heap
page read and write
7D1000AC8000
trusted library allocation
page read and write
6960022EC000
trusted library allocation
page read and write
19EC00A88000
trusted library allocation
page read and write
76BC039C8000
trusted library allocation
page read and write
76BC03654000
trusted library allocation
page read and write
12F4002D8000
trusted library allocation
page read and write
696001D7C000
trusted library allocation
page read and write
696001D3C000
trusted library allocation
page read and write
13583511000
heap
page read and write
1EEAB02B000
heap
page read and write
6960021BC000
trusted library allocation
page read and write
696001E0C000
trusted library allocation
page read and write
324001EC8000
trusted library allocation
page read and write
79D800634000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
696000A20000
trusted library allocation
page read and write
696000AE4000
trusted library allocation
page read and write
3F3800390000
trusted library allocation
page read and write
696002098000
trusted library allocation
page read and write
76BC04140000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
1CF6FE09000
heap
page read and write
1EEAB00C000
heap
page read and write
4B08002B8000
trusted library allocation
page read and write
696000EA4000
trusted library allocation
page read and write
19EC01CA0000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
3338020A0000
trusted library allocation
page read and write
696001DBC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
4BE0000
trusted library allocation
page read and write
324000770000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
76BC03A04000
trusted library allocation
page read and write
7D1002085000
trusted library allocation
page read and write
1CF6FE3C000
heap
page read and write
76BC031C4000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
19EC002CC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333801F30000
trusted library allocation
page read and write
32400205C000
trusted library allocation
page read and write
3F3800340000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
22C8786B000
heap
page read and write
76BC030C0000
trusted library allocation
page read and write
7D1000614000
trusted library allocation
page read and write
19EC00770000
trusted library allocation
page read and write
69600205C000
trusted library allocation
page read and write
1B6000244000
direct allocation
page read and write
1CF6FE66000
heap
page read and write
333800B0C000
trusted library allocation
page read and write
1EEAB034000
heap
page read and write
1CF6FE5D000
heap
page read and write
368C00408000
trusted library allocation
page read and write
6960009F0000
trusted library allocation
page read and write
19EC00AFC000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001D1C000
trusted library allocation
page read and write
76BC03074000
trusted library allocation
page read and write
76BC030C4000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
696000730000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
5FC000188000
trusted library allocation
page read and write
696000408000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
135FD93B000
heap
page read and write
22C875DF000
heap
page read and write
76BC0476C000
trusted library allocation
page read and write
22C87749000
heap
page read and write
1EEAB024000
heap
page read and write
1CF6FE2B000
heap
page read and write
33380200C000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
19EC00638000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
7930002A8000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
7D1001FF4000
trusted library allocation
page read and write
69600206C000
trusted library allocation
page read and write
696000B87000
trusted library allocation
page read and write
7D10009E4000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
1EEAB024000
heap
page read and write
368C0040C000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
6960009ED000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1358351F000
heap
page read and write
76BC03D6C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB010000
heap
page read and write
696000620000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
324002044000
trusted library allocation
page read and write
333801C54000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
333800A7C000
trusted library allocation
page read and write
696001DF4000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
19EC01D90000
trusted library allocation
page read and write
19EC01E1C000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
4B08002C8000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
333801EB4000
trusted library allocation
page read and write
19EC01088000
trusted library allocation
page read and write
19EC01F40000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
1358351B000
heap
page read and write
76BC02230000
trusted library allocation
page read and write
3F3800248000
trusted library allocation
page read and write
76BC04A04000
trusted library allocation
page read and write
19EC02204000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
22C875CE000
heap
page read and write
324001EA0000
trusted library allocation
page read and write
3F3801804000
trusted library allocation
page read and write
6960009BC000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
19EC0202A000
trusted library allocation
page read and write
22C87663000
heap
page read and write
3FB4002C8000
trusted library allocation
page read and write
2B00B661000
heap
page read and write
3588002C8000
trusted library allocation
page read and write
3240003C4000
trusted library allocation
page read and write
19EC01F50000
trusted library allocation
page read and write
76BC0405C000
trusted library allocation
page read and write
3240002D4000
trusted library allocation
page read and write
696000334000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
19EC01C90000
trusted library allocation
page read and write
7D1002064000
trusted library allocation
page read and write
76BC0320C000
trusted library allocation
page read and write
324001D54000
trusted library allocation
page read and write
32400204C000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1EEAB06F000
heap
page read and write
333800AC6000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
7D1001DA8000
trusted library allocation
page read and write
7D10007A4000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696000BD8000
trusted library allocation
page read and write
3240002DC000
trusted library allocation
page read and write
76BC04A04000
trusted library allocation
page read and write
79D800788000
trusted library allocation
page read and write
19EC01EBC000
trusted library allocation
page read and write
76BC030F4000
trusted library allocation
page read and write
2B00B62B000
heap
page read and write
22C8786B000
heap
page read and write
19EC01D28000
trusted library allocation
page read and write
3240008A4000
trusted library allocation
page read and write
19EC01DB0000
trusted library allocation
page read and write
696001DE4000
trusted library allocation
page read and write
69600238C000
trusted library allocation
page read and write
19EC002D4000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
333800ABC000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
2C18002CC000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
696002064000
trusted library allocation
page read and write
696000BF0000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
7D1001FE4000
trusted library allocation
page read and write
324000B94000
trusted library allocation
page read and write
19EC003D0000
trusted library allocation
page read and write
19EC01C70000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
7D10002CC000
trusted library allocation
page read and write
22C876EA000
heap
page read and write
333800620000
trusted library allocation
page read and write
324001CAC000
