IOC Report
Acrobat_Set-Up.exe

loading gif

Files

File Path
Type
Category
Malicious
Acrobat_Set-Up.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
C:\Users\user\AppData\Local\Adobe\OOBE\temp_lbs_wid
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\0c2d5f50-8a95-4e0c-8b54-e8e6019d852b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\20b92d62-4505-4813-ba8d-bda87ccaae91.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\246e5af5-543e-4ea6-96b0-650f8a3dd3c7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\683c1b7b-391b-41cc-af6c-71ea7e6dd6cf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\9aeedc40-feb7-4d59-b722-300198d00ee4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\BrowserMetrics\BrowserMetrics-6627A7B5-186C.pma
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\06944c8b-f33e-4945-af5c-97ba3cdb9162.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\700ce78d-e75d-4be8-8517-22518dac8c59.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\747c2a65-f645-49bc-a635-33d25cc7e7fb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\9035c84d-7a50-48c7-8620-f7eea2c27ce9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_1
dBase III DBT, next free block index 3238316739, block length 1024
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\f_000001
ASCII text, with very long lines (56817), with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\f_000002
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\000003.log
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\08bbae67-de78-403e-a7bc-3cd172250127.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\2f03eb65-eec8-49aa-8690-cf052f7529b0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\61321346-270c-4cc9-9630-5d9d9f774c43.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\8038bf5e-aaa9-483c-86ed-c977e748a098.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Network Persistent State~RF5bc401.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\SCT Auditing Pending Reports~RF5a9e2e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\d0da46ef-3344-4d0e-a977-68aacf411a9e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF5aee42.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF5b3964.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF5bae94.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF5bed91.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF5c1ef2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\bfcd00a1-1317-4517-9d1f-00778d79a67b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\d08a1961-39ee-4e3e-bd94-066f3aedd3b3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\f7f716dc-6efd-435d-8ffb-f065053b195d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5a9a56.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5a9aa4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5ac185.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5aee71.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5b2139.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5bab39.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5bed91.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF5c1d7b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_1
data
modified
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\a2033f1e-8326-4295-a3e6-1237f76ac1e7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ac3ddb9a-df58-4c65-92bf-4b4683074890.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\f6483211-b06a-4d2b-aa56-c4863b4b198e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\f90d0c7a-95cc-4870-b456-469ed9f5d134.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\8035cd88-bf56-45ea-b7dd-cc1f62998e1c.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 150990
modified
C:\Users\user\AppData\Local\Temp\Adobe\com.adobe.dunamis\dunamis-2024-04-23_13-58-07.log
ASCII text, with very long lines (2239), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\CreativeCloud\ACC\WAM.log
Unicode text, UTF-16, little-endian text, with very long lines (780), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\NGL\NGLClient_CreativeCloudInstaller1.ngllogcontrolconfig
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\CCDInstaller.js
Unicode text, UTF-8 text, with very long lines (62606)
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\327092cb-7f18-4ad4-b863-0aaaf0bd00c1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\32e12faa-3ebe-4c62-adcf-aa12aa5109e1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\3bcb34dc-59d3-43b8-a984-1e11dc1e9167.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\614bbc1e-aec7-4a6a-b095-8d15f7bd62d2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\BrowserMetrics\BrowserMetrics-6627A7B5-1858.pma
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\7f6e7202-2cf6-4685-a6d0-cb11cba33fba.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\80d174d6-a239-4399-b931-f1187753e0f2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\82908eac-e8c3-40bd-9f37-5d51c188478c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\94c39bf2-3fae-4fd6-9fa6-04c982f5d02b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\f_000001
ASCII text, with very long lines (15202)
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\f_000002
Unicode text, UTF-8 text, with very long lines (2258)
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\f_000003
Web Open Font Format (Version 2), CFF, length 29924, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\f_000004
Web Open Font Format (Version 2), CFF, length 29752, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\f_000005
Web Open Font Format (Version 2), CFF, length 29980, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\0d86d14abb8a9b82_0
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\57f4103eee7bc7de_0
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF5c10c9.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 11, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\7799a0be-ece6-4bf9-a043-be7e252b4890.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\857c7c6f-3ab6-42d1-8224-2412f9bdaa20.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Network Persistent State~RF5bc430.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Network Persistent State~RF5bf273.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\SCT Auditing Pending Reports~RF5a9c69.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\b80c379d-4226-43f6-a8b3-3236a7bbc8e3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\c9a0bc58-d81c-428e-8a74-cc2f58e7120c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\d0fc81b2-4dd8-42de-88c9-0aa1af76c1a5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\e34760d4-ffd6-46a8-b2ef-3dd82f829af3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Network\f42a6a67-4c96-409d-b07b-10277ea98b03.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Preferences~RF5b3974.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Preferences~RF5bac04.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Preferences~RF5bf978.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\af0bd8b4-8503-46c6-b61f-4ed13820e32b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\be020351-6ebf-4d90-a8b2-d4bcaefc7897.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Local State~RF5a9a75.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Local State~RF5a9aa4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Local State~RF5ac194.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Local State~RF5bab49.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\dcec621c-167d-4d00-8b5c-c6264d82d900.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\e68dbb07-0987-4d0f-b091-6b883550882b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\index.css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\index.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 11:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 11:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 11:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 11:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 11:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\anon_events\57104e0c-9f8e-47ed-b1e2-44ef624dfdee
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\anon_events\manifest
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\meta_events\cc4e5d2c-7cf4-4484-ab7e-f93af5f763cb
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\meta_events\manifest
data
dropped
Chrome Cache Entry: 374
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 375
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 376
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 377
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 378
PNG image data, 130 x 130, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 379
JSON data
downloaded
Chrome Cache Entry: 380
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 381
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 382
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 383
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 384
Web Open Font Format (Version 2), CFF, length 29924, version 1.0
downloaded
Chrome Cache Entry: 385
Unicode text, UTF-8 text, with very long lines (65301)
downloaded
Chrome Cache Entry: 386
HTML document, ASCII text, with very long lines (27719)
downloaded
Chrome Cache Entry: 387
Web Open Font Format (Version 2), CFF, length 29980, version 1.0
downloaded
Chrome Cache Entry: 388
JSON data
downloaded
Chrome Cache Entry: 389
JSON data
downloaded
Chrome Cache Entry: 390
JSON data
downloaded
Chrome Cache Entry: 391
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 392
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 393
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 394
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 395
Web Open Font Format (Version 2), CFF, length 29752, version 1.0
downloaded
Chrome Cache Entry: 396
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1920x1021, components 3
downloaded
Chrome Cache Entry: 397
Unicode text, UTF-8 text, with very long lines (2258)
downloaded
There are 348 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Acrobat_Set-Up.exe
"C:\Users\user\Desktop\Acrobat_Set-Up.exe"
malicious
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7120.3704.2969330007224903732
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --user-data-dir="C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7120.3704.15780253181535569594
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x164,0x168,0x16c,0x138,0x174,0x7fff29218e88,0x7fff29218e98,0x7fff29218ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x94,0x90,0x164,0x140,0x16c,0x7fff29218e88,0x7fff29218e98,0x7fff29218ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1720 --field-trial-handle=1768,i,4786160727941044250,14140855105767868577,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1692 --field-trial-handle=1752,i,2662396099899240214,5277756164113649263,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2608 --field-trial-handle=1768,i,4786160727941044250,14140855105767868577,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2792 --field-trial-handle=1752,i,2662396099899240214,5277756164113649263,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2996 --field-trial-handle=1752,i,2662396099899240214,5277756164113649263,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3092 --field-trial-handle=1768,i,4786160727941044250,14140855105767868577,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{81C46B9D-6F6A-45F1-B1BA-FDE9EFE16C58}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1713868932659041 --launch-time-ticks=5938642361 --mojo-platform-channel-handle=3344 --field-trial-handle=1752,i,2662396099899240214,5277756164113649263,262144 --enable-features=MojoIpcz /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1713868932661189 --launch-time-ticks=5938642261 --mojo-platform-channel-handle=3340 --field-trial-handle=1768,i,4786160727941044250,14140855105767868577,262144 --enable-features=MojoIpcz /prefetch:1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C start chrome "https://ims-na1.adobelogin.com/ims/authorize?client_id=CreativeCloudInstallerWeb_v1_0&scope=allow_ac_dt_exchange%2Copenid%2CAdobeID%2Ccreative_cloud%2Ccreative_sdk%2Cread_organizations%2Csao.cce_private%2Cadditional_info.account_type&locale=en_US&redirect_uri=https%3A%2F%2Fauth.services.adobe.com%2Fen_US%2Fdeeplink.html%3Fdelegated_request_id%3D90655c6f-42a4-4704-9b85-598c4840398c%26client_id%3DCreativeCloudInstallerWeb_v1_0%26deeplink%3Ddelegation&dctx_id=v:2,s,bg:kaizen,0f006db0-9d68-11ee-ac84-4fb64a02ffee"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ims-na1.adobelogin.com/ims/authorize?client_id=CreativeCloudInstallerWeb_v1_0&scope=allow_ac_dt_exchange%2Copenid%2CAdobeID%2Ccreative_cloud%2Ccreative_sdk%2Cread_organizations%2Csao.cce_private%2Cadditional_info.account_type&locale=en_US&redirect_uri=https%3A%2F%2Fauth.services.adobe.com%2Fen_US%2Fdeeplink.html%3Fdelegated_request_id%3D90655c6f-42a4-4704-9b85-598c4840398c%26client_id%3DCreativeCloudInstallerWeb_v1_0%26deeplink%3Ddelegation&dctx_id=v:2,s,bg:kaizen,0f006db0-9d68-11ee-ac84-4fb64a02ffee"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1924,i,2569062377837579811,8974820064474422012,262144 /prefetch:8
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://web.503188.com/?
unknown
https://hao.360.com/?installer
unknown
http://www.4399.com/flash/32979.htm
unknown
https://use.typekit.net/af/40207f/0000000000000000000176ff/27/a?subset_id=2&fvd=n3&v=3
unknown
http://hao123.di178.com/?r916
unknown
https://client.me
unknown
https://www.4399.com/flash/180977_3.htm
unknown
https://tg.602.com
unknown
https://www.4399.com/flash/127539_4.htm
unknown
https://doh.familyshield.opendns.com/dns-query
unknown
http://anglebug.com/4633
unknown
https://dns.sb/privacy/Char
unknown
https://anglebug.com/7382
unknown
https://www.4399.com/flash/205462_4.htm
unknown
https://www.4399.com/flash/145991_4.htm
unknown
http://www.chambersign.org1
unknown
https://ntp.msn.cn/edge/ntp
unknown
http://anglebug.com/7724gger
unknown
https://malaysia.smar
unknown
https://community.adobe
unknown
https://www.4399.com/flash/39379_2.htm
unknown
https://gist.github.com/1129031
unknown
https://www.4399.com/flash/55146_4.htm
unknown
https://permanently-removed.invalid/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxAB9
unknown
https://www.4399.com/flash/195673_4.htm
unknown
https://stage.account.ady
unknown
https://www.microsoftnews.cn/
unknown
https://anglebug.com/73209
unknown
https://dns11.quad9.net/dns-query
unknown
https://kf.07073.com
unknown
http://unisolated.invalid/
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
https://www.4399.com/flash/18012.htm
unknown
https://www.4399.com/flash/zmhj.htm#search3-6407
unknown
https://anglebug.com/4966S
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=ko
unknown
http://bd.gy912.com
unknown
https://www.91duba.com/?f=
unknown
http://anglebug.com/6929
unknown
https://anglebug.com/7246S
unknown
https://www.4399.com/flash/217926_2.htm
unknown
http://anglebug.com/5750)
unknown
https://www.4399.com/flash/218860_1.htm
unknown
https://nextdns.io/privacy
unknown
https://anglebug.com/7246
unknown
https://ims-na1-stg1.adobelogin.com
unknown
https://www.4399.com/flash/27924_2.htm
unknown
https://int.msn.cn/
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://fb.me/react-async-component-lifecycle-hooks
unknown
https://www.4399.com/flash/18012_4.htm
unknown
https://www.newduba.cn/?