trusted library allocation
page read and write
696000BC8000
trusted library allocation
page read and write
333800A74000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
333802074000
trusted library allocation
page read and write
696001D64000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
324000788000
trusted library allocation
page read and write
22C87563000
heap
page read and write
3FB4002B8000
trusted library allocation
page read and write
25DE785C000
heap
page read and write
76BC03060000
trusted library allocation
page read and write
1ED24A75000
heap
page read and write
696002046000
trusted library allocation
page read and write
696000E40000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333801D64000
trusted library allocation
page read and write
1EEAB03C000
heap
page read and write
22C8772B000
heap
page read and write
19EC01EAC000
trusted library allocation
page read and write
3F38007A4000
trusted library allocation
page read and write
3338009E4000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
19EC01F78000
trusted library allocation
page read and write
1ED24A74000
heap
page read and write
324000AA4000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
696001DAC000
trusted library allocation
page read and write
696001F64000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE09000
heap
page read and write
19EC01568000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
19EC0140C000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
1EEAB024000
heap
page read and write
22C8786B000
heap
page read and write
3F3800804000
trusted library allocation
page read and write
7D1002044000
trusted library allocation
page read and write
333801DEC000
trusted library allocation
page read and write
324001EA8000
trusted library allocation
page read and write
76BC034E4000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
696002118000
trusted library allocation
page read and write
7C8000244000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
7FF7C9E08000
unkown
page readonly
22C87612000
heap
page read and write
3F38003A8000
trusted library allocation
page read and write
19EC00BA8000
trusted library allocation
page read and write
76BC02224000
trusted library allocation
page read and write
7D1001DE8000
trusted library allocation
page read and write
27964902000
heap
page read and write
79D800284000
trusted library allocation
page read and write
696000B89000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
324001D1C000
trusted library allocation
page read and write
696001FCC000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
76BC03E04000
trusted library allocation
page read and write
5FC00027C000
trusted library allocation
page read and write
333800654000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1CF6FE2B000
heap
page read and write
19EC01DC8000
trusted library allocation
page read and write
324001D1C000
trusted library allocation
page read and write
3A3C00244000
direct allocation
page read and write
333800BD8000
trusted library allocation
page read and write
3FB400280000
trusted library allocation
page read and write
19EC01D38000
trusted library allocation
page read and write
333801F80000
trusted library allocation
page read and write
4B08002CC000
trusted library allocation
page read and write
13583511000
heap
page read and write
1EEAB00B000
heap
page read and write
696001D9C000
trusted library allocation
page read and write
76BC03FDC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1CF6FE10000
heap
page read and write
1EEAB009000
heap
page read and write
324000BC4000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
7D1001FE4000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
333801DB4000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
76BC03924000
trusted library allocation
page read and write
562C00338000
trusted library allocation
page read and write
8EF000
stack
page read and write
135FD93B000
heap
page read and write
76BC03024000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC01D60000
trusted library allocation
page read and write
696000EAC000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
324001CD4000
trusted library allocation
page read and write
22C875DF000
heap
page read and write
22C874CE000
heap
page read and write
22C8755D000
heap
page read and write
1ED24A2B000
heap
page read and write
76BC0316C000
trusted library allocation
page read and write
3588002B8000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
76BC044D4000
trusted library allocation
page read and write
32400077C000
trusted library allocation
page read and write
333801204000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696000E28000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
19EC01DB8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC00E04000
trusted library allocation
page read and write
76BC044F0000
trusted library allocation
page read and write
2440000
heap
page read and write
22C87601000
heap
page read and write
696001E3C000
trusted library allocation
page read and write
1CF6FE7B000
heap
page read and write
1CF6FE24000
heap
page read and write
7D1001D70000
trusted library allocation
page read and write
333801DD4000
trusted library allocation
page read and write
624002EC000
direct allocation
page read and write
19EC003E8000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
135FD8E1000
heap
page read and write
22C8752C000
heap
page read and write
1ED24A2B000
heap
page read and write
696001FF4000
trusted library allocation
page read and write
324000730000
trusted library allocation
page read and write
696001004000
trusted library allocation
page read and write
3F380072C000
trusted library allocation
page read and write
62400326000
direct allocation
page read and write
696000614000
trusted library allocation
page read and write
1ED24A6E000
heap
page read and write
1EEAB010000
heap
page read and write
19EC02060000
trusted library allocation
page read and write
696001D5C000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
3F38003A8000
trusted library allocation
page read and write
696000AF8000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
76BC038CC000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
4B08002C8000
trusted library allocation
page read and write
333801DCC000
trusted library allocation
page read and write
19EC0105C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
22C87559000
heap
page read and write
3F3800378000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
69600028C000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
3F380036C000
trusted library allocation
page read and write
2A78002A4000
trusted library allocation
page read and write
7D1001D68000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
4B0800280000
trusted library allocation
page read and write
333800BC8000
trusted library allocation
page read and write
401000
unkown
page execute read
324001E34000
trusted library allocation
page read and write
76BC031C4000
trusted library allocation
page read and write
5FC000290000
trusted library allocation
page read and write
22C8788F000
heap
page read and write
696001C4C000
trusted library allocation
page read and write
3F380060C000
trusted library allocation
page read and write
7930002A4000
trusted library allocation
page read and write
5FC000138000
trusted library allocation
page read and write
2C18002A4000
trusted library allocation
page read and write
696001D14000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
19EC01CF8000
trusted library allocation
page read and write
696001E98000
trusted library allocation
page read and write
76BC04050000
trusted library allocation
page read and write
696001D8C000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
19EC0078C000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
7D1000A18000
trusted library allocation
page read and write
4948002C8000
trusted library allocation
page read and write
13583402000
heap
page read and write
76BC03024000
trusted library allocation
page read and write
324000E04000
trusted library allocation
page read and write
76BC034F4000
trusted library allocation
page read and write
135FD92F000
heap
page read and write
1EEAB024000
heap
page read and write
2754001CC000
trusted library allocation
page read and write
3F3800384000
trusted library allocation
page read and write
33380207C000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
19EC01CD0000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
333800A24000
trusted library allocation
page read and write
32400061C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
368C00338000
trusted library allocation
page read and write
19EC01D58000
trusted library allocation
page read and write
333801F48000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
7930002CC000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
19EC01FE8000
trusted library allocation
page read and write
324001D44000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
1EEAB00B000
heap
page read and write
324001404000
trusted library allocation
page read and write
22C87663000
heap
page read and write
333800BB0000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
4948002B8000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
696002178000
trusted library allocation
page read and write
76BC03654000
trusted library allocation
page read and write
324000284000
trusted library allocation
page read and write
324001D14000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
333802074000
trusted library allocation
page read and write
4E0000
heap
page read and write
324001C3C000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
22C87536000
heap
page read and write
1CF6FE28000
heap
page read and write
1CF6FE24000
heap
page read and write
333801DA4000
trusted library allocation
page read and write
7D1000770000
trusted library allocation
page read and write
2C1800294000
trusted library allocation
page read and write
696001DA4000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
3240009E6000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
76BC0366C000
trusted library allocation
page read and write
22C87561000
heap
page read and write
1CF6FE10000
heap
page read and write
1CF6FE66000
heap
page read and write
1ED24A2B000
heap
page read and write
19EC01078000
trusted library allocation
page read and write
1E34002D4000
trusted library allocation
page read and write
19EC009D4000
trusted library allocation
page read and write
696001D4C000
trusted library allocation
page read and write
333800334000
trusted library allocation
page read and write
470000
heap
page read and write
696002090000
trusted library allocation
page read and write
333801D8C000
trusted library allocation
page read and write
324001E78000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
1CF6FE24000
heap
page read and write
7D1002064000
trusted library allocation
page read and write
79D8003C4000
trusted library allocation
page read and write
22C8763D000
heap
page read and write
1ED24A2C000
heap
page read and write
696002054000
trusted library allocation
page read and write
69600207C000
trusted library allocation
page read and write
696001DDC000
trusted library allocation
page read and write
324001D84000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
333801DE4000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
25DD1A2B000
heap
page read and write
696001E44000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
7D100033C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
324000348000
trusted library allocation
page read and write
19EC01E1C000
trusted library allocation
page read and write
562C0030C000
trusted library allocation
page read and write
4948002B8000
trusted library allocation
page read and write
3F3801A04000
trusted library allocation
page read and write
62400310000
direct allocation
page read and write
7D1000788000
trusted library allocation
page read and write
76BC02BB8000
trusted library allocation
page read and write
19EC01D68000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
76BC03254000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
19EC003C4000
trusted library allocation
page read and write
2C18002B8000
trusted library allocation
page read and write
333800334000
trusted library allocation
page read and write
696000B86000
trusted library allocation
page read and write
525400244000
direct allocation
page read and write
7D1001204000
trusted library allocation
page read and write
3F3801404000
trusted library allocation
page read and write
13583511000
heap
page read and write
4948002C8000
trusted library allocation
page read and write
324002054000
trusted library allocation
page read and write
19EC00ABC000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE24000
heap
page read and write
696001DAC000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
76BC04004000
trusted library allocation
page read and write
5FC000120000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696000B74000
trusted library allocation
page read and write
22C875FB000
heap
page read and write
22C8785E000
heap
page read and write
19EC01CD8000
trusted library allocation
page read and write
333801CA4000
trusted library allocation
page read and write
7D1001F24000
trusted library allocation
page read and write
76BC05204000
trusted library allocation
page read and write
324001D34000
trusted library allocation
page read and write
3338003E8000
trusted library allocation
page read and write
32400205C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
696001E44000
trusted library allocation
page read and write
76BC030EC000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
76BC031DC000
trusted library allocation
page read and write
696001E90000
trusted library allocation
page read and write
19EC01E9C000
trusted library allocation
page read and write
333801EA4000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
333801CCC000
trusted library allocation
page read and write
76BC031B8000
trusted library allocation
page read and write
7D100204C000
trusted library allocation
page read and write
447C00240000
trusted library allocation
page read and write
333801CD4000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
79D80061C000
trusted library allocation
page read and write
12F400298000
trusted library allocation
page read and write
324001CE4000
trusted library allocation
page read and write
79D8003D0000
trusted library allocation
page read and write
19EC002CC000
trusted library allocation
page read and write
696001D64000
trusted library allocation
page read and write
19EC02048000
trusted library allocation
page read and write
696000E04000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
275400190000
trusted library allocation
page read and write
135FD929000
heap
page read and write
3588002A8000
trusted library allocation
page read and write
76BC03624000
trusted library allocation
page read and write
19EC01098000
trusted library allocation
page read and write
696001F84000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
7D1001D38000
trusted library allocation
page read and write
79D801404000
trusted library allocation
page read and write
3F3800378000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
76BC02434000
trusted library allocation
page read and write
79D800624000
trusted library allocation
page read and write
324001F4C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
79D800638000
trusted library allocation
page read and write
275400184000
trusted library allocation
page read and write
19EC00B80000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1EEAB024000
heap
page read and write
22C875CE000
heap
page read and write
76BC02434000
trusted library allocation
page read and write
4948002B8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1ED24A2B000
heap
page read and write
696000624000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
333801F40000
trusted library allocation