unknown
https://www.4399.com/flash/48504.htm
unknown
https://doh.opendns.com/dns-query
unknown
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
unknown
https://nextdns.io/privacyr
unknown
http://df.edge.qhkj.baicana.com
unknown
https://issuetracker.google.com/161903006
unknown
https://www.office.com/OfficeeEATE
unknown
http://crl4.digic
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=nl
unknown
http://anglebug.com/7724ancedG
unknown
https://www.startseite24.netN
unknown
https://tp.9377s.com
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=nb
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://typekit.com/eulas/000000000000000000014f4fF
unknown
http://permanently-removed.invalid/
unknown
http://r.emsoso.cn
unknown
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
unknown
https://www.4399.com/flash/zmhj.htm
unknown
https://uae.smartscreen.ma
unknown
http://anglebug.com/5881V
unknown
http://crl3.digice
unknown
https://www.4399.com/flash/69156_1.htm
unknown
https://www.4399.com/flash/776_1.htm
unknown
http://129fy.ie.chalai.net
unknown
https://www.4399.com/flash/198637_4.htm
unknown
https://www.4399.com/flash/133630_4.htm
unknown
https://use.typekit.net/af/40207f/0000000000000000000176ff/27/a?subset_id=2&fvd=n3&v=3)
unknown
http://sgcs.edge.ker58.com
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
https://www.4399.com/flash/218717_2.htm
unknown
https://www.4399.com/flash/136516_3.htm
unknown
https://www.4399.com/flash/203215_3.htm
unknown
https://www.4399.com/flash/207195_4.htm
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://discovery.lenovo.com.cn/home062291
unknown
https://www.newduba.cn/?f=
unknown
https://hao.360.com/?src=jsqth
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://my.4399.com/yxmsdzls/
unknown
https://xsts.auth.xboxlive.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
172.64.41.3
adobe.com.ssl.d1.sc.omtrdc.net
63.140.38.210
dcs-public-edge-usw2-219535174.us-west-2.elb.amazonaws.com
34.215.74.30
www.google.com
173.194.219.99
d1n897799gitxr.cloudfront.net
108.139.15.2
resources-prod.licensingstack.com
18.244.194.168
ethos502-prod-va6-k8s-p2-0-7ccfc4a2a823108f.elb.us-east-1.amazonaws.com
18.211.200.223
delegated.adobelogin.com
unknown
use.typekit.net
unknown
p.typekit.net
unknown
ims-na1.adobelogin.com
unknown
dpm.demdex.net
unknown
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.16
unknown
unknown
173.194.219.99
www.google.com
United States
18.244.194.168
resources-prod.licensingstack.com
United States
162.159.61.3
unknown
United States
204.79.197.239
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.215.74.30
dcs-public-edge-usw2-219535174.us-west-2.elb.amazonaws.com
United States
13.107.21.239
unknown
United States
63.140.38.210
adobe.com.ssl.d1.sc.omtrdc.net
United States
108.139.15.2
d1n897799gitxr.cloudfront.net
United States
104.96.220.131
unknown
United States
239.255.255.250
unknown
Reserved
44.209.177.127
unknown
United States
18.211.200.223
ethos502-prod-va6-k8s-p2-0-7ccfc4a2a823108f.elb.us-east-1.amazonaws.com
United States
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Acrobat_Set-Up.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\686DF0A4A89F7CB6BFB4D33C6A48E2EE5FB6C4FB
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\85E2C5B0D9CFF505363FA62A5E8B8C1D76A60B46
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\4C7C2E87F0BC79A039D39B05F899A1CC521FDE99
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\A5C8D928986EC17FCC7D5F2353885D1709B73A29
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7D4400148000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C012D4000
trusted library allocation
page read and write
40DC000
trusted library allocation
page read and write
1814000
heap
page read and write
25C015A0000
trusted library allocation
page read and write
25C01956000
trusted library allocation
page read and write
25C00040C000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
4E0C011A4000
trusted library allocation
page read and write
25C012A0000
trusted library allocation
page read and write
35F91FE000
stack
page read and write
14802700000
heap
page read and write
88519FE000
unkown
page readonly
26CF1B02000
heap
page read and write
1BE5B82B000
heap
page read and write
4600000
trusted library allocation
page read and write
39FC0089E000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
3F1F000
heap
page read and write
25C013AC000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
1060002A0000
direct allocation
page read and write
25C003EC000
trusted library allocation
page read and write
88431F6000
stack
page read and write
4E0C00B3C000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
13080019C000
trusted library allocation
page read and write
3FCF000
heap
page read and write
6F0C002A0000
direct allocation
page read and write
787C00240000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1344005A1000
trusted library allocation
page read and write
25C02110000
trusted library allocation
page read and write
3F7B000
heap
page read and write
1BE5B809000
heap
page read and write
4E0C01028000
trusted library allocation
page read and write
25C020BD000
trusted library allocation
page read and write
1DDC4551000
heap
page read and write
25C01314000
trusted library allocation
page read and write
26D605F0000
unclassified section
page read and write
180B000
heap
page read and write
1B5043F0000
heap
page read and write
181A000
heap
page read and write
25C00C0C000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
6F0C00220000
direct allocation
page read and write
3FA004D7000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
712C002A8000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
4E0C00730000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
72A23E8000
stack
page read and write
26CF1B2F000
heap
page read and write
25C019A0000
trusted library allocation
page read and write
7D4400178000
trusted library allocation
page read and write
25C00A89000
trusted library allocation
page read and write
78B000D3C000
trusted library allocation
page read and write
25C00BD0000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1650000
heap
page read and write
5B68002B0000
direct allocation
page read and write
5E000000C000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
26D5FF04000
unclassified section
page read and write
25C0141C000
trusted library allocation
page read and write
25C0192E000
trusted library allocation
page read and write
3FA0062B000
trusted library allocation
page read and write
78B000B20000
trusted library allocation
page read and write
1C39F2B7000
heap
page read and write
77D2000
heap
page read and write
39FC00B28000
trusted library allocation
page read and write
25C003D2000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C01959000
trusted library allocation
page read and write
5820002F0000
trusted library allocation
page read and write
FD7BDFB000
stack
page read and write
25C00793000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
4E0C00E24000
trusted library allocation
page read and write
25C020F8000
trusted library allocation
page read and write
77C8002A4000
trusted library allocation
page read and write
60EC00270000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
25C00B54000
trusted library allocation
page read and write
25C008AE000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1487F4F4000
heap
page read and write
25C018FA000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
77D7000
heap
page read and write
3FA005D5000
trusted library allocation
page read and write
25C0077D000
trusted library allocation
page read and write
78A1000
heap
page read and write
1DDC9A02000
heap
page read and write
3EF6000
heap
page read and write
9B59FE000
unkown
page readonly
7D440027C000
trusted library allocation
page read and write
77C800310000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
17C9000
heap
page read and write
3FA00489000
trusted library allocation
page read and write
78B000040000
trusted library allocation
page read and write
25C0170C000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
25C01423000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
25C01950000
trusted library allocation
page read and write
77CC000
heap
page read and write
3A3A7FB000
stack
page read and write
26D60122000
trusted library allocation
page read and write
134400341000
trusted library allocation
page read and write
72A33FE000
stack
page read and write
17F7000
heap
page read and write
1308001AC000
trusted library allocation
page read and write
3F4C000
heap
page read and write
25C01998000
trusted library allocation
page read and write
25C00694000
trusted library allocation
page read and write
4E0C01019000
trusted library allocation
page read and write
26C9CC08000
heap
page read and write
25C01250000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
3FA0086D000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
7D4400268000
trusted library allocation
page read and write
4E0C00E55000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
78B0002E2000
trusted library allocation
page read and write
730400324000
direct allocation
page read and write
4E0C00B6C000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
77C80040C000
trusted library allocation
page read and write
1DDC454B000
heap
page read and write
25C0205E000
trusted library allocation
page read and write
25C00B60000
trusted library allocation
page read and write
25C0061C000
trusted library allocation
page read and write
3FA004D8000
trusted library allocation
page read and write
25C018BB000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
25C01004000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1DDC9A02000
heap
page read and write
1D69F82B000
heap
page read and write
367C0031B000
direct allocation
page read and write
25C01954000
trusted library allocation
page read and write
25C01280000
trusted library allocation
page read and write
1D30001B7000
trusted library allocation
page read and write
73040032C000
direct allocation
page read and write
1D3000334000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
134400441000
trusted library allocation
page read and write
10600029C000
direct allocation
page read and write
78B001188000
trusted library allocation
page read and write
39FC00A40000
trusted library allocation
page read and write
77C8000
heap
page read and write
3FA00895000
trusted library allocation
page read and write
33407FE000
stack
page read and write
4E0C00B81000
trusted library allocation
page read and write
3F75000
heap
page read and write
25C01902000
trusted library allocation
page read and write
78F1000
heap
page read and write
17F7000
heap
page read and write
25C00B1C000
trusted library allocation
page read and write
5E0000044000
trusted library allocation
page read and write
25C000254000
trusted library allocation
page read and write
39FC00610000
trusted library allocation
page read and write
39FC0062A000
trusted library allocation
page read and write
1308003D8000
trusted library allocation
page read and write
78B000FE8000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
3F67000
heap
page read and write
FD77DFA000
stack
page read and write
25C019B2000
trusted library allocation
page read and write
17BE000
heap
page read and write
17BA000
heap
page read and write
25C018EC000
trusted library allocation
page read and write
25C0027C000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
25C00BB0000
trusted library allocation
page read and write
1814000
heap
page read and write
1BE5B811000
heap
page read and write
1BE5B80F000
heap
page read and write
884E9FE000
unkown
page readonly
3FA0052D000
trusted library allocation
page read and write
7B1800300000
trusted library allocation
page read and write
77F0000
heap
page read and write
1C39C468000
heap
page read and write
25C0205B000
trusted library allocation
page read and write
26CF1B4C000
heap
page read and write
1DDC4544000
heap
page read and write
25C00330000
trusted library allocation
page read and write
72FC0000C000
trusted library allocation
page read and write
191400268000
trusted library allocation
page read and write
3FA0054A000
trusted library allocation
page read and write
25C012FC000
trusted library allocation
page read and write
26CF1B28000
heap
page read and write
2EB400250000
direct allocation
page read and write
6F0C00284000
direct allocation
page read and write
39FC008B0000
trusted library allocation
page read and write
197991A0000
heap
page readonly
1BE5B82B000
heap
page read and write
3A407FB000
stack
page read and write
25C016BC000
trusted library allocation
page read and write
25C018DD000
trusted library allocation
page read and write
25C00B70000
trusted library allocation
page read and write
4E0C001D0000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C020C2000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
60EC00260000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
1BE5B413000
heap
page read and write
3FA0056C000
trusted library allocation
page read and write
730400274000
direct allocation
page read and write
25C000284000
trusted library allocation
page read and write
25C01734000
trusted library allocation
page read and write
39FC00B48000
trusted library allocation
page read and write
130800054000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C00871000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
78B000B44000
trusted library allocation
page read and write
82F9BFF000
stack
page read and write
25C017F3000
trusted library allocation
page read and write
25C0205E000
trusted library allocation
page read and write
7D4400254000
trusted library allocation
page read and write
26CF1B55000
heap
page read and write
70D000274000
trusted library allocation
page read and write
17F8000
heap
page read and write
3EFF000
heap
page read and write
39FC00AB0000
trusted library allocation
page read and write
3F4D000
heap
page read and write
7B1800418000
trusted library allocation
page read and write
A101FFC000
stack
page read and write
884A9FE000
unkown
page readonly
787C00238000
trusted library allocation
page read and write
1DDC4542000
heap
page read and write
25C0037E000
trusted library allocation
page read and write
39FC008A0000
trusted library allocation
page read and write
25C01260000
trusted library allocation
page read and write
1D3000135000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
4E0C007E8000
trusted library allocation
page read and write
25C013DD000
trusted library allocation
page read and write
2A400080000
trusted library allocation
page read and write
7D44002B4000
trusted library allocation
page read and write
568A4000
trusted library allocation
page read and write
1308000E0000
trusted library allocation
page read and write
25C020EC000
trusted library allocation
page read and write
3FA005ED000
trusted library allocation
page read and write
39FC00374000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
78B000F28000
trusted library allocation
page read and write
A102FFC000
stack
page read and write
4E0C00BA4000
trusted library allocation
page read and write
82F43FE000
stack
page read and write
3F7A000
heap
page read and write
45A4002A4000
trusted library allocation
page read and write
1D3000172000
trusted library allocation
page read and write
4E0C00F9C000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
25C02058000
trusted library allocation
page read and write
77C800274000
trusted library allocation
page read and write
82F93FC000
stack
page read and write
82F7BFF000
stack
page read and write
1DDC4546000
heap
page read and write
7B18002C8000
trusted library allocation
page read and write
25C012F7000
trusted library allocation
page read and write
14802658000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
3FA00942000
trusted library allocation
page read and write
39FC00B70000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
25C01312000
trusted library allocation
page read and write
582000254000
trusted library allocation
page read and write
25C0002A4000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
130800364000
trusted library allocation
page read and write
183DA000000
heap
page read and write
39FC00794000
trusted library allocation
page read and write
26C86010000
heap
page read and write
1BE5B825000
heap
page read and write
26CF1B2F000
heap
page read and write
1BE5B811000
heap
page read and write
3FA005C3000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
4E0C00A1C000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
A104FFE000
stack
page read and write
25C008A9000
trusted library allocation
page read and write
39FC00A0C000
trusted library allocation
page read and write
77C800238000
trusted library allocation
page read and write
25C00B90000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
25C00B60000
trusted library allocation
page read and write
25C01952000
trusted library allocation
page read and write
26CF1B40000
heap
page read and write
798000
stack
page read and write
3FA00922000
trusted library allocation
page read and write
1B5AD420000
heap
page read and write
4E0C00C36000
trusted library allocation
page read and write
4E0C00A5A000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
39FC003B0000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
4E0C00A58000
trusted library allocation
page read and write
1BEDF1C9000
unclassified section
page read and write
4E0C00CB6000
trusted library allocation
page read and write
77EE000
heap
page read and write
1DDC4540000
heap
page read and write
1E800278000
trusted library allocation
page read and write
39FC00A82000
trusted library allocation
page read and write
1DDC4530000
heap
page read and write
25C01956000
trusted library allocation
page read and write
3FA00961000
trusted library allocation
page read and write
1B57EE70000
heap
page read and write
78B000A19000
trusted library allocation
page read and write
25C014B0000
trusted library allocation
page read and write
4E0C00D63000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
56982000
trusted library allocation
page read and write
72A63FE000
stack
page read and write
1D3000038000
trusted library allocation
page read and write
39FC002E8000
trusted library allocation
page read and write
3FA008DA000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
25C00601000
trusted library allocation
page read and write
25C018CB000
trusted library allocation
page read and write
39FC00848000
trusted library allocation
page read and write
49E4001E1000
trusted library allocation
page read and write
3FCA000
heap
page read and write
418C000
stack
page read and write
25C00EFD000
trusted library allocation
page read and write
787C00278000
trusted library allocation
page read and write
781D000
heap
page read and write
25C019AC000
trusted library allocation
page read and write
181A000
heap
page read and write
1818000
heap
page read and write
7B18002E8000
trusted library allocation
page read and write
17FD000
heap
page read and write
4E0C00A40000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
26CF1B4C000
heap
page read and write
25C00B44000
trusted library allocation
page read and write
25C00031C000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
4E0C00470000
trusted library allocation
page read and write
730400250000
direct allocation
page read and write
1C39C4EB000
heap
page read and write
1748000
heap
page read and write
25C00834000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
26C83BD4000
heap
page read and write
712C00278000
trusted library allocation
page read and write
25C012CC000
trusted library allocation
page read and write
1BE5B857000
heap
page read and write
357C00280000
trusted library allocation
page read and write
25C009B4000
trusted library allocation
page read and write
FD1B7FE000
stack
page read and write
25C00878000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
39FC0093C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3F26000
heap
page read and write
25C01314000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
4E0C000F8000
trusted library allocation
page read and write
4C5000298000
direct allocation
page read and write
1BE5B811000
heap
page read and write
1DDC4544000
heap
page read and write
4E0C00DBD000
trusted library allocation
page read and write
25C00A4C000
trusted library allocation
page read and write
38C800211000
direct allocation
page read and write
4E0C00B94000
trusted library allocation
page read and write
25C020C4000
trusted library allocation
page read and write
60EC00250000
trusted library allocation
page read and write
25C01E4C000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
26CF1B43000
heap
page read and write
4E0C006AC000
trusted library allocation
page read and write
5540020D000
trusted library allocation
page read and write
3A40FFE000
unkown
page readonly
1BE5B80F000
heap
page read and write
3F70000
heap
page read and write
1C39F2DB000
heap
page read and write
3FD8000
heap
page read and write
3FA00955000
trusted library allocation
page read and write
180E000
heap
page read and write
3F26000
heap
page read and write
1E80028C000
trusted library allocation
page read and write
25C018C4000
trusted library allocation
page read and write
78FD000
heap
page read and write
1DDC452E000
heap
page read and write
25C0195B000
trusted library allocation
page read and write
3FA0055B000
trusted library allocation
page read and write
4E0C00692000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
77FE000
heap
page read and write
1308001F0000
trusted library allocation
page read and write
55400264000
trusted library allocation
page read and write
3FA0056D000
trusted library allocation
page read and write
367C00307000
direct allocation
page read and write
7D4400280000
trusted library allocation
page read and write
5E00000D4000
trusted library allocation
page read and write
1308000C0000
trusted library allocation
page read and write
1D30001B8000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
3FA0063B000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1BE5B7CD000
unclassified section
page read and write
A103FFE000
stack
page read and write
7D44000FC000
trusted library allocation
page read and write
3FA00600000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C01994000
trusted library allocation
page read and write
77C8002A8000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
25C013AC000
trusted library allocation
page read and write
25C014A0000
trusted library allocation
page read and write
40A400248000
trusted library allocation
page read and write
1BE5B860000
heap
page read and write
3FA0090E000
trusted library allocation
page read and write
17C4000
heap
page read and write
3F93000
heap
page read and write
26CF1B41000
heap
page read and write
1D3000334000
trusted library allocation
page read and write
25C008AD000
trusted library allocation
page read and write
25C018FD000
trusted library allocation
page read and write
78B000DE4000
trusted library allocation
page read and write
25C00B13000
trusted library allocation
page read and write
1828000
heap
page read and write
25C02080000
trusted library allocation
page read and write
1D300010E000
trusted library allocation
page read and write
568B0000
trusted library allocation
page read and write
25C02058000
trusted library allocation
page read and write
4250002BC000
direct allocation
page read and write
78B000244000
trusted library allocation
page read and write
25C018CB000
trusted library allocation
page read and write
25C000238000
trusted library allocation
page read and write
78B000A68000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C019BA000
trusted library allocation
page read and write
4E0C00D4C000
trusted library allocation
page read and write
78A5000
heap
page read and write
25C0187C000
trusted library allocation
page read and write
25C00AD8000
trusted library allocation
page read and write
3FCC000
heap
page read and write
676000201000
trusted library allocation
page read and write
7808000
heap
page read and write
1C39C4F0000
heap
page read and write
1D30000EE000
trusted library allocation
page read and write
4E0C00601000
trusted library allocation
page read and write
14802702000
heap
page read and write
1DDC4541000
heap
page read and write
39FC008A4000
trusted library allocation
page read and write
183D9F80000
heap
page read and write
5820002DC000
trusted library allocation
page read and write
39FC00B68000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
6F0C002C4000
direct allocation
page read and write
1BE5B80F000
heap
page read and write
332F7FE000
stack
page read and write
26D60530000
unclassified section
page read and write
1C39C4FA000
heap
page read and write
26CF1B45000
heap
page read and write
39FC009F1000
trusted library allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
25C00614000
trusted library allocation
page read and write
1D3000416000
trusted library allocation
page read and write
1BE5B600000
heap
page read and write
7D440027C000
trusted library allocation
page read and write
39FC00A48000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
7D4400290000
trusted library allocation
page read and write
25C01318000
trusted library allocation
page read and write
4E0C00FC9000
trusted library allocation
page read and write
3F53000
heap
page read and write
1D3000353000
trusted library allocation
page read and write
1C39F2BE000
heap
page read and write
3FA00742000
trusted library allocation
page read and write
78B000A6A000
trusted library allocation
page read and write
7810000
heap
page read and write
130800284000
trusted library allocation
page read and write
1C39F258000
heap
page read and write
7380002A0000
trusted library allocation
page read and write
7B18002C0000
trusted library allocation
page read and write
25C0002D4000
trusted library allocation
page read and write
3324002DC000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA007AE000
trusted library allocation
page read and write
3F26000
heap
page read and write
25C0031C000
trusted library allocation
page read and write
1DDC6302000
heap
page read and write
367C00319000
direct allocation
page read and write
1BEDF8A6000
unclassified section
page read and write
25C01423000
trusted library allocation
page read and write
25C0204E000
trusted library allocation
page read and write
1487F902000
heap
page read and write
25C01944000
trusted library allocation
page read and write
1BE5B7E7000
unclassified section
page read and write
25C00EC8000
trusted library allocation
page read and write
3F76000
heap
page read and write
2A400082000
trusted library allocation
page read and write
4C50002C0000
direct allocation
page read and write
676000401000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
3F08000
heap
page read and write
2DA000091000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C01944000
trusted library allocation
page read and write
25C013AC000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
3F51000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
37E0002B4000
trusted library allocation
page read and write
4E0C00FCF000
trusted library allocation
page read and write
3324002CC000
trusted library allocation
page read and write
182E000
heap
page read and write
25C00BA0000
trusted library allocation
page read and write
712C00258000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
7380002C4000
trusted library allocation
page read and write
25C019B2000
trusted library allocation
page read and write
25C00A80000
trusted library allocation
page read and write
14AF701B000
heap
page read and write
3F62000
heap
page read and write
26C83A14000
heap
page read and write
39FC008A5000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C008A0000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
44B0000
heap
page read and write
77C1000
heap
page read and write
26CF1B48000
heap
page read and write
1BE5B811000
heap
page read and write
7D44002D7000
trusted library allocation
page read and write
1BE5B340000
heap
page read and write
730400314000
direct allocation
page read and write
A17C5FE000
unkown
page readonly
4E0C010D0000
trusted library allocation
page read and write
1487F4BE000
heap
page read and write
1BE5B809000
heap
page read and write
25C000201000
trusted library allocation
page read and write
26C83B42000
heap
page read and write
77C0000
heap
page read and write
1D3000084000
trusted library allocation
page read and write
45A4002B0000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
26D60127000
trusted library allocation
page read and write
1308003BB000
trusted library allocation
page read and write
4250002A8000
direct allocation
page read and write
77C1000
heap
page read and write
1BE5B80F000
heap
page read and write
7D44002A4000
trusted library allocation
page read and write
39FC00A40000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
191400294000
trusted library allocation
page read and write
25C01996000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C012DC000
trusted library allocation
page read and write
3FDC000
heap
page read and write
134400281000
trusted library allocation
page read and write
72FC00001000
trusted library allocation
page read and write
2DA000054000
trusted library allocation
page read and write
39FC006F0000
trusted library allocation
page read and write
25C01986000
trusted library allocation
page read and write
19799302000
heap
page read and write
3FA00985000
trusted library allocation
page read and write
26C9CC0B000
heap
page read and write
4C50002A4000
direct allocation
page read and write
25C018BE000
trusted library allocation
page read and write
40A4002E4000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
26C80BFE000
unkown
page read and write
25C01959000
trusted library allocation
page read and write
1816000
heap
page read and write
25C01954000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
25C01968000
trusted library allocation
page read and write
3FA004FD000
trusted library allocation
page read and write
554002C8000
trusted library allocation
page read and write
5820002A4000
trusted library allocation
page read and write
1D300028C000
trusted library allocation
page read and write
3FA0054E000
trusted library allocation
page read and write
25C01240000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
25C02066000
trusted library allocation
page read and write
56994000
trusted library allocation
page read and write
25C00B1C000
trusted library allocation
page read and write
4E0C00368000
trusted library allocation
page read and write
2DA000114000
trusted library allocation
page read and write
25C018C0000
trusted library allocation
page read and write
25C008AB000
trusted library allocation
page read and write
25C019BB000
trusted library allocation
page read and write
77D6000
heap
page read and write
7D44002B8000
trusted library allocation
page read and write
25C018F8000
trusted library allocation
page read and write
25C0144E000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
26CF1B51000
heap
page read and write
26C9C840000
heap
page read and write
25C019AA000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
14802600000
heap
page read and write
4E0C00B68000
trusted library allocation
page read and write
3FA00873000
trusted library allocation
page read and write
5B68002AC000
direct allocation
page read and write
1F92FFE000
stack
page read and write
367C00316000
direct allocation
page read and write
39FC009BD000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
1D300025C000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C0141E000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
25C01964000
trusted library allocation
page read and write
25C0198A000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C018D8000
trusted library allocation
page read and write
25C0176C000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
4E0C00DC0000
trusted library allocation
page read and write
AF9000
stack
page read and write
1DDC452E000
heap
page read and write
3F47000
heap
page read and write
7D44001E4000
trusted library allocation
page read and write
1D3000154000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1308003E4000
trusted library allocation
page read and write
1D30003B0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
106C00408000
trusted library allocation
page read and write
25C018F8000
trusted library allocation
page read and write
FD7EDFB000
stack
page read and write
1781000
heap
page read and write
6F0C002D0000
direct allocation
page read and write
3F4B000
heap
page read and write
17E5000
heap
page read and write
4E0C00FF0000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
5E00001C4000
trusted library allocation
page read and write
39FC0082D000
trusted library allocation
page read and write
25C01404000
trusted library allocation
page read and write
3F63000
heap
page read and write
25C018AA000
trusted library allocation
page read and write
17F7000
heap
page read and write
106C00211000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B827000
heap
page read and write
25C00E04000
trusted library allocation
page read and write
7D4400172000
trusted library allocation
page read and write
1818000
heap
page read and write
25C01990000
trusted library allocation
page read and write
46A000254000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
25C003D4000
trusted library allocation
page read and write
3F1F000
heap
page read and write
1D3000350000
trusted library allocation
page read and write
619000244000
direct allocation
page read and write
56938000
trusted library allocation
page read and write
72FC00028000
trusted library allocation
page read and write
5E0000116000
trusted library allocation
page read and write
88461FE000
stack
page read and write
130800060000
trusted library allocation
page read and write
25C00B24000
trusted library allocation
page read and write
25C0060C000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
25C01952000
trusted library allocation
page read and write
40A400254000
trusted library allocation
page read and write
3F2A000
heap
page read and write
1BE5B809000
heap
page read and write
2DA0000D8000
trusted library allocation
page read and write
191400258000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
39FC0034C000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C02038000
trusted library allocation
page read and write
FD795FE000
unkown
page readonly
183DA102000
heap
page read and write
25C012C4000
trusted library allocation
page read and write
4E0C00C2C000
trusted library allocation
page read and write
26D6012B000
trusted library allocation
page read and write
4430000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C01984000
trusted library allocation
page read and write
1C39C3D0000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
25C002B0000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
26D60770000
unclassified section
page read and write
3FA0099D000
trusted library allocation
page read and write
25C00689000
trusted library allocation
page read and write
78C2000
heap
page read and write
37E0002C0000
trusted library allocation
page read and write
33240023C000
trusted library allocation
page read and write
25C003D4000
trusted library allocation
page read and write
25C00B4A000
trusted library allocation
page read and write
3F7E000
heap
page read and write
1478000
unkown
page execute and read and write
7D440027C000
trusted library allocation
page read and write
4E0C00594000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
3A44FFE000
unkown
page readonly
25C008AE000
trusted library allocation
page read and write
3FA005C4000
trusted library allocation
page read and write
26D5FEF0000
unclassified section
page read and write
33417FE000
stack
page read and write
3F68000
heap
page read and write
4E0C001A0000
trusted library allocation
page read and write
39FC006A9000
trusted library allocation
page read and write
25C018ED000
trusted library allocation
page read and write
182E000
heap
page read and write
1BE5B811000
heap
page read and write
25C01450000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
3FA00858000
trusted library allocation
page read and write
3FA005BE000
trusted library allocation
page read and write
39FC006DF000
trusted library allocation
page read and write
130800084000
trusted library allocation
page read and write
25C00B60000
trusted library allocation
page read and write
FD13FFD000
stack
page read and write
25C02060000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C0197C000
trusted library allocation
page read and write
82F4BFB000
stack
page read and write
3F7B000
heap
page read and write
1DDC44E6000
heap
page read and write
25C00718000
trusted library allocation
page read and write
1BE00020000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C0198A000
trusted library allocation
page read and write
176F000
heap
page read and write
4C50002E4000
direct allocation
page read and write
3FC2000
heap
page read and write
3C309FE000
stack
page read and write
1BE5B809000
heap
page read and write
25C008A5000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