page read and write
324001C74000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
333801D1C000
trusted library allocation
page read and write
22C87742000
heap
page read and write
1EEAB02B000
heap
page read and write
333801D74000
trusted library allocation
page read and write
6960002A0000
trusted library allocation
page read and write
50F000
heap
page read and write
1CF6FE2C000
heap
page read and write
1EEAB02B000
heap
page read and write
7D1000674000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
22C87666000
heap
page read and write
19EC01FE8000
trusted library allocation
page read and write
3F3800358000
trusted library allocation
page read and write
696002234000
trusted library allocation
page read and write
2B00B624000
heap
page read and write
1CF6FE10000
heap
page read and write
1CF6FE76000
heap
page read and write
7D100028C000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
333800A0C000
trusted library allocation
page read and write
7D1000770000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
324000B8C000
trusted library allocation
page read and write
79D8007A4000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
1EEAB009000
heap
page read and write
22C874CE000
heap
page read and write
1EEAB02B000
heap
page read and write
333801D54000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
19EC00788000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
333801C84000
trusted library allocation
page read and write
76BC04604000
trusted library allocation
page read and write
62400338000
direct allocation
page read and write
696001C7C000
trusted library allocation
page read and write
19EC00AA4000
trusted library allocation
page read and write
13583502000
heap
page read and write
1CF6FE10000
heap
page read and write
7930002CC000
trusted library allocation
page read and write
13583602000
heap
page read and write
1CF6FE10000
heap
page read and write
76BC03980000
trusted library allocation
page read and write
1ED24A6A000
heap
page read and write
1ED24A2B000
heap
page read and write
4948002CC000
trusted library allocation
page read and write
22C8B5EC000
heap
page read and write
333800A38000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
1EEAB02B000
heap
page read and write
333801E14000
trusted library allocation
page read and write
696002C0B000
trusted library allocation
page read and write
22C85C6A000
heap
page read and write
696001DE4000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB009000
heap
page read and write
2C1800280000
trusted library allocation
page read and write
19EC00B61000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
135FD92F000
heap
page read and write
1ED24A2C000
heap
page read and write
7D100203C000
trusted library allocation
page read and write
793000280000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
696001CD4000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
1CF6FE09000
heap
page read and write
1CF6FE34000
heap
page read and write
1EEAB009000
heap
page read and write
1EEAB06B000
heap
page read and write
22C875DF000
heap
page read and write
324002090000
trusted library allocation
page read and write
1CF6FE74000
heap
page read and write
333801D84000
trusted library allocation
page read and write
333800AD4000
trusted library allocation
page read and write
324001DB4000
trusted library allocation
page read and write
76BC03D6C000
trusted library allocation
page read and write
7D100074C000
trusted library allocation
page read and write
3F3800248000
trusted library allocation
page read and write
1CF6FE57000
heap
page read and write
2754001CC000
trusted library allocation
page read and write
19EC00A0C000
trusted library allocation
page read and write
696001D4C000
trusted library allocation
page read and write
696002324000
trusted library allocation
page read and write
19EC01DE0000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
324002034000
trusted library allocation
page read and write
324001D64000
trusted library allocation
page read and write
1358351B000
heap
page read and write
22C87638000
heap
page read and write
696000718000
trusted library allocation
page read and write
76BC0405C000
trusted library allocation
page read and write
19EC00408000
trusted library allocation
page read and write
696002095000
trusted library allocation
page read and write
1CF6FE40000
heap
page read and write
333801C44000
trusted library allocation
page read and write
22C87559000
heap
page read and write
22C874B9000
heap
page read and write
3F380030C000
trusted library allocation
page read and write
22C875F7000
heap
page read and write
19EC00348000
trusted library allocation
page read and write
22C87666000
heap
page read and write
1CF6FE2B000
heap
page read and write
62400328000
direct allocation
page read and write
696000E1C000
trusted library allocation
page read and write
76BC034F4000
trusted library allocation
page read and write
1E3400298000
trusted library allocation
page read and write
696002064000
trusted library allocation
page read and write
333801EDC000
trusted library allocation
page read and write
2C18002C8000
trusted library allocation
page read and write
79D800624000
trusted library allocation
page read and write
3FB4002CC000
trusted library allocation
page read and write
3FB400280000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
79D800730000
trusted library allocation
page read and write
793000294000
trusted library allocation
page read and write
696001C3C000
trusted library allocation
page read and write
583000
heap
page read and write
1CF6FE24000
heap
page read and write
76BC02AB5000
trusted library allocation
page read and write
696001F44000
trusted library allocation
page read and write
19EC00B90000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333802090000
trusted library allocation
page read and write
76BC04604000
trusted library allocation
page read and write
76BC03218000
trusted library allocation
page read and write
76BC04804000
trusted library allocation
page read and write
79D80078C000
trusted library allocation
page read and write
696001D6C000
trusted library allocation
page read and write
324001D24000
trusted library allocation
page read and write
76BC03960000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
324002088000
trusted library allocation
page read and write
333800B44000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
135FD97A000
heap
page read and write
76BC03094000
trusted library allocation
page read and write
6960002CC000
trusted library allocation
page read and write
4FD000
heap
page read and write
3FB400280000
trusted library allocation
page read and write
19EC01F20000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
22C8772E000
heap
page read and write
4B08002B8000
trusted library allocation
page read and write
33380120C000
trusted library allocation
page read and write
19EC00828000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
76BC03094000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
5AB000
heap
page read and write
3F3800384000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
76BC03FDC000
trusted library allocation
page read and write
1EEAB00B000
heap
page read and write
3338009ED000
trusted library allocation
page read and write
3338002DC000
trusted library allocation
page read and write
69600061C000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
2754000FC000
trusted library allocation
page read and write
3338009D8000
trusted library allocation
page read and write
534000
heap
page read and write
19EC0061C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE2B000
heap
page read and write
4C18002D0000
trusted library allocation
page read and write
76BC03088000
trusted library allocation
page read and write
19EC01C80000
trusted library allocation
page read and write
62400321000
direct allocation
page read and write
32400078C000
trusted library allocation
page read and write
22C8772B000
heap
page read and write
22C87757000
heap