26CF1B2F000
heap
page read and write
4E0C00BDC000
trusted library allocation
page read and write
1C39F256000
heap
page read and write
1BE5B809000
heap
page read and write
37E000201000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C01318000
trusted library allocation
page read and write
17E5000
heap
page read and write
180E000
heap
page read and write
1B6400270000
direct allocation
page read and write
25C0205D000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
39FC00790000
trusted library allocation
page read and write
4E0C0112C000
trusted library allocation
page read and write
7D44002AA000
trusted library allocation
page read and write
78B000B40000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
4E0C011B4000
trusted library allocation
page read and write
25C02060000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
4E0C00C74000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
106C002C0000
trusted library allocation
page read and write
88499FE000
unkown
page readonly
4E0C00D5C000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
3FA008B8000
trusted library allocation
page read and write
25C00A89000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
60EC002B4000
trusted library allocation
page read and write
39FC00614000
trusted library allocation
page read and write
3FA00905000
trusted library allocation
page read and write
14AF6FC0000
heap
page read and write
39FC009EC000
trusted library allocation
page read and write
1F91FFE000
stack
page read and write
1829000
heap
page read and write
39FC009C3000
trusted library allocation
page read and write
78B0002DC000
trusted library allocation
page read and write
26CF1B49000
heap
page read and write
3FA5000
heap
page read and write
7D4400248000
trusted library allocation
page read and write
25C015A0000
trusted library allocation
page read and write
25C02086000
trusted library allocation
page read and write
180E000
heap
page read and write
14802500000
heap
page read and write
7D4400220000
trusted library allocation
page read and write
26D5FF1D000
unclassified section
page read and write
4E0C003EA000
trusted library allocation
page read and write
1829000
heap
page read and write
25C017C8000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
4C5000220000
direct allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
25C012B4000
trusted library allocation
page read and write
46A000201000
trusted library allocation
page read and write
25C01270000
trusted library allocation
page read and write
26CF1B40000
heap
page read and write
1755000
heap
page read and write
180E000
heap
page read and write
25C0142C000
trusted library allocation
page read and write
25C003D4000
trusted library allocation
page read and write
26C9C7B0000
heap
page read and write
25C009EC000
trusted library allocation
page read and write
25C01545000
trusted library allocation
page read and write
5E0000201000
trusted library allocation
page read and write
88471FE000
stack
page read and write
25C00BDC000
trusted library allocation
page read and write
3FA008C2000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
26D60890000
unclassified section
page read and write
7DF4BAFD1000
trusted library allocation
page execute read
5691C000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
25C013B7000
trusted library allocation
page read and write
14AF6FF0000
heap
page read and write
77D3000
heap
page read and write
3F93000
heap
page read and write
1C39C330000
heap
page read and write
1F8EFFC000
stack
page read and write
25C00B0A000
trusted library allocation
page read and write
25C018FF000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C00330000
trusted library allocation
page read and write
134400191000
trusted library allocation
page read and write
25C006E4000
trusted library allocation
page read and write
1487F4FA000
heap
page read and write
FD785FE000
unkown
page readonly
3FA00488000
trusted library allocation
page read and write
730400264000
direct allocation
page read and write
1DDC4541000
heap
page read and write
25C01950000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
13080020C000
trusted library allocation
page read and write
179A000
heap
page read and write
3F61000
heap
page read and write
1BE5B80F000
heap
page read and write
1BE5B750000
trusted library allocation
page read and write
1E8002C8000
trusted library allocation
page read and write
6760002BC000
trusted library allocation
page read and write
39FC0065F000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
7FFF7A30C000
trusted library allocation
page execute and read and write
5B68002CC000
direct allocation
page read and write
1A2E000
stack
page read and write
73040021C000
direct allocation
page read and write
35F79FE000
unkown
page readonly
7D4400184000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
4E0C00239000
trusted library allocation
page read and write
1D69F902000
heap
page read and write
782E000
heap
page read and write
25C012FA000
trusted library allocation
page read and write
78B000DF0000
trusted library allocation
page read and write
7D44002AD000
trusted library allocation
page read and write
3FA00602000
trusted library allocation
page read and write
3F64000
heap
page read and write
78B000D3E000
trusted library allocation
page read and write
7B18002A4000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
6190002D0000
direct allocation
page read and write
4E0C00FB8000
trusted library allocation
page read and write
4092000
trusted library allocation
page read and write
26C83B02000
heap
page read and write
25C00B08000
trusted library allocation
page read and write
1D300014C000
trusted library allocation
page read and write
7B18002E4000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
88529FE000
unkown
page readonly
1BE5B80B000
heap
page read and write
39FC008A4000
trusted library allocation
page read and write
106000274000
direct allocation
page read and write
26CF1B54000
heap
page read and write
1D300038C000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
39FC00A73000
trusted library allocation
page read and write
5E00000ED000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
1C39F28A000
heap
page read and write
3EE9000
heap
page read and write
4E0C00A5C000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
39FC009B4000
trusted library allocation
page read and write
25C006B6000
trusted library allocation
page read and write
39FC0073C000
trusted library allocation
page read and write
25C02094000
trusted library allocation
page read and write
1D30000E4000
trusted library allocation
page read and write
6F5E000
stack
page read and write
17D7000
heap
page read and write
357C002C4000
trusted library allocation
page read and write
1B5AD702000
heap
page read and write
1BE5B811000
heap
page read and write
25C013A8000
trusted library allocation
page read and write
39FC008A7000
trusted library allocation
page read and write
130800124000
trusted library allocation
page read and write
130800070000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
1BE5B80B000
heap
page read and write
1BE5B82B000
heap
page read and write
1D3000334000
trusted library allocation
page read and write
25C002E4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1B7D000
unkown
page read and write
1BE5B825000
heap
page read and write
1BE5B824000
heap
page read and write
3324002A4000
trusted library allocation
page read and write
25C00B58000
trusted library allocation
page read and write
25C015F8000
trusted library allocation
page read and write
82F23F6000
stack
page read and write
1D3000135000
trusted library allocation
page read and write
39FC0069A000
trusted library allocation
page read and write
39FC00A60000
trusted library allocation
page read and write
1BE5B854000
heap
page read and write
5E0000001000
trusted library allocation
page read and write
7899000
heap
page read and write
1E80020C000
trusted library allocation
page read and write
25C018B9000
trusted library allocation
page read and write
13080034C000
trusted library allocation
page read and write
45A400280000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
1914002B8000
trusted library allocation
page read and write
4E0C00255000
trusted library allocation
page read and write
5E000008C000
trusted library allocation
page read and write
4E0C003F8000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
39FC00BBC000
trusted library allocation
page read and write
25C00A7F000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
39FC00708000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
367C002D0000
direct allocation
page read and write
72FC00060000
trusted library allocation
page read and write
FD027FC000
stack
page read and write
25C019A4000
trusted library allocation
page read and write
9B51FD000
stack
page read and write
1BE5B827000
heap
page read and write
4E0C00FE0000
trusted library allocation
page read and write
26CF1B33000
heap
page read and write
25C01968000
trusted library allocation
page read and write
1B57EC20000
heap
page read and write
A1097FE000
unkown
page readonly
4E0C003D4000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
130800080000
trusted library allocation
page read and write
1C39C770000
trusted library allocation
page read and write
3FA00954000
trusted library allocation
page read and write
25C0091C000
trusted library allocation
page read and write
25C006A8000
trusted library allocation
page read and write
88549FE000
unkown
page readonly
1BE5B811000
heap
page read and write
1BEDEAB2000
trusted library allocation
page read and write
3FA008F2000
trusted library allocation
page read and write
130800280000
trusted library allocation
page read and write
25C0088C000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
77C800288000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C00888000
trusted library allocation
page read and write
25C01902000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
25C018B9000
trusted library allocation
page read and write
183D9F40000
heap
page read and write
4E0C00CCC000
trusted library allocation
page read and write
4E0C0023D000
trusted library allocation
page read and write
712C002D4000
trusted library allocation
page read and write
25C00F2C000
trusted library allocation
page read and write
130800294000
trusted library allocation
page read and write
357C00294000
trusted library allocation
page read and write
7D44002C8000
trusted library allocation
page read and write
25C01992000
trusted library allocation
page read and write
7D440029F000
trusted library allocation
page read and write
4E0C00A9C000
trusted library allocation
page read and write
25C00BD0000
trusted library allocation
page read and write
1DDC452E000
heap
page read and write
3FA0048A000
trusted library allocation
page read and write
25C020B8000
trusted library allocation
page read and write
26C83A02000
heap
page read and write
1D300012C000
trusted library allocation
page read and write
38C8002AC000
direct allocation
page read and write
60EC00240000
trusted library allocation
page read and write
4E0C002E2000
trusted library allocation
page read and write
FD1AFFE000
unkown
page readonly
3FA2000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
7D4400158000
trusted library allocation
page read and write
3FA00754000
trusted library allocation
page read and write
1D3000348000
trusted library allocation
page read and write
2EB400201000
direct allocation
page read and write
26CF1B30000
heap
page read and write
3FA00142000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
4E0C00BDB000
trusted library allocation
page read and write
1BBD000
unkown
page read and write
1DDC4533000
heap
page read and write
1D300016E000
trusted library allocation
page read and write
FD20FFE000
unkown
page readonly
26C83B02000
heap
page read and write
3FA00876000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
357C0028C000
trusted library allocation
page read and write
1C39F277000
heap
page read and write
78B000DB2000
trusted library allocation
page read and write
25C00A6C000
trusted library allocation
page read and write
106C0020C000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
7D44002B2000
trusted library allocation
page read and write
72FC000B4000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C00B11000
trusted library allocation
page read and write
37E0002C0000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
4E0C00630000
trusted library allocation
page read and write
78D2000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
39FC00B20000
trusted library allocation
page read and write
130800289000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
78B0008AC000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C000230000
trusted library allocation
page read and write
6760002C4000
trusted library allocation
page read and write
25C00788000
trusted library allocation
page read and write
25C01428000
trusted library allocation
page read and write
26C83B2D000
heap
page read and write
1344003C1000
trusted library allocation
page read and write
25C0073C000
trusted library allocation
page read and write
60EC0020C000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
26C9FEF0000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
1D30001A4000
trusted library allocation
page read and write
3F62000
heap
page read and write
4E0C00CBF000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
6F0C002B0000
direct allocation
page read and write
3F49000
heap
page read and write
60EC002AC000
trusted library allocation
page read and write
25C006D4000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
183D9E20000
heap
page read and write
17E7000
heap
page read and write
3F24000
heap
page read and write
26CF1B29000
heap
page read and write
26C83B4F000
heap
page read and write
3F49000
heap
page read and write
1818000
heap
page read and write
1C39F200000
heap
page read and write
14AF700D000
heap
page read and write
60AF000
stack
page read and write
4E0C01120000
trusted library allocation
page read and write
A175DFB000
stack
page read and write
3FB0000
heap
page read and write
3F43000
heap
page read and write
1BE5B811000
heap
page read and write
731E000
heap
page read and write
4E0C00290000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C016B0000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
25C00884000
trusted library allocation
page read and write
4E0C00264000
trusted library allocation
page read and write
1DDC9A66000
heap
page read and write
56880000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C00730000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
26C9FD30000
unclassified section
page read and write
3FA00913000
trusted library allocation
page read and write
1BE5B400000
heap
page read and write
4E0C00BE0000
trusted library allocation
page read and write
1DDC4555000
heap
page read and write
1800000
heap
page read and write
425000298000
direct allocation
page read and write
7D44002B8000
trusted library allocation
page read and write
77E1000
heap
page read and write
25C00878000
trusted library allocation
page read and write
3F84000
heap
page read and write
1BE5B441000
heap
page read and write
1D3000154000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
3F85000
heap
page read and write
1DDC4546000
heap
page read and write
5E0000098000
trusted library allocation
page read and write
25C00408000
trusted library allocation
page read and write
3FA00616000
trusted library allocation
page read and write
5E000001C000
trusted library allocation
page read and write
39FC00BC0000
trusted library allocation
page read and write
26CF1AE2000
heap
page read and write
3FA0051B000
trusted library allocation
page read and write
13080011C000
trusted library allocation
page read and write
77C800244000
trusted library allocation
page read and write
1D3000108000
trusted library allocation
page read and write
3F24000
heap
page read and write
25C01431000
trusted library allocation
page read and write
1B5AD61B000
heap
page read and write
26CF1B46000
heap
page read and write
37E0002D8000
trusted library allocation
page read and write
25C00730000
trusted library allocation
page read and write
39FC0039D000
trusted library allocation
page read and write
1D3000344000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
FD07FFE000
unkown
page readonly
175E000
heap
page read and write
3324002C4000
trusted library allocation
page read and write
3FA0062C000
trusted library allocation
page read and write
17BE000
heap
page read and write
39FC00338000
trusted library allocation
page read and write
25C01942000
trusted library allocation
page read and write
26CF1B57000
heap
page read and write
3FA0063C000
trusted library allocation
page read and write
25C00674000
trusted library allocation
page read and write
7D4400244000
trusted library allocation
page read and write
1DDC4533000
heap
page read and write
787C002D8000
trusted library allocation
page read and write
2EB4002E0000
direct allocation
page read and write
25C003E0000
trusted library allocation
page read and write
4E0C006E8000
trusted library allocation
page read and write
6F0C00254000
direct allocation
page read and write
25C00924000
trusted library allocation
page read and write
25C01458000
trusted library allocation
page read and write
77DC000
heap
page read and write
738000238000
trusted library allocation
page read and write
26C83B3F000
heap
page read and write
1DDC9A46000
heap
page read and write
26CF1B31000
heap
page read and write
25C0189C000
trusted library allocation
page read and write
3FA00983000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
3F88000
heap
page read and write
3FA007A5000
trusted library allocation
page read and write
134400541000
trusted library allocation
page read and write
3F0C000
heap
page read and write
25C0198A000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C01450000
trusted library allocation
page read and write
25C018A6000
trusted library allocation
page read and write
3FA00615000
trusted library allocation
page read and write
17E7000
heap
page read and write
2DA000058000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
17F8000
heap
page read and write
17E7000
heap
page read and write
619000264000
direct allocation
page read and write
72FC00038000
trusted library allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
1BE5B867000
heap
page read and write
1F89FFC000
stack
page read and write
4E0C00D20000
trusted library allocation
page read and write
1BE5B80B000
heap
page read and write
1BE9E8A0000
trusted library allocation
page read and write
39FC003C8000
trusted library allocation
page read and write
730400321000
direct allocation
page read and write
1BE5B80F000
heap
page read and write
1BE5B811000
heap
page read and write
7D4400248000
trusted library allocation
page read and write
3FA00342000
trusted library allocation
page read and write
182C000
heap
page read and write
25C01994000
trusted library allocation
page read and write
3FA00841000
trusted library allocation
page read and write
1D64002CC000
direct allocation
page read and write
25C01234000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
7B1800404000
trusted library allocation
page read and write
3EFD000
heap
page read and write
1825000
heap
page read and write
25C008A4000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
3330FFE000
unkown
page readonly
134400521000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
25C018CE000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
77EC000
heap
page read and write
25C01880000
trusted library allocation
page read and write
82F6BFF000
stack
page read and write
180E000
heap
page read and write
56860000
trusted library allocation
page read and write
3EEA000
heap
page read and write
3F4B000
heap
page read and write
39FC008D0000
trusted library allocation
page read and write
3FC4000
heap
page read and write
26C9C810000
remote allocation
page read and write
174F000
heap
page read and write
25C020CA000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
25C00BC8000
trusted library allocation
page read and write
3FA004E6000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
1308001E4000
trusted library allocation
page read and write
26C80BD0000
unkown
page read and write
26D607B0000
unclassified section
page read and write
25C00A66000
trusted library allocation
page read and write
25C01932000
trusted library allocation
page read and write
25C0074C000
trusted library allocation
page read and write
1D3000060000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
1DDC4545000
heap
page read and write
1BEDFB5E000
unclassified section
page read and write
4E0C0079C000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
106C002B0000
trusted library allocation
page read and write
1DDC9A95000
heap
page read and write
25C01954000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
425000254000
direct allocation
page read and write
26C83BE0000
heap
page read and write
25C013D4000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
25C01984000
trusted library allocation
page read and write
106C00300000
trusted library allocation
page read and write
5684C000
trusted library allocation
page read and write
367C00354000
direct allocation
page read and write
73040030D000
direct allocation
page read and write
4E0C00184000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
78CE000
heap
page read and write
25C018ED000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
25C00662000
trusted library allocation
page read and write
4E0C00AE8000
trusted library allocation
page read and write
1809000
heap
page read and write
5B6800290000
direct allocation
page read and write
26CF1B2F000
heap
page read and write
4E0C00BD4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1BE5B800000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
FD7DDFC000
stack
page read and write
1675000
trusted library allocation
page read and write
17C8000
heap
page read and write
7D4400179000
trusted library allocation
page read and write
1B57EC40000
heap
page read and write
4E0C00A30000
trusted library allocation
page read and write
1D30003A4000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
25C01748000
trusted library allocation
page read and write
25C00818000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
130800186000
trusted library allocation
page read and write
25C020B1000
trusted library allocation
page read and write
3FA00502000
trusted library allocation
page read and write
FD057FC000
stack
page read and write
25C00B11000
trusted library allocation
page read and write
78B000DB0000
trusted library allocation
page read and write
25C0089C000
trusted library allocation
page read and write
182E000
heap
page read and write
25C01998000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
46A00029C000
trusted library allocation
page read and write
4E0C0070C000
trusted library allocation
page read and write
26C83B29000
heap
page read and write
FD19FFE000
unkown
page readonly
1D300007D000
trusted library allocation
page read and write
5683C000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C01930000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C015F0000
trusted library allocation
page read and write
3F30000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
46A0002CC000
trusted library allocation
page read and write
39FC00754000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
77C800254000
trusted library allocation
page read and write
78B000254000
trusted library allocation
page read and write
17BE000
heap
page read and write
148026BA000
heap
page read and write
1BE5B82B000
heap
page read and write
FD077FD000
stack
page read and write
1BE5B824000
heap
page read and write
72FC0011C000
trusted library allocation
page read and write
1C39F2C0000
heap
page read and write
26C83B2D000
heap
page read and write
3FA00857000
trusted library allocation
page read and write
25C020C8000
trusted library allocation
page read and write
25C020D8000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
26C9CB02000
heap
page read and write
25C0136C000
trusted library allocation
page read and write
9B99FE000
unkown
page readonly
39FC007EC000
trusted library allocation
page read and write
5820002B0000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1BE5B80A000
heap
page read and write
1DDC9A5D000
heap
page read and write
25C02148000
trusted library allocation
page read and write
25C018EF000
trusted library allocation
page read and write
1BE5B770000
unclassified section
page readonly
3FCC000
heap
page read and write
4E0C002E4000
trusted library allocation
page read and write
3340FFE000
unkown
page readonly
37E0002C8000
trusted library allocation
page read and write
7D44002B1000
trusted library allocation
page read and write
25C009D8000
trusted library allocation
page read and write
7D4400138000
trusted library allocation
page read and write
5E00001B0000
trusted library allocation
page read and write
25C0191C000
trusted library allocation
page read and write
4E0C00554000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
3EF6000
heap
page read and write
26CF1B48000
heap
page read and write
19799213000
heap
page read and write
25C00B4D000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
3F62000
heap
page read and write
1BE5B82B000
heap
page read and write
787C0020C000
trusted library allocation
page read and write
25C01430000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
1D30000C0000
trusted library allocation
page read and write
39FC00B7C000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
3FA0053D000
trusted library allocation
page read and write
25C013A4000
trusted library allocation
page read and write
134400461000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
182C000
heap
page read and write
3F2E000
heap
page read and write
787E000
heap
page read and write
26CF1B29000
heap
page read and write
25C00718000
trusted library allocation
page read and write
25C020C4000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
1BE5B80A000
heap
page read and write
3FA00322000
trusted library allocation
page read and write
3EFD000
heap
page read and write
106C002E8000
trusted library allocation
page read and write
17C5000
heap
page read and write
180C000
heap
page read and write
730400338000
direct allocation
page read and write
3FA00552000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
5E0000124000
trusted library allocation
page read and write
72FC00114000
trusted library allocation
page read and write
568F4000
trusted library allocation
page read and write
17C2000
heap
page read and write
130800079000
trusted library allocation
page read and write
7D4400104000
trusted library allocation
page read and write
14802672000
heap
page read and write
730400217000
direct allocation
page read and write
106C00254000
trusted library allocation
page read and write
26C9FEB0000
unclassified section
page read and write
25C00884000
trusted library allocation
page read and write
13080007B000
trusted library allocation
page read and write
7B1800264000
trusted library allocation
page read and write
25C00BB0000
trusted library allocation
page read and write
1D69F750000
heap
page read and write
1B1B000
heap
page read and write
25C006BC000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C020B4000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
2A400000000
trusted library allocation
page readonly
25C01399000
trusted library allocation
page read and write
554002A4000
trusted library allocation
page read and write
3FBC000
heap
page read and write
25C013AC000
trusted library allocation
page read and write
4E0C002DC000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
1344005E1000
trusted library allocation
page read and write
FD037FD000
stack
page read and write
39FC00718000
trusted library allocation
page read and write
25C0142E000
trusted library allocation
page read and write
3DBB000
stack
page read and write
106C0032B000
trusted library allocation
page read and write
1504000
unkown
page read and write
78D2000
heap
page read and write
26CF1B32000
heap
page read and write
26CF1B4D000
heap
page read and write
183DBA02000
heap
page read and write
1BE5B811000
heap
page read and write
40A400278000
trusted library allocation
page read and write
1DDC4527000
heap
page read and write
78B0005D8000
trusted library allocation
page read and write
1C39F2BB000
heap
page read and write
25C003B4000
trusted library allocation
page read and write
26CF1AE2000
heap
page read and write
82F3BF6000
stack
page read and write
25C019B8000
trusted library allocation
page read and write
4E0C001B4000
trusted library allocation
page read and write
3FA005D4000
trusted library allocation
page read and write
78B000D8C000
trusted library allocation
page read and write
26CF1AE9000
heap
page read and write
333EFFE000
unkown
page readonly
3FA00582000
trusted library allocation
page read and write
25C003D4000
trusted library allocation
page read and write
3FA00604000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C019AC000
trusted library allocation
page read and write
25C018C4000
trusted library allocation
page read and write
25C018F4000
trusted library allocation
page read and write
730400316000
direct allocation
page read and write
787C002BC000
trusted library allocation
page read and write
1344004A1000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
14AF703C000
heap
page read and write
1BE5B811000
heap
page read and write
1D3000286000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
1BE5B809000
heap
page read and write
4C5000404000
direct allocation
page read and write
3FA0055F000
trusted library allocation
page read and write
3FA008F0000
trusted library allocation
page read and write
4E0C00C18000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
3FA0051A000
trusted library allocation
page read and write
1C39C4FC000
heap
page read and write
25C0194A000
trusted library allocation
page read and write
1D3000334000
trusted library allocation
page read and write
25C0194A000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B82B000
heap
page read and write
787C00220000
trusted library allocation
page read and write
4E0C010BA000
trusted library allocation
page read and write
2DA00011C000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1829000
heap
page read and write
25C01374000
trusted library allocation
page read and write
39FC00620000
trusted library allocation
page read and write
333AFFE000
unkown
page readonly
569BC000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
1B6400234000
direct allocation
page read and write
25C0194D000
trusted library allocation
page read and write
25C0078B000
trusted library allocation
page read and write
1DDC454C000
heap
page read and write
46A000300000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1BEDEA94000
trusted library allocation
page read and write
25C012E4000
trusted library allocation
page read and write
676000424000
trusted library allocation
page read and write
4E0C00350000
trusted library allocation
page read and write
26CF1B28000
heap
page read and write
1D30003DC000
trusted library allocation
page read and write
3FA005F6000
trusted library allocation
page read and write
39FC009E0000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
5820002E8000
trusted library allocation
page read and write
37E000254000
trusted library allocation
page read and write
19799224000
heap
page read and write
FD10FFE000
unkown
page readonly
25C01968000
trusted library allocation
page read and write
5820002C0000
trusted library allocation
page read and write
4E0C005EC000
trusted library allocation
page read and write
FD017FB000
stack
page read and write
1BE5B809000
heap
page read and write
4E0C00CBC000
trusted library allocation
page read and write
39FC007BC000
trusted library allocation
page read and write
25C00A54000
trusted library allocation
page read and write
25C02115000
trusted library allocation
page read and write
25C003EC000
trusted library allocation
page read and write
25C000250000
trusted library allocation
page read and write
9B91FE000
stack
page read and write
4E0C00C20000
trusted library allocation
page read and write
5E00000E2000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
25C02058000
trusted library allocation
page read and write
182B000
heap
page read and write
4E0C00BB4000
trusted library allocation
page read and write
3FA00559000
trusted library allocation
page read and write
3FA00882000
trusted library allocation
page read and write
130800114000
trusted library allocation
page read and write
3FA00766000
trusted library allocation
page read and write
180B000
heap
page read and write
39FC003A0000
trusted library allocation
page read and write
4E0C010DC000
trusted library allocation
page read and write
17E7000
heap
page read and write
26CF1B30000
heap
page read and write
25C00A80000
trusted library allocation
page read and write
3FCF000
heap
page read and write
1B57EE54000
heap
page read and write
1487F3B0000
heap
page read and write
1BE5B80A000
heap
page read and write
6F0C00244000
direct allocation
page read and write
72FC000F0000
trusted library allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
25C018C9000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
2A400180000
trusted library allocation
page read and write
25C00A24000
trusted library allocation
page read and write
1F8FFFE000
stack
page read and write
148026B8000
heap
page read and write
179E000
heap
page read and write
25C019B8000
trusted library allocation
page read and write
26C83A02000
heap
page read and write
3F1F000
heap
page read and write
26C83BE5000
heap
page read and write
25C01944000
trusted library allocation
page read and write
70D0002A4000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
4C5000254000
direct allocation
page read and write
25C0205A000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
3F4E000
heap
page read and write
7940000
heap
page read and write
357C002A4000
trusted library allocation
page read and write
3FA00953000
trusted library allocation
page read and write
17E7000
heap
page read and write
3FA008F4000
trusted library allocation
page read and write
787C00201000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1BE5B869000
heap
page read and write
4E0C01140000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
58200040C000
trusted library allocation
page read and write
3FA0055A000
trusted library allocation
page read and write
25C018F4000
trusted library allocation
page read and write
26D600F4000
trusted library allocation
page read and write
1E800230000
trusted library allocation
page read and write
25C012DC000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
25C01996000
trusted library allocation
page read and write
25C00B56000
trusted library allocation
page read and write
1800000
heap
page read and write
1BE5B811000
heap
page read and write
3FC6000
heap
page read and write
78B0010D0000
trusted library allocation
page read and write
25C018DD000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
25C020F8000
trusted library allocation
page read and write
7D44002B8000
trusted library allocation
page read and write
40A4002B8000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
1914002A8000
trusted library allocation
page read and write
13080012C000
trusted library allocation
page read and write
1B504402000
heap
page read and write
1D3000135000
trusted library allocation
page read and write
39FC003BC000
trusted library allocation
page read and write
1BE5B86D000
heap
page read and write
1BE5B863000
heap
page read and write
2A400242000
trusted library allocation
page read and write
1813000
heap
page read and write
25C020C6000
trusted library allocation
page read and write
1487F4C7000
heap
page read and write
3FCC000
heap
page read and write
FD107FE000
stack
page read and write
1DDC4554000
heap
page read and write
3FA004F5000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
26D60124000
trusted library allocation
page read and write
FD137FC000
stack
page read and write
1C39C7A0000
unclassified section
page read and write
130800175000
trusted library allocation
page read and write
25C018E8000
trusted library allocation
page read and write
25C012A2000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
4E0C00580000
trusted library allocation
page read and write
37E0002B4000
trusted library allocation
page read and write
180C000
heap
page read and write
5E0000152000
trusted library allocation
page read and write
3FA004F3000
trusted library allocation
page read and write
1487F390000
remote allocation
page read and write
5E0000230000
trusted library allocation
page read and write
182E000
heap
page read and write
3FA0058E000
trusted library allocation
page read and write
4E0C01128000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
130800038000
trusted library allocation
page read and write
25C02134000
trusted library allocation
page read and write
3335FFE000
unkown
page readonly
1487F4F8000
heap
page read and write
25C02046000
trusted library allocation
page read and write
4E0C01050000
trusted library allocation