page read and write
76BC039E0000
trusted library allocation
page read and write
1CF6FE3C000
heap
page read and write
333801EC4000
trusted library allocation
page read and write
76BC04050000
trusted library allocation
page read and write
368C00324000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
19EC014C4000
trusted library allocation
page read and write
358800280000
trusted library allocation
page read and write
6960007C0000
trusted library allocation
page read and write
19EC00B98000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
333801EEC000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
76BC03218000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
19EC02068000
trusted library allocation
page read and write
333802036000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
7FF7C99E1000
unkown
page readonly
5FC00027C000
trusted library allocation
page read and write
1ED24A7C000
heap
page read and write
696000E9C000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
2A7800280000
trusted library allocation
page read and write
76BC05004000
trusted library allocation
page read and write
6960006A0000
trusted library allocation
page read and write
7C8000290000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
19EC02A0B000
trusted library allocation
page read and write
4C18002A0000
trusted library allocation
page read and write
3240009DC000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
7D1002054000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
324002024000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
1ED24A2C000
heap
page read and write
1CF6FE57000
heap
page read and write
696000E7C000
trusted library allocation
page read and write
79D800614000
trusted library allocation
page read and write
76BC03654000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
3FB4002A4000
trusted library allocation
page read and write
76BC03218000
trusted library allocation
page read and write
1ED24A5F000
heap
page read and write
2B00B656000
heap
page read and write
19EC02058000
trusted library allocation
page read and write
19EC006AC000
trusted library allocation
page read and write
6960009E4000
trusted library allocation
page read and write
76BC02A95000
trusted library allocation
page read and write
408000
unkown
page readonly
19EC00718000
trusted library allocation
page read and write
76BC043C4000
trusted library allocation
page read and write
76BC043B8000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
22C87742000
heap
page read and write
19EC009DC000
trusted library allocation
page read and write
494800294000
trusted library allocation
page read and write
333801CD4000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696000624000
trusted library allocation
page read and write
1CF6FE73000
heap
page read and write
272F000
stack
page read and write
76BC044E0000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
135FF702000
heap
page read and write
22C8785E000
heap
page read and write
333800A88000
trusted library allocation
page read and write
19EC01CE0000
trusted library allocation
page read and write
135FD944000
heap
page read and write
333801CC4000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
1EEAB02B000
heap
page read and write
333800770000
trusted library allocation
page read and write
333802054000
trusted library allocation
page read and write
28100040000
trusted library allocation
page read and write
22C8785E000
heap
page read and write
1CF6FE2B000
heap
page read and write
22C8785B000
heap
page read and write
333800684000
trusted library allocation
page read and write
76BC03230000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
333801FE0000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
76BC03054000
trusted library allocation
page read and write
333801C94000
trusted library allocation
page read and write
19EC01EE4000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
32400061C000
trusted library allocation
page read and write
3F380060C000
trusted library allocation
page read and write
324002088000
trusted library allocation
page read and write
22C876EB000
heap
page read and write
333801DCC000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
3338006AC000
trusted library allocation
page read and write
69600209C000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1EEAB009000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
333800A54000
trusted library allocation
page read and write
19EC007A4000
trusted library allocation
page read and write
324000BF4000
trusted library allocation
page read and write
696001DA4000
trusted library allocation
page read and write
1ED24A6A000
heap
page read and write
76BC030EC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
2B00B665000
heap
page read and write
3F380036C000
trusted library allocation
page read and write
324000A18000
trusted library allocation
page read and write
25DE7360000
remote allocation
page read and write
333800ABC000
trusted library allocation
page read and write
22C874CE000
heap
page read and write
7D1000334000
trusted library allocation
page read and write
696001CAC000
trusted library allocation
page read and write
22C875AE000
heap
page read and write
69600202C000
trusted library allocation
page read and write
333800AEC000
trusted library allocation
page read and write
7930002C8000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
696001E68000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
7D1001D20000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
7D1001D88000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
3338009DA000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
1ED24A24000
heap
page read and write
19EC02089000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
494800280000
trusted library allocation
page read and write
2C18002A4000
trusted library allocation
page read and write
696001EF8000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
22C85C2C000
heap
page read and write
1ED24A6F000
heap
page read and write
1CF6FE6E000
heap
page read and write
33380205C000
trusted library allocation
page read and write
76BC03218000
trusted library allocation
page read and write
696000E54000
trusted library allocation
page read and write
6960003D0000
trusted library allocation
page read and write
6960006A0000
trusted library allocation
page read and write
135FD89B000
heap
page read and write
333800724000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
1EEAB02B000
heap
page read and write
577000
heap
page read and write
22C8BC01000
heap
page read and write
19EC00B68000
trusted library allocation
page read and write
22C875DB000
heap
page read and write
25DD14F0000
remote allocation
page read and write
1ED24A73000
heap
page read and write
7D1001DD0000
trusted library allocation
page read and write
324002054000
trusted library allocation
page read and write
33380077C000
trusted library allocation
page read and write
696000BC0000
trusted library allocation
page read and write
696000AAC000
trusted library allocation
page read and write
76BC047F0000
trusted library allocation
page read and write
33380031C000
trusted library allocation
page read and write
3FB4002A4000
trusted library allocation
page read and write
324001CC4000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
3338002D4000
trusted library allocation
page read and write
32400204C000
trusted library allocation
page read and write
7D1002036000
trusted library allocation
page read and write
76BC02478000
trusted library allocation
page read and write
7D1000A8C000
trusted library allocation
page read and write
19EC01094000
trusted library allocation
page read and write
22C87561000
heap
page read and write
22C8B5E5000
heap
page read and write
1CF6FE6F000
heap
page read and write
333801FE8000
trusted library allocation
page read and write
7C8000314000
trusted library allocation
page read and write
19EC01C78000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
562C00324000
trusted library allocation
page read and write
76BC02A64000
trusted library allocation
page read and write
1EEAB06E000
heap
page read and write
3F380030C000
trusted library allocation
page read and write
1CF6FE0B000
heap
page read and write
333801C1C000
trusted library allocation
page read and write
525400298000
direct allocation
page read and write
1CF6FE2B000
heap
page read and write
1ED24A6D000
heap
page read and write
793000294000
trusted library allocation
page read and write
19EC00334000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1EEAB068000
heap
page read and write
3240003D0000
trusted library allocation
page read and write
22C874C7000
heap
page read and write
4948002A4000
trusted library allocation
page read and write
22C874DD000
heap
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE34000
heap
page read and write
76BC03930000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
324001DC4000
trusted library allocation
page read and write
76BC03060000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
696001E34000
trusted library allocation
page read and write
696001E3C000
trusted library allocation
page read and write
4B08002C8000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
1ED24A24000
heap
page read and write
1ED24A2B000
heap
page read and write
1CF6FE0E000
heap
page read and write
1EEAB024000
heap
page read and write
22C8785B000
heap
page read and write
1ED24A2B000
heap
page read and write
22C87536000
heap
page read and write
19EC01E3C000
trusted library allocation
page read and write
696001C2C000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
62400318000
direct allocation
page read and write
435000
unkown
page read and write
1CF6FE0B000
heap
page read and write
3F38007A4000
trusted library allocation
page read and write
135FD978000
heap
page read and write
3F3801604000
trusted library allocation
page read and write
22C87645000
heap
page read and write
1EEAB026000
heap
page read and write
333801CAC000
trusted library allocation
page read and write
1ED24A5E000
heap
page read and write
3F3800340000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
33380205C000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
333800B1C000
trusted library allocation
page read and write
1ED24A0A000
heap
page read and write
7D10006AC000
trusted library allocation
page read and write
76BC04E04000
trusted library allocation
page read and write
7D1001EF8000
trusted library allocation
page read and write
19EC01C98000
trusted library allocation
page read and write
76BC036A4000
trusted library allocation
page read and write
4948002A4000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
333802064000
trusted library allocation
page read and write
19EC01E14000
trusted library allocation
page read and write
22C8766B000
heap
page read and write
135FD970000
heap
page read and write
333801D24000
trusted library allocation
page read and write
7D1002026000
trusted library allocation
page read and write
19EC01C68000
trusted library allocation
page read and write
324001EE0000
trusted library allocation
page read and write
333801CB4000
trusted library allocation
page read and write
333802064000
trusted library allocation
page read and write
1EEAB025000
heap
page read and write
27964902000
heap
page read and write
22C8BBF9000
heap
page read and write
19EC01CA8000
trusted library allocation
page read and write
696001DEC000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
7D100074C000
trusted library allocation
page read and write
6960007D8000
trusted library allocation
page read and write
3F3800384000
trusted library allocation
page read and write
696000824000
trusted library allocation
page read and write
696001E78000
trusted library allocation
page read and write
494800280000
trusted library allocation
page read and write
324000638000
trusted library allocation
page read and write
696000B90000
trusted library allocation
page read and write
19EC006AC000
trusted library allocation
page read and write
62400244000
direct allocation
page read and write
76BC04204000
trusted library allocation
page read and write
7D1002064000
trusted library allocation
page read and write
19EC02068000
trusted library allocation
page read and write
696000EB4000
trusted library allocation
page read and write
4B08002CC000
trusted library allocation
page read and write
333801CF4000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
1EEAB02B000
heap
page read and write
1EEAB010000
heap
page read and write
76BC03088000
trusted library allocation
page read and write
696001FF4000
trusted library allocation
page read and write
1EEAABE0000
remote allocation
page read and write
7930002A4000
trusted library allocation
page read and write
19EC01E7C000
trusted library allocation
page read and write
1CF6FE2C000
heap
page read and write
7EE000
stack
page read and write
76BC02804000
trusted library allocation
page read and write
696001CFC000
trusted library allocation
page read and write
6240031B000
direct allocation
page read and write
696001D44000
trusted library allocation
page read and write
19EC002DC000
trusted library allocation
page read and write
314800298000
trusted library allocation
page read and write
696001480000
trusted library allocation
page read and write
7930002A4000
trusted library allocation
page read and write
19EC0078C000
trusted library allocation
page read and write
7D1000684000
trusted library allocation
page read and write
1EEAB02C000
heap
page read and write
1ED24A0E000
heap
page read and write
19EC00BB0000
trusted library allocation
page read and write
135FD94E000
heap
page read and write
76BC03D4C000
trusted library allocation
page read and write
898002B4000
direct allocation
page read and write
76BC035F0000
trusted library allocation
page read and write
13583511000
heap
page read and write
333802064000
trusted library allocation
page read and write
3F3800390000
trusted library allocation
page read and write
1ED24A5F000
heap
page read and write
696000B87000
trusted library allocation
page read and write
324001D64000
trusted library allocation
page read and write
22C8785B000
heap
page read and write
333801F28000
trusted library allocation
page read and write
333800890000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
1CF6FE5E000
heap
page read and write
1CF6FE72000
heap
page read and write
5FC000134000
trusted library allocation
page read and write
32400061C000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
2C1800280000
trusted library allocation
page read and write
793000280000
trusted library allocation
page read and write
22C8B5E6000
heap
page read and write
7D1001F14000
trusted library allocation
page read and write
537000
heap
page read and write
22C8764A000
heap
page read and write
22C8785E000
heap
page read and write
22C87601000
heap
page read and write
5A1000
heap
page read and write
76BC03694000
trusted library allocation
page read and write
3F3800C04000
trusted library allocation
page read and write
3A00000C000
trusted library allocation
page read and write
7D1001DB0000
trusted library allocation
page read and write
76BC02804000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
3240006AC000
trusted library allocation
page read and write
76BC030EC000
trusted library allocation
page read and write
324001F44000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
333801CDC000
trusted library allocation
page read and write
2A7800294000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
324001DA4000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
32400205C000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
7930002C4000
trusted library allocation
page read and write
3F3800774000
trusted library allocation
page read and write
3588002C8000
trusted library allocation
page read and write
696001F5C000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
22C875CE000
heap
page read and write
79D800724000
trusted library allocation
page read and write
696001D44000