page read and write
1B17000
heap
page read and write
38C80027C000
direct allocation
page read and write
1BE5B827000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
25C01468000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
78B000254000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
182A000
heap
page read and write
182B000
heap
page read and write
25C01916000
trusted library allocation
page read and write
4380000
remote allocation
page read and write
25C019A0000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
1979922B000
heap
page read and write
148026D2000
heap
page read and write
148025C0000
unclassified section
page read and write
568A0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C0199C000
trusted library allocation
page read and write
1759000
heap
page read and write
4C5000274000
direct allocation
page read and write
26C9FEE0000
trusted library allocation
page read and write
106C002A0000
trusted library allocation
page read and write
25C00BAE000
trusted library allocation
page read and write
25C018FD000
trusted library allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
26C83BD8000
heap
page read and write
4E0C00238000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
130800075000
trusted library allocation
page read and write
4E0C00F40000
trusted library allocation
page read and write
730400312000
direct allocation
page read and write
3F30000
heap
page read and write
FD70DFE000
stack
page read and write
82F53FF000
stack
page read and write
161D000
stack
page read and write
1BE5B811000
heap
page read and write
26CF1AA2000
heap
page read and write
1BE5B809000
heap
page read and write
1BE5B82B000
heap
page read and write
4E0C00B7C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C02050000
trusted library allocation
page read and write
1D3000054000
trusted library allocation
page read and write
25C0120C000
trusted library allocation
page read and write
7D440018D000
trusted library allocation
page read and write
357C0026C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B80F000
heap
page read and write
25C0192C000
trusted library allocation
page read and write
25C019BC000
trusted library allocation
page read and write
26D60D27000
unclassified section
page read and write
4E0C0039F000
trusted library allocation
page read and write
1D300018C000
trusted library allocation
page read and write
25C01982000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
17BE000
heap
page read and write
25C01435000
trusted library allocation
page read and write
174B000
heap
page read and write
7D44002C8000
trusted library allocation
page read and write
781C000
heap
page read and write
25C00B44000
trusted library allocation
page read and write
1DDC9B02000
heap
page read and write
26CF1A80000
heap
page read and write
25C018C4000
trusted library allocation
page read and write
78B000F88000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
72FC00079000
trusted library allocation
page read and write
3341FFE000
unkown
page readonly
1F8DFFE000
stack
page read and write
4E0C006E0000
trusted library allocation
page read and write
3FA00202000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
4E0C00E51000
trusted library allocation
page read and write
3FA005EC000
trusted library allocation
page read and write
1DDC44EA000
heap
page read and write
1DDC452F000
heap
page read and write
7823000
heap
page read and write
3FA004C0000
trusted library allocation
page read and write
7FFF7A2C0000
trusted library allocation
page read and write
25C0175D000
trusted library allocation
page read and write
4E0C000A4000
trusted library allocation
page read and write
25C00B58000
trusted library allocation
page read and write
3FC2000
heap
page read and write
1818000
heap
page read and write
7D4400139000
trusted library allocation
page read and write
3F9F000
heap
page read and write
7944000
heap
page read and write
2DA000038000
trusted library allocation
page read and write
78B000AF8000
trusted library allocation
page read and write
25C00BB8000
trusted library allocation
page read and write
3FA00865000
trusted library allocation
page read and write
7FFF7A2C4000
trusted library allocation
page execute and read and write
38C8002BC000
direct allocation
page read and write
25C019A0000
trusted library allocation
page read and write
5B6800284000
direct allocation
page read and write
39FC009B4000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
25C00BA0000
trusted library allocation
page read and write
39FC00750000
trusted library allocation
page read and write
25C0142A000
trusted library allocation
page read and write
25C02092000
trusted library allocation
page read and write
5E0000218000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
3C2D9FE000
stack
page read and write
1344002C1000
trusted library allocation
page read and write
568A4000
trusted library allocation
page read and write
25C018FF000
trusted library allocation
page read and write
82F5BFE000
stack
page read and write
3FA004D5000
trusted library allocation
page read and write
46A000404000
trusted library allocation
page read and write
46A000211000
trusted library allocation
page read and write
17D7000
heap
page read and write
39FC00638000
trusted library allocation
page read and write
3FC8000
heap
page read and write
26C83B60000
heap
page read and write
7D44002B8000
trusted library allocation
page read and write
46A000250000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C00771000
trusted library allocation
page read and write
3FA00502000
trusted library allocation
page read and write
78B000A68000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
2DA000070000
trusted library allocation
page read and write
5540028C000
trusted library allocation
page read and write
3F5D000
heap
page read and write
1809000
heap
page read and write
25C018F8000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1E800264000
trusted library allocation
page read and write
26C83B2D000
heap
page read and write
7D4400278000
trusted library allocation
page read and write
25C018F8000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
25C0141C000
trusted library allocation
page read and write
25C0120C000
trusted library allocation
page read and write
78B000B7C000
trusted library allocation
page read and write
FD14FFD000
stack
page read and write
25C018C4000
trusted library allocation
page read and write
FD7ADFD000
stack
page read and write
39FC0089C000
trusted library allocation
page read and write
4E0C00DC4000
trusted library allocation
page read and write
7342000
heap
page read and write
25C0142E000
trusted library allocation
page read and write
25C019B2000
trusted library allocation
page read and write
55400220000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
7D440029F000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
7D440016D000
trusted library allocation
page read and write
39FC0039F000
trusted library allocation
page read and write
357C00220000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B827000
heap
page read and write
1BE5B80A000
heap
page read and write
1BE5B809000
heap
page read and write
3F5C000
heap
page read and write
197991E0000
heap
page read and write
3FA004F7000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
39FC00614000
trusted library allocation
page read and write
25C002B4000
trusted library allocation
page read and write
1D300027C000
trusted library allocation
page read and write
3F62000
heap
page read and write
4E0C00388000
trusted library allocation
page read and write
46A000408000
trusted library allocation
page read and write
7876000
heap
page read and write
3FA005FD000
trusted library allocation
page read and write
4E0C00C44000
trusted library allocation
page read and write
26C83B60000
heap
page read and write
4E0C004B8000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
4E0C01174000
trusted library allocation
page read and write
78B000B9C000
trusted library allocation
page read and write
17F8000
heap
page read and write
884F1FC000
stack
page read and write
78B0009C0000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
106000244000
direct allocation
page read and write
5B68002D8000
direct allocation
page read and write
72A2BFE000
stack
page read and write
26C83BD5000
heap
page read and write
25C0206E000
trusted library allocation
page read and write
26CF1B7E000
heap
page read and write
78B001070000
trusted library allocation
page read and write
26C9C870000
heap
page read and write
39FC0089E000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C02113000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
4E0C00254000
trusted library allocation
page read and write
40A400264000
trusted library allocation
page read and write
25C01874000
trusted library allocation
page read and write
4E0C00540000
trusted library allocation
page read and write
7D4400263000
trusted library allocation
page read and write
7D44001CC000
trusted library allocation
page read and write
3FA00519000
trusted library allocation
page read and write
1DDC4535000
heap
page read and write
5E00000D8000
trusted library allocation
page read and write
26C9CC13000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C003D4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
7FFF7A31D000
trusted library allocation
page execute and read and write
17E7000
heap
page read and write
25C0200C000
trusted library allocation
page read and write
25C018F2000
trusted library allocation
page read and write
26CF1A2B000
heap
page read and write
130800250000
trusted library allocation
page read and write
25C0086B000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
6760002E0000
trusted library allocation
page read and write
39FC008AD000
trusted library allocation
page read and write
25C01280000
trusted library allocation
page read and write
1344003E1000
trusted library allocation
page read and write
17F7000
heap
page read and write
25C00708000
trusted library allocation
page read and write
1DDC4546000
heap
page read and write
77EC000
heap
page read and write
619000201000
direct allocation
page read and write
1D300013C000
trusted library allocation
page read and write
39FC008AD000
trusted library allocation
page read and write
1BE5B70A000
unclassified section
page read and write
4E0C005A8000
trusted library allocation
page read and write
1E80028C000
trusted library allocation
page read and write
1DDC44E8000
heap
page read and write
1308001C2000
trusted library allocation
page read and write
49E4001CE000
trusted library allocation
page read and write
FD097FC000
stack
page read and write
25C018F2000
trusted library allocation
page read and write
25C01918000
trusted library allocation
page read and write
25C020CC000
trusted library allocation
page read and write
3F36000
heap
page read and write
82F8BFA000
stack
page read and write
1BE5B802000
heap
page read and write
4E0C010EC000
trusted library allocation
page read and write
7D4400171000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
40A4002A4000
trusted library allocation
page read and write
3FA0053E000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
2F1C002B8000
trusted library allocation
page read and write
1829000
heap
page read and write
4E0C00C34000
trusted library allocation
page read and write
5E00001E9000
trusted library allocation
page read and write
25C0163A000
trusted library allocation
page read and write
38C8002EC000
direct allocation
page read and write
25C00B08000
trusted library allocation
page read and write
182E000
heap
page read and write
25C01918000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
39FC003BC000
trusted library allocation
page read and write
25C018F8000
trusted library allocation
page read and write
A1037FE000
unkown
page readonly
781D000
heap
page read and write
25C012CC000
trusted library allocation
page read and write
4E0C00330000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
3F4A000
heap
page read and write
130800284000
trusted library allocation
page read and write
787C0028C000
trusted library allocation
page read and write
3FC4000
heap
page read and write
7B1800424000
trusted library allocation
page read and write
14802686000
heap
page read and write
FD79DFA000
stack
page read and write
4E0C01199000
trusted library allocation
page read and write
1E800238000
trusted library allocation
page read and write
39FC00834000
trusted library allocation
page read and write
26C83B43000
heap
page read and write
6760002F0000
trusted library allocation
page read and write
4E0C005DC000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
787C00298000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
1DDC44E3000
heap
page read and write
25C0195E000
trusted library allocation
page read and write
17C2000
heap
page read and write
25C012CC000
trusted library allocation
page read and write
25C012AC000
trusted library allocation
page read and write
705C000
stack
page read and write
1D30001B0000
trusted library allocation
page read and write
1818000
heap
page read and write
1D64002D8000
direct allocation
page read and write
17A7000
heap
page read and write
25C00A38000
trusted library allocation
page read and write
25C01436000
trusted library allocation
page read and write
106C0040C000
trusted library allocation
page read and write
4E0C0022C000
trusted library allocation
page read and write
780A000
heap
page read and write
7D44001F0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B824000
heap
page read and write
3FA00952000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C018C6000
trusted library allocation
page read and write
1D300034C000
trusted library allocation
page read and write
1DDC4540000
heap
page read and write
1BE5B811000
heap
page read and write
25C0176C000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
39FC0089E000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C0197E000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
3FA000C2000
trusted library allocation
page read and write
5E0000250000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
1308001B4000
trusted library allocation
page read and write
4250002A4000
direct allocation
page read and write
3FA00974000
trusted library allocation
page read and write
1C39F295000
heap
page read and write
25C00B44000
trusted library allocation
page read and write
3F76000
heap
page read and write
40A400244000
trusted library allocation
page read and write
130800120000
trusted library allocation
page read and write
60EC002DC000
trusted library allocation
page read and write
183DA01C000
heap
page read and write
2DA0000D0000
trusted library allocation
page read and write
38C8002C0000
direct allocation
page read and write
1B5B1E80000
heap
page read and write
26C85802000
heap
page read and write
67600024C000
trusted library allocation
page read and write
106C00264000
trusted library allocation
page read and write
39FC00A73000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
78FA000
heap
page read and write
25C009EC000
trusted library allocation
page read and write
3FA00603000
trusted library allocation
page read and write
182E000
heap
page read and write
3EFD000
heap
page read and write
1487F700000
heap
page read and write
26CF1B4D000
heap
page read and write
17E7000
heap
page read and write
25C019B8000
trusted library allocation
page read and write
1C39F400000
unclassified section
page read and write
25C020FB000
trusted library allocation
page read and write
25C0210B000
trusted library allocation
page read and write
25C0201C000
trusted library allocation
page read and write
55400201000
trusted library allocation
page read and write
25C018C4000
trusted library allocation
page read and write
884D9FE000
unkown
page readonly
1DDC4527000
heap
page read and write
25C0130C000
trusted library allocation
page read and write
25C01960000
trusted library allocation
page read and write
3FA0061D000
trusted library allocation
page read and write
77F7000
heap
page read and write
25C01990000
trusted library allocation
page read and write
26CF1B45000
heap
page read and write
3FA00852000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
1B57ED20000
heap
page readonly
26C83B00000
heap
page read and write
1D3000079000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
FD0C7FB000
stack
page read and write
1AD0000
heap
page read and write
148026A7000
heap
page read and write
25C01998000
trusted library allocation
page read and write
1D30003F4000
trusted library allocation
page read and write
35F71FE000
stack
page read and write
25C00878000
trusted library allocation
page read and write
35F99FE000
unkown
page readonly
3F0D000
heap
page read and write
39FC007C8000
trusted library allocation
page read and write
5E00000FC000
trusted library allocation
page read and write
3F4B000
heap
page read and write
A1057FE000
unkown
page readonly
26CF3830000
trusted library allocation
page read and write
40A4002E4000
trusted library allocation
page read and write
3F2E000
heap
page read and write
FD7A5FE000
unkown
page readonly
17C3000
heap
page read and write
1BE5B811000
heap
page read and write
183DA002000
heap
page read and write
25C0208C000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
7FFF4D460000
direct allocation
page execute read
3F0B000
heap
page read and write
6F0C00230000
direct allocation
page read and write
1344001A1000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
39FC00A70000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C012E4000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
787C0027C000
trusted library allocation
page read and write
4E0C00348000
trusted library allocation
page read and write
25C01224000
trusted library allocation
page read and write
25C00662000
trusted library allocation
page read and write
1BE5B869000
heap
page read and write
25C012F8000
trusted library allocation
page read and write
78B000A3D000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
783B000
heap
page read and write
17F7000
heap
page read and write
25C018B6000
trusted library allocation
page read and write
25C018A4000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C012CC000
trusted library allocation
page read and write
14802712000
heap
page read and write
1BE5B811000
heap
page read and write
4E0C0067D000
trusted library allocation
page read and write
1DDC44E5000
heap
page read and write
26CF1B2F000
heap
page read and write
39FC00A2C000
trusted library allocation
page read and write
3FA00543000
trusted library allocation
page read and write
7D4400260000
trusted library allocation
page read and write
5690C000
trusted library allocation