trusted library allocation
page read and write
333800BB0000
trusted library allocation
page read and write
7930002A4000
trusted library allocation
page read and write
2C1800280000
trusted library allocation
page read and write
76BC04470000
trusted library allocation
page read and write
76BC03504000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
19EC01688000
trusted library allocation
page read and write
19EC01054000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
1CF6FE2B000
heap
page read and write
1CF6FE34000
heap
page read and write
3F380072C000
trusted library allocation
page read and write
62400338000
direct allocation
page read and write
333800AA4000
trusted library allocation
page read and write
79D8006A0000
trusted library allocation
page read and write
7D100206C000
trusted library allocation
page read and write
1EEAB082000
heap
page read and write
7D1002064000
trusted library allocation
page read and write
333802036000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
22C87610000
heap
page read and write
7D10008A4000
trusted library allocation
page read and write
22C875F6000
heap
page read and write
1CF6FE10000
heap
page read and write
7D1000818000
trusted library allocation
page read and write
5A1000
heap
page read and write
7D1000AB0000
trusted library allocation
page read and write
22C87655000
heap
page read and write
4C18002F4000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
324001CEC000
trusted library allocation
page read and write
79D8002D4000
trusted library allocation
page read and write
22C874D1000
heap
page read and write
3F3801604000
trusted library allocation
page read and write
333802138000
trusted library allocation
page read and write
3148002D4000
trusted library allocation
page read and write
135FD94C000
heap
page read and write
333801FF0000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
135FD944000
heap
page read and write
135FD92A000
heap
page read and write
76BC03060000
trusted library allocation
page read and write
7930002A4000
trusted library allocation
page read and write
696002046000
trusted library allocation
page read and write
2C1800280000
trusted library allocation
page read and write
2C18002B8000
trusted library allocation
page read and write
79D8002A0000
trusted library allocation
page read and write
333801CE4000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
562C00358000
trusted library allocation
page read and write
324000BE4000
trusted library allocation
page read and write
368C00324000
trusted library allocation
page read and write
696001F3C000
trusted library allocation
page read and write
22C87536000
heap
page read and write
368C00358000
trusted library allocation
page read and write
79D800694000
trusted library allocation
page read and write
32400202E000
trusted library allocation
page read and write
1EEAB02B000
heap
page read and write
76BC02A64000
trusted library allocation
page read and write
333801FF0000
trusted library allocation
page read and write
76BC0363C000
trusted library allocation
page read and write
7D100060C000
trusted library allocation
page read and write
333801DDC000
trusted library allocation
page read and write
696002090000
trusted library allocation
page read and write
324000BCC000
trusted library allocation
page read and write
537000
heap
page read and write
368C0032C000
trusted library allocation
page read and write
324000A88000
trusted library allocation
page read and write
324001C94000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
696001C84000
trusted library allocation
page read and write
333800B70000
trusted library allocation
page read and write
324001FBC000
trusted library allocation
page read and write
79D8002A0000
trusted library allocation
page read and write
1358351B000
heap
page read and write
69600074C000
trusted library allocation
page read and write
3F3800A04000
trusted library allocation
page read and write
22C87749000
heap
page read and write
333801DF4000
trusted library allocation
page read and write
76BC02C58000
trusted library allocation
page read and write
19EC01DA0000
trusted library allocation
page read and write
494800294000
trusted library allocation
page read and write
494800294000
trusted library allocation
page read and write
324002090000
trusted library allocation
page read and write
22C877FA000
heap
page read and write
6960020A0000
trusted library allocation
page read and write
76BC03094000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
19EC01FC0000
trusted library allocation
page read and write
333800B54000
trusted library allocation
page read and write
696000E78000
trusted library allocation
page read and write
19EC00A6C000
trusted library allocation
page read and write
1ED24A24000
heap
page read and write
793000280000
trusted library allocation
page read and write
3F380030C000
trusted library allocation
page read and write
696000B24000
trusted library allocation
page read and write
696000E6C000
trusted library allocation
page read and write
79D800ACC000
trusted library allocation
page read and write
333800B14000
trusted library allocation
page read and write
3588002A4000
trusted library allocation
page read and write
696000B87000
trusted library allocation
page read and write
696001CDC000
trusted library allocation
page read and write
696001C44000
trusted library allocation
page read and write
7D100201C000
trusted library allocation
page read and write
22C874C6000
heap
page read and write
7D1001FBC000
trusted library allocation
page read and write
13583511000
heap
page read and write
1ED24A25000
heap
page read and write
19EC01F68000
trusted library allocation
page read and write
333801C5C000
trusted library allocation
page read and write
1EEAB024000
heap
page read and write
333801CEC000
trusted library allocation
page read and write
7D100074C000
trusted library allocation
page read and write
793000294000
trusted library allocation
page read and write
19EC009EA000
trusted library allocation
page read and write
324001D2C000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
1ED24A2B000
heap
page read and write
1CF6FE0B000
heap
page read and write
333800890000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
4B08002A4000
trusted library allocation
page read and write
696000BE0000
trusted library allocation
page read and write
69600040C000
trusted library allocation
page read and write
76BC03030000
trusted library allocation
page read and write
19EC01500000
trusted library allocation
page read and write
333800C04000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
696001C6C000
trusted library allocation
page read and write
79D80074C000
trusted library allocation
page read and write
3F380034C000
trusted library allocation
page read and write
696001FDC000
trusted library allocation
page read and write
333800AC0000
trusted library allocation
page read and write
7D100060C000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
7D1001FE4000
trusted library allocation
page read and write
76BC04070000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
69600238C000
trusted library allocation
page read and write
696000B4C000
trusted library allocation
page read and write
22C85C5F000
heap
page read and write
447C0028C000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
76BC04090000
trusted library allocation
page read and write
4B08002A4000
trusted library allocation
page read and write
1EEAB034000
heap
page read and write
22C8762B000
heap
page read and write
324000730000
trusted library allocation
page read and write
1ED24A6B000
heap
page read and write
7D1001D48000
trusted library allocation
page read and write
4948002CC000
trusted library allocation
page read and write
1EEAB072000
heap
page read and write
33380074C000
trusted library allocation
page read and write
19EC00B28000
trusted library allocation
page read and write
333801D74000
trusted library allocation
page read and write
76BC03A04000
trusted library allocation
page read and write