page read and write
25C002D4000
trusted library allocation
page read and write
3FD2000
heap
page read and write
35FA1FE000
stack
page read and write
25C01980000
trusted library allocation
page read and write
25C00A38000
trusted library allocation
page read and write
7D44000EC000
trusted library allocation
page read and write
FD007FD000
stack
page read and write
7D44002A8000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
25C01956000
trusted library allocation
page read and write
1C39C399000
unclassified section
page read and write
25C01888000
trusted library allocation
page read and write
25C01428000
trusted library allocation
page read and write
191400248000
trusted library allocation
page read and write
4E0C01078000
trusted library allocation
page read and write
39FC00A74000
trusted library allocation
page read and write
17C5000
heap
page read and write
1E8002BC000
trusted library allocation
page read and write
78CB000
heap
page read and write
7D44000DF000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C012A0000
trusted library allocation
page read and write
3F43000
heap
page read and write
25C01314000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
26CF1AC8000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
130800230000
trusted library allocation
page read and write
26CF1B43000
heap
page read and write
333E7FE000
stack
page read and write
25C019B4000
trusted library allocation
page read and write
4E0C0035D000
trusted library allocation
page read and write
14805067000
unclassified section
page read and write
25C0141C000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
25C018C9000
trusted library allocation
page read and write
5B6800201000
direct allocation
page read and write
884B1FE000
stack
page read and write
25C01980000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
39FC00634000
trusted library allocation
page read and write
26C83A02000
heap
page read and write
26CF1B46000
heap
page read and write
39FC008B0000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
41A0000
heap
page read and write
25C020D8000
trusted library allocation
page read and write
25C019AA000
trusted library allocation
page read and write
7D4400116000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
25C0002EC000
trusted library allocation
page read and write
39FC00A60000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
1DDC9A95000
heap
page read and write
25C01425000
trusted library allocation
page read and write
7828000
heap
page read and write
4E0C00CC3000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
4E0C00F60000
trusted library allocation
page read and write
39FC00730000
trusted library allocation
page read and write
1B57EF02000
heap
page read and write
2DA00010C000
trusted library allocation
page read and write
1829000
heap
page read and write
1C39F312000
heap
page read and write
72FC0009C000
trusted library allocation
page read and write
78B000B90000
trusted library allocation
page read and write
6DDE000
stack
page read and write
4E0C00385000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
181A000
heap
page read and write
46A0002E8000
trusted library allocation
page read and write
180E000
heap
page read and write
1BE5B809000
heap
page read and write
25C00BA8000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
3D7C000
stack
page read and write
1C39C42B000
heap
page read and write
2EB4002C4000
direct allocation
page read and write
2DA0000E0000
trusted library allocation
page read and write
25C00794000
trusted library allocation
page read and write
7D440000C000
trusted library allocation
page read and write
191400238000
trusted library allocation
page read and write
1BEDFB57000
unclassified section
page read and write
25C00634000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
17F7000
heap
page read and write
1BE5B809000
heap
page read and write
25C017B7000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1C39C413000
heap
page read and write
25C019B8000
trusted library allocation
page read and write
78B0002E0000
trusted library allocation
page read and write
72A8BFE000
stack
page read and write
582000230000
trusted library allocation
page read and write
25C01959000
trusted library allocation
page read and write
FD11FFE000
unkown
page readonly
25C01430000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C01854000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C00BD0000
trusted library allocation
page read and write
1344001B1000
trusted library allocation
page read and write
25C01986000
trusted library allocation
page read and write
39FC008AC000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
3A4B7FE000
stack
page read and write
1BE5B809000
heap
page read and write
4E0C005B4000
trusted library allocation
page read and write
1B6400254000
direct allocation
page read and write
1660000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
FD0FFFE000
unkown
page readonly
25C012A3000
trusted library allocation
page read and write
4E0C00BD0000
trusted library allocation
page read and write
1D6400290000
direct allocation
page read and write
25C019B4000
trusted library allocation
page read and write
106C00310000
trusted library allocation
page read and write
25C00A01000
trusted library allocation
page read and write
26CF1B30000
heap
page read and write
3FA00874000
trusted library allocation
page read and write
1AF3000
heap
page read and write
4E0C00AF8000
trusted library allocation
page read and write
4E0C00ED4000
trusted library allocation
page read and write
1979921B000
heap
page read and write
1BE5B824000
heap
page read and write
676000408000
trusted library allocation
page read and write
25C00B90000
trusted library allocation
page read and write
1C39F2E1000
heap
page read and write
25C0123C000
trusted library allocation
page read and write
39FC00718000
trusted library allocation
page read and write
25C0194B000
trusted library allocation
page read and write
4E0C01150000
trusted library allocation
page read and write
3FA0055C000
trusted library allocation
page read and write
1B57EE8B000
heap
page read and write
7D440029F000
trusted library allocation
page read and write
4E0C00BE8000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
FD1BFFE000
unkown
page readonly
1DDC452F000
heap
page read and write
1C39F297000
heap
page read and write
1BE5B80F000
heap
page read and write
25C00AB0000
trusted library allocation
page read and write
25C01270000
trusted library allocation
page read and write
25C01932000
trusted library allocation
page read and write
39FC00BAC000
trusted library allocation
page read and write
3F34000
heap
page read and write
14805050000
trusted library allocation
page read and write
25C01256000
trusted library allocation
page read and write
25C018CB000
trusted library allocation
page read and write
25C00316000
trusted library allocation
page read and write
25C019BB000
trusted library allocation
page read and write
39FC00B18000
trusted library allocation
page read and write
25C018A2000
trusted library allocation
page read and write
1E800298000
trusted library allocation
page read and write
1C39C780000
trusted library allocation
page read and write
1308000B4000
trusted library allocation
page read and write
40A4002D4000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
A107FFE000
stack
page read and write
4E0C006F0000
trusted library allocation
page read and write
1308000D0000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C00888000
trusted library allocation
page read and write
26C9CA13000
heap
page read and write
39FC00B38000
trusted library allocation
page read and write
3A457FE000
stack
page read and write
4E0C00DD4000
trusted library allocation
page read and write
4E0C01054000
trusted library allocation
page read and write
3F8C000
heap
page read and write
3FA007A4000
trusted library allocation
page read and write
3F5A000
heap
page read and write
3324002A4000
trusted library allocation
page read and write
25C0203E000
trusted library allocation
page read and write
25C01982000
trusted library allocation
page read and write
26C83B02000
heap
page read and write
25C019A2000
trusted library allocation
page read and write
72A9BFF000
stack
page read and write
1BE5B811000
heap
page read and write
3324002B8000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
45A40026C000
trusted library allocation
page read and write
582000284000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
3F1F000
heap
page read and write
56801000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
25C00BF4000
trusted library allocation
page read and write
39FC00B01000
trusted library allocation
page read and write
1D3000114000
trusted library allocation
page read and write
38C800254000
direct allocation
page read and write
1B6400230000
direct allocation
page read and write
25C00340000
trusted library allocation
page read and write
5B6800220000
direct allocation
page read and write
1BE5B824000
heap
page read and write
25C00674000
trusted library allocation
page read and write
25C0002E0000
trusted library allocation
page read and write
1D30000D8000
trusted library allocation
page read and write
78B000BA9000
trusted library allocation
page read and write
3FA008A6000
trusted library allocation
page read and write
39FC00A2C000
trusted library allocation
page read and write
3F97000
heap
page read and write
4250002E4000
direct allocation
page read and write
1813000
heap
page read and write
25C018DA000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
1BEDFB17000
unclassified section
page read and write
2EE40040C000
trusted library allocation
page read and write
4E0C00F50000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
25C0139A000
trusted library allocation
page read and write
25C019A2000
trusted library allocation
page read and write
1C39C77F000
trusted library allocation
page read and write
78B000247000
trusted library allocation
page read and write
3A46FFE000
unkown
page readonly
25C012D4000
trusted library allocation
page read and write
4E0C01019000
trusted library allocation
page read and write
25C018BB000
trusted library allocation
page read and write
25C018BB000
trusted library allocation
page read and write
5680C000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
26C83B02000
heap
page read and write
25C00404000
trusted library allocation
page read and write
7823000
heap
page read and write
3FCF000
heap
page read and write
3F57000
heap
page read and write
25C01892000
trusted library allocation
page read and write
1DDC4546000
heap
page read and write
3FA00504000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
25C00BEC000
trusted library allocation
page read and write
1BEDE890000
unclassified section
page read and write
26CF1B41000
heap
page read and write
367C00306000
direct allocation
page read and write
3FD1000
heap
page read and write
1BE5B825000
heap
page read and write
1809000
heap
page read and write
3FA008E1000
trusted library allocation
page read and write
7815000
heap
page read and write
1BE5B80A000
heap
page read and write
17D0000
heap
page read and write
55400288000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
25C00A66000
trusted library allocation
page read and write
3FA00590000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
7D440028E000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3F6C000
heap
page read and write
4090000
trusted library allocation
page read and write
3FA00768000
trusted library allocation
page read and write
25C019D8000
trusted library allocation
page read and write
39FC00614000
trusted library allocation
page read and write
7D44002B2000
trusted library allocation
page read and write
7304002E8000
direct allocation
page read and write
25C003D5000
trusted library allocation
page read and write
78B000244000
trusted library allocation
page read and write
25C00764000
trusted library allocation
page read and write
25C00BA0000
trusted library allocation
page read and write
25C01968000
trusted library allocation
page read and write
25C018BE000
trusted library allocation
page read and write
3FA00840000
trusted library allocation
page read and write
130800201000
trusted library allocation
page read and write
25C01938000
trusted library allocation
page read and write
4270000
heap
page read and write
3EF9000
heap
page read and write
25C00B11000
trusted library allocation
page read and write
9B89FE000
unkown
page readonly
25C012B4000
trusted library allocation
page read and write
25C00B4C000
trusted library allocation
page read and write
367C00234000
direct allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
26C83B29000
heap
page read and write
782C000
heap
page read and write
3FA00878000
trusted library allocation
page read and write
1914002A8000
trusted library allocation
page read and write
77C8002E4000
trusted library allocation
page read and write
FD167FE000
stack
page read and write
39FC00238000
trusted library allocation
page read and write
17DD000
heap
page read and write
6760002D0000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
45A4002DC000
trusted library allocation
page read and write
25C020F8000
trusted library allocation
page read and write
4E0C00570000
trusted library allocation
page read and write
17D5000
heap
page read and write
1BE5B82B000
heap
page read and write
25C019B0000
trusted library allocation
page read and write
1BE5B80B000
heap
page read and write
26CF1B29000
heap
page read and write
25C0090C000
trusted library allocation
page read and write
4E0C00164000
trusted library allocation
page read and write
25C0089C000
trusted library allocation
page read and write
1B6400201000
direct allocation
page read and write
6190002A0000
direct allocation
page read and write
4E0C004CC000
trusted library allocation
page read and write
619000250000
direct allocation
page read and write
6F0C00274000
direct allocation
page read and write
25C000211000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
26CF1B2F000
heap
page read and write
25C014D3000
trusted library allocation
page read and write
FD0D7FE000
stack
page read and write
730400240000
direct allocation
page read and write
25C018DD000
trusted library allocation
page read and write
37E000258000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
2DA00008C000
trusted library allocation
page read and write
1344001D0000
trusted library allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
1D300041C000
trusted library allocation
page read and write
25C016AE000
trusted library allocation
page read and write
39FC00424000
trusted library allocation
page read and write
40AA000
trusted library allocation
page read and write
26CF19F0000
heap
page read and write
1BE5B811000
heap
page read and write
25C018DF000
trusted library allocation
page read and write
39FC00AC0000
trusted library allocation
page read and write
25C00B10000
trusted library allocation
page read and write
40AC000
trusted library allocation
page read and write
26C9CC54000
heap
page read and write
1BE5B809000
heap
page read and write
712C002B8000
trusted library allocation
page read and write
25C018D0000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C0077D000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
7D44002B2000
trusted library allocation
page read and write
39FC00914000
trusted library allocation
page read and write
26CF1A78000
heap
page read and write
25C018C9000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
3FA005D1000
trusted library allocation
page read and write
1D3000348000
trusted library allocation
page read and write
14EC000
unkown
page execute and read and write
780A000
heap
page read and write
25C018FA000
trusted library allocation
page read and write
1BE5B86D000
heap
page read and write
39FC008A9000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C0040C000
trusted library allocation
page read and write
25C018DA000
trusted library allocation
page read and write
78B0010B8000
trusted library allocation
page read and write
78B000F5C000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
25C02011000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1DDC452F000
heap
page read and write
14802691000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
3C2E9FE000
stack
page read and write
1DDC9A46000
heap
page read and write
25C018E2000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1E800201000
trusted library allocation
page read and write
33357FE000
stack
page read and write
130800188000
trusted library allocation
page read and write
554002B0000
trusted library allocation
page read and write
5E0000013000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
25C0142E000
trusted library allocation
page read and write
5686C000
trusted library allocation
page read and write
3FA00842000
trusted library allocation
page read and write
2EE400335000
trusted library allocation
page read and write
25C01930000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
1BE5B6F2000
unclassified section
page read and write
1B57EE70000
heap
page read and write
1487F720000
trusted library allocation
page read and write
78B000A3C000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
25C00898000
trusted library allocation
page read and write
130800270000
trusted library allocation
page read and write
7D44002A4000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
37E0002D8000
trusted library allocation
page read and write
82F63FA000
stack
page read and write
35F61FD000
stack
page read and write
4260000
heap
page read and write
2A400182000
trusted library allocation
page read and write
1DDC9AAD000
heap
page read and write
25C018EF000
trusted library allocation
page read and write
1344003A1000
trusted library allocation
page read and write
3FA008B9000
trusted library allocation
page read and write
26C83B2D000
heap
page read and write
A108FFB000
stack
page read and write
26CF1B27000
heap
page read and write
787C002A0000
trusted library allocation
page read and write
14AF8AA0000
heap
page read and write
4E0C01001000
trusted library allocation
page read and write
26D60120000
trusted library allocation
page read and write
25C003B6000
trusted library allocation
page read and write
3FA00877000
trusted library allocation
page read and write
183DA02B000
heap
page read and write
5E0000284000
trusted library allocation
page read and write
25C00888000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1809000
heap
page read and write
7D44002C8000
trusted library allocation
page read and write
106C00258000
trusted library allocation
page read and write
2DA0000A8000