76BC0443C000
trusted library allocation
page read and write
3F380078C000
trusted library allocation
page read and write
1EEAB034000
heap
page read and write
76BC03654000
trusted library allocation
page read and write
76BC0367C000
trusted library allocation
page read and write
7D1001D60000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
3809000
heap
page read and write
19EC01D38000
trusted library allocation
page read and write
696000AF8000
trusted library allocation
page read and write
22C8786B000
heap
page read and write
324000A2C000
trusted library allocation
page read and write
1ED24A7E000
heap
page read and write
324001DA4000
trusted library allocation
page read and write
696001D84000
trusted library allocation
page read and write
79D80078C000
trusted library allocation
page read and write
22C8784B000
heap
page read and write
7AF000
stack
page read and write
19EC00614000
trusted library allocation
page read and write
22C878F2000
heap
page read and write
40A000
unkown
page write copy
1CF6FE2B000
heap
page read and write
7D1000A2C000
trusted library allocation
page read and write
1ED24A2C000
heap
page read and write
22C8785E000
heap
page read and write
1ED24A24000
heap
page read and write
19EC00B61000
trusted library allocation
page read and write
3F3800334000
trusted library allocation
page read and write
4C18002D0000
trusted library allocation
page read and write
12F400240000
trusted library allocation
page read and write
1EEAB009000
heap
page read and write
19EC01070000
trusted library allocation
page read and write
76BC04404000
trusted library allocation
page read and write
19EC00AD4000
trusted library allocation
page read and write
324001CDC000
trusted library allocation
page read and write
1ED24A2B000
heap
page read and write
333800AC8000
trusted library allocation
page read and write
76BC03158000
trusted library allocation
page read and write
696001404000
trusted library allocation
page read and write
1ED24A28000
heap
page read and write
1ED24A24000
heap
page read and write
32400206C000
trusted library allocation
page read and write
19EC00B38000
trusted library allocation
page read and write
7D1000A0C000
trusted library allocation
page read and write
7D10002CC000
trusted library allocation
page read and write
324000A2C000
trusted library allocation
page read and write
1EEAB010000
heap
page read and write
7C8000370000
trusted library allocation
page read and write
19EC03004000
trusted library allocation
page read and write
22C8773F000
heap
page read and write
3338008A0000
trusted library allocation
page read and write
324001DE4000
trusted library allocation
page read and write
19EC01E8C000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
2A7800280000
trusted library allocation
page read and write
696000730000
trusted library allocation
page read and write
1CF6FE34000
heap
page read and write
1CF6FE24000
heap
page read and write
135FD980000
heap
page read and write
22C8B7ED000
heap
page read and write
324001FEC000
trusted library allocation
page read and write
22C875F5000
heap
page read and write
1EEAB010000
heap
page read and write
1358351B000
heap
page read and write
333802095000
trusted library allocation
page read and write
69600074C000
trusted library allocation
page read and write
696000A14000
trusted library allocation
page read and write
19EC01084000
trusted library allocation
page read and write
76BC02230000
trusted library allocation
page read and write
333801C64000
trusted library allocation
page read and write
76BC044F0000
trusted library allocation
page read and write
1CF6FE7A000
heap
page read and write
22C8A80E000
heap
page read and write
76BC03D84000
trusted library allocation
page read and write
324001FC4000
trusted library allocation
page read and write
324001DEC000
trusted library allocation
page read and write
20F0000
heap
page read and write
333801D14000
trusted library allocation
page read and write
1CF6FE2B000
heap
page read and write
7D1000A40000
trusted library allocation
page read and write
1ED24A57000
heap
page read and write
1EEAB010000
heap
page read and write
324000C04000
trusted library allocation
page read and write
696000634000
trusted library allocation
page read and write
7D1000624000
trusted library allocation
page read and write
1CF6FE09000
heap
page read and write
3F380030C000
trusted library allocation
page read and write
76BC031D0000
trusted library allocation
page read and write
79D80060C000
trusted library allocation
page read and write
7D1002044000
trusted library allocation
page read and write
7D1001CD8000
trusted library allocation
page read and write
696000B58000
trusted library allocation
page read and write
1CF6FE10000
heap
page read and write
19EC0220B000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
22C87647000
heap
page read and write
1CF6FE2B000
heap
page read and write
76BC03C9C000
trusted library allocation
page read and write
696001CF4000
trusted library allocation
page read and write
76BC03FC4000
trusted library allocation
page read and write
3F3801804000
trusted library allocation
page read and write
1ED24A66000
heap
page read and write
458000
unkown
page readonly
530000
heap
page read and write
22C875DF000
heap
page read and write
76BC03604000
trusted library allocation
page read and write
696001CE4000
trusted library allocation
page read and write
358800294000
trusted library allocation
page read and write
3FB400280000
trusted library allocation
page read and write
3F3800390000
trusted library allocation
page read and write
19EC01D68000
trusted library allocation
page read and write
1ED24A34000
heap
page read and write
7930002A4000
trusted library allocation
page read and write
22C875CE000
heap
page read and write
76BC0360C000
trusted library allocation
page read and write
1CF6FE25000
heap
page read and write
19EC01C3C000
trusted library allocation
page read and write
79D800828000
trusted library allocation
page read and write
22C8755D000
heap
page read and write
1EEAB025000
heap
page read and write
1EEAB00B000
heap
page read and write
696001E1C000
trusted library allocation
page read and write
19EC02094000
trusted library allocation
page read and write
7D1001D80000
trusted library allocation
page read and write
1ED24A09000
heap
page read and write
76BC03C90000
trusted library allocation
page read and write
696001D2C000
trusted library allocation
page read and write
19EC01DA8000
trusted library allocation
page read and write
1CF6FE24000
heap
page read and write
76BC04744000
trusted library allocation
page read and write
19EC01C44000
trusted library allocation
page read and write
696002074000
trusted library allocation
page read and write
19EC01F60000
trusted library allocation
page read and write
333801DBC000
trusted library allocation
page read and write
135FD928000
heap
page read and write
6960003E8000
trusted library allocation
page read and write
32400205C000
trusted library allocation
page read and write
76BC02434000
trusted library allocation
page read and write
696001EA0000
trusted library allocation
page read and write
4B0800280000
trusted library allocation
page read and write
3F3800804000
trusted library allocation
page read and write
1358351B000
heap
page read and write
333802194000
trusted library allocation
page read and write
22C87561000
heap
page read and write
696001E14000
trusted library allocation
page read and write
333802090000
trusted library allocation
page read and write
7930002A4000
trusted library allocation
page read and write
3F3801A04000
trusted library allocation
page read and write
696000B8F000
trusted library allocation
page read and write
3F380031C000
trusted library allocation
page read and write
696000BD8000
trusted library allocation
page read and write
22C85C6B000
heap
page read and write
19EC01404000
trusted library allocation
page read and write
79D8006AC000
trusted library allocation
page read and write
There are 4113 hidden memdumps, click here to show them.