trusted library allocation
page read and write
1B5AD500000
heap
page readonly
3FA0054C000
trusted library allocation
page read and write
619000284000
direct allocation
page read and write
568FC000
trusted library allocation
page read and write
39FC009E0000
trusted library allocation
page read and write
1C39C370000
heap
page readonly
738000248000
trusted library allocation
page read and write
25C01304000
trusted library allocation
page read and write
4E0C00C1C000
trusted library allocation
page read and write
39FC0028C000
trusted library allocation
page read and write
1344004E1000
trusted library allocation
page read and write
78B00025A000
trusted library allocation
page read and write
730400304000
direct allocation
page read and write
1DDC9A46000
heap
page read and write
25C012A4000
trusted library allocation
page read and write
3FCD000
heap
page read and write
25C02304000
trusted library allocation
page read and write
13080018C000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
25C018B4000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
1DDC9A4F000
heap
page read and write
25C01988000
trusted library allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
3FA003C2000
trusted library allocation
page read and write
39FC0028C000
trusted library allocation
page read and write
3FA008B3000
trusted library allocation
page read and write
3A487FE000
stack
page read and write
4E0C00E5B000
trusted library allocation
page read and write
39FC003BE000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
39FC00829000
trusted library allocation
page read and write
39FC00A98000
trusted library allocation
page read and write
7D44002B1000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
25C00F28000
trusted library allocation
page read and write
4E0C0001F000
trusted library allocation
page read and write
26C9FD07000
unclassified section
page read and write
73040032C000
direct allocation
page read and write
25C01290000
trusted library allocation
page read and write
70D000220000
trusted library allocation
page read and write
1DDC9A68000
heap
page read and write
3FA00382000
trusted library allocation
page read and write
4E0C00FAC000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C0136D000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
88451FE000
stack
page read and write
1DDC9AAD000
heap
page read and write
1DDC4535000
heap
page read and write
1DDC9A46000
heap
page read and write
78B000FEE000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
25C01428000
trusted library allocation
page read and write
38C8002CC000
direct allocation
page read and write
1BE5B80A000
heap
page read and write
7D440017C000
trusted library allocation
page read and write
25C00AD8000
trusted library allocation
page read and write
43A0000
heap
page read and write
3F07000
heap
page read and write
25C0196C000
trusted library allocation
page read and write
19799200000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
A17CDFD000
stack
page read and write
1DDC9C02000
heap
page read and write
25C01953000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3F20000
heap
page read and write
78B0005D8000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
FD01FFE000
unkown
page readonly
25C00B16000
trusted library allocation
page read and write
3F25000
heap
page read and write
130800348000
trusted library allocation
page read and write
7830000
heap
page read and write
25C01384000
trusted library allocation
page read and write
25C0087A000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
3FA00792000
trusted library allocation
page read and write
40A4002C8000
trusted library allocation
page read and write
25C0214C000
trusted library allocation
page read and write
6190002B4000
direct allocation
page read and write
1800000
heap
page read and write
25C00B44000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C01934000
trusted library allocation
page read and write
19799078000
remote allocation
page execute read
25C0189E000
trusted library allocation
page read and write
7D44000A8000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C01998000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C01288000
trusted library allocation
page read and write
25C003C0000
trusted library allocation
page read and write
423E000
stack
page read and write
25C0192C000
trusted library allocation
page read and write
2A400202000
trusted library allocation
page read and write
39FC00B94000
trusted library allocation
page read and write
72FC00110000
trusted library allocation
page read and write
45A4002C4000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
1308001E0000
trusted library allocation
page read and write
25C00B60000
trusted library allocation
page read and write
4E0C00E18000
trusted library allocation
page read and write
77D2000
heap
page read and write
25C018B4000
trusted library allocation
page read and write
5E0000220000
trusted library allocation
page read and write
2EB4002B4000
direct allocation
page read and write
39FC00724000
trusted library allocation
page read and write
731E000
heap
page read and write
730400304000
direct allocation
page read and write
1D69F7A0000
heap
page read and write
25C01994000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
106000264000
direct allocation
page read and write
26CF1B40000
heap
page read and write
6F0C00201000
direct allocation
page read and write
78B000DED000
trusted library allocation
page read and write
26D60670000
unclassified section
page read and write
134400181000
trusted library allocation
page read and write
39FC00838000
trusted library allocation
page read and write
25C01290000
trusted library allocation
page read and write
25C018F2000
trusted library allocation
page read and write
78B000D3C000
trusted library allocation
page read and write
25C01266000
trusted library allocation
page read and write
39FC00624000
trusted library allocation
page read and write
5682C000
trusted library allocation
page read and write
367C00319000
direct allocation
page read and write
25C012D4000
trusted library allocation
page read and write
3F97000
heap
page read and write
37E0002D8000
trusted library allocation
page read and write
42684FB40000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
17C4000
heap
page read and write
3FCF000
heap
page read and write
25C020EF000
trusted library allocation
page read and write
3FA004C3000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
1BEDFB64000
unclassified section
page read and write
1C39C78F000
trusted library allocation
page read and write
3FA005D6000
trusted library allocation
page read and write
1D3000394000
trusted library allocation
page read and write
26C83A02000
heap
page read and write
25C020EC000
trusted library allocation
page read and write
1B5AD540000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
3FA008F3000
trusted library allocation
page read and write
4E0C00DC3000
trusted library allocation
page read and write
1BEDF1CD000
unclassified section
page read and write
1D69F802000
heap
page read and write
25C0191A000
trusted library allocation
page read and write
4E0C00C50000
trusted library allocation
page read and write
1308003DC000
trusted library allocation
page read and write
712C002C4000
trusted library allocation
page read and write
1B64002D4000
direct allocation
page read and write
7D440027A000
trusted library allocation
page read and write
25C00AAC000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
33387FC000
stack
page read and write
7D44002B2000
trusted library allocation
page read and write
3FA008EC000
trusted library allocation
page read and write
1D6400220000
direct allocation
page read and write
39FC00B0D000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
25C0139D000
trusted library allocation
page read and write
4E0C00E18000
trusted library allocation
page read and write
FD187FB000
stack
page read and write
FD1C7FD000
stack
page read and write
25C0087A000
trusted library allocation
page read and write
357C002A4000
trusted library allocation
page read and write
3339FFE000
unkown
page readonly
25C0144C000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
7D4400248000
trusted library allocation
page read and write
1DDC6302000
heap
page read and write
25C000220000
trusted library allocation
page read and write
40A400288000
trusted library allocation
page read and write
1B57EE1B000
heap
page read and write
FD067FC000
stack
page read and write
25C0199C000
trusted library allocation
page read and write
78B000BF4000
trusted library allocation
page read and write
38C80020C000
direct allocation
page read and write
25C00EC4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C000304000
trusted library allocation
page read and write
1BE5B85D000
heap
page read and write
1344001E1000
trusted library allocation
page read and write
42D0000
heap
page read and write
1F8F7FE000
unkown
page readonly
1BE5B809000
heap
page read and write
26CF1B35000
heap
page read and write
25C0141C000
trusted library allocation
page read and write
3FA00931000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
367C0030C000
direct allocation
page read and write
7D44002AA000
trusted library allocation
page read and write
25C018E8000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
3FBF000
heap
page read and write
26CF1B32000
heap
page read and write
13440014B000
trusted library allocation
page read and write
17C8000
heap
page read and write
25C018BB000
trusted library allocation
page read and write
72FC00024000
trusted library allocation
page read and write
3EBC000
stack
page read and write
14802570000
trusted library allocation
page read and write
25C003EC000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
77E9000
heap
page read and write
5E0000249000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
26CF1B46000
heap
page read and write
26D606F0000
unclassified section
page read and write
3FA008EF000
trusted library allocation
page read and write
25C00BD4000
trusted library allocation
page read and write
4E0C011CC000
trusted library allocation
page read and write
25C018A8000
trusted library allocation
page read and write
1D300034C000
trusted library allocation
page read and write
3FA00442000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
17D5000
heap
page read and write
25C019A6000
trusted library allocation
page read and write
25C000404000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
676000348000
trusted library allocation
page read and write
425000288000
direct allocation
page read and write
25C02030000
trusted library allocation
page read and write
3FA00875000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
712C00284000
trusted library allocation
page read and write
1D30003B4000
trusted library allocation
page read and write
25C012BC000
trusted library allocation
page read and write
67600025C000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
7D4400178000
trusted library allocation
page read and write
39FC00724000
trusted library allocation
page read and write
1D6400230000
direct allocation
page read and write
1D30001AC000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
3FDD000
heap
page read and write
26C83A22000
heap
page read and write
4E0C00C0C000
trusted library allocation
page read and write
FD7E5FE000
unkown
page readonly
1821000
heap
page read and write
1204000
unkown
page execute and write copy
25C008A4000
trusted library allocation
page read and write
25C018ED000
trusted library allocation
page read and write
25C020BB000
trusted library allocation
page read and write
39FC0088C000
trusted library allocation
page read and write
676000220000
trusted library allocation
page read and write
25C01468000
trusted library allocation
page read and write
1B6400220000
direct allocation
page read and write
1DDC9A02000
heap
page read and write
40A400238000
trusted library allocation
page read and write
39FC00924000
trusted library allocation
page read and write
56814000
trusted library allocation
page read and write
1487F802000
heap
page read and write
25C0039E000
trusted library allocation
page read and write
25C002C0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C018D8000
trusted library allocation
page read and write
25C018D8000
trusted library allocation
page read and write
1DDC4529000
heap
page read and write
25C019A6000
trusted library allocation
page read and write
3FA00182000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
676000334000
trusted library allocation
page read and write
25C008A0000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
17BE000
heap
page read and write
17E7000
heap
page read and write
25C0192C000
trusted library allocation
page read and write
FD09FFE000
unkown
page readonly
25C01940000
trusted library allocation
page read and write
7B1800211000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
1F8AFFE000
stack
page read and write
25C01988000
trusted library allocation
page read and write
39FC0061C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
112C000
unkown
page execute and read and write
25C018C6000
trusted library allocation
page read and write
25C00BB6000
trusted library allocation
page read and write
7822000
heap
page read and write
37E0002A0000
trusted library allocation
page read and write
78CA000
heap
page read and write
26CF1B41000
heap
page read and write
3FA00542000
trusted library allocation
page read and write
2A400180000
trusted library allocation
page read and write
35F69FE000
unkown
page readonly
3338FFE000
unkown
page readonly
25C00BBE000
trusted library allocation
page read and write
46A000244000
trusted library allocation
page read and write
25C01240000
trusted library allocation
page read and write
25C01874000
trusted library allocation
page read and write
7D440008C000
trusted library allocation
page read and write
1BE5B826000
heap
page read and write
7304002C4000
direct allocation
page read and write
25C0074C000
trusted library allocation
page read and write
56824000
trusted library allocation
page read and write
26CF1C10000
heap
page read and write
174D000
heap
page read and write
783B000
heap
page read and write
25C0032C000
trusted library allocation
page read and write
182C000
heap
page read and write
1C39F27E000
heap
page read and write
25C01302000
trusted library allocation
page read and write
568D8000
trusted library allocation
page read and write
4E0C0040C000
trusted library allocation
page read and write
357C00238000
trusted library allocation
page read and write
7D440029F000
trusted library allocation
page read and write
2DA00000C000
trusted library allocation
page read and write
3F5B000
heap
page read and write
25C0196C000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
1DDC9A68000
heap
page read and write
25C020D8000
trusted library allocation
page read and write
26C83B19000
heap
page read and write
1818000
heap
page read and write
6190002A4000
direct allocation
page read and write
26CF1B41000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
25C0139F000
trusted library allocation
page read and write
332DFFE000
unkown
page readonly
4090000
trusted library allocation
page read and write
25C013A8000
trusted library allocation
page read and write
FD147FE000
unkown
page readonly
3F47000
heap
page read and write
3FA00580000
trusted library allocation
page read and write
1D6400244000
direct allocation
page read and write
1D3000135000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
4E0C00BC0000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
4E0C00A64000
trusted library allocation
page read and write
13080012C000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
425000404000
direct allocation
page read and write
1DDC4545000
heap
page read and write
25C00770000
trusted library allocation
page read and write
1D300027C000
trusted library allocation
page read and write
25C00E01000
trusted library allocation
page read and write
712C00220000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C012A4000
trusted library allocation
page read and write
46A000280000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C0093C000
trusted library allocation
page read and write
25C019C8000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
1487F3F0000
heap
page readonly
582000264000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
78C2000
heap
page read and write
25C0089E000
trusted library allocation
page read and write
39FC00888000
trusted library allocation
page read and write
25C02056000
trusted library allocation
page read and write
78B001084000
trusted library allocation
page read and write
1BE5B85F000
heap
page read and write
1BE5B811000
heap
page read and write
39FC003A7000
trusted library allocation
page read and write
25C00370000
trusted library allocation
page read and write
78B000FE8000
trusted library allocation
page read and write
357C00268000
trusted library allocation
page read and write
77E2000
heap
page read and write
25C01783000
trusted library allocation
page read and write
568E4000
trusted library allocation
page read and write
FD087FE000
stack
page read and write
25C01980000
trusted library allocation
page read and write
1D300013C000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
25C016BC000
trusted library allocation
page read and write
3C2C9FC000
stack
page read and write
7D44002B2000
trusted library allocation
page read and write
3FBC000
heap
page read and write
25C00B44000
trusted library allocation
page read and write
3FA008B8000
trusted library allocation
page read and write
1E800248000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA00908000
trusted library allocation
page read and write
25C018E4000
trusted library allocation
page read and write
3FA00779000
trusted library allocation
page read and write
3F43000
heap
page read and write
25C00BA0000
trusted library allocation
page read and write
3FA00965000
trusted library allocation
page read and write
5690C000
trusted library allocation
page read and write
72FC000A8000
trusted library allocation
page read and write
26C9C9C0000
trusted library allocation
page read and write
1C39F2AF000
heap
page read and write
25C01950000
trusted library allocation
page read and write
425000230000
direct allocation
page read and write
3324002A4000
trusted library allocation
page read and write
134400361000
trusted library allocation
page read and write
25C00020C000
trusted library allocation
page read and write
77C5000
heap
page read and write
4E0C0048A000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
4E0C001E0000
trusted library allocation
page read and write
3FA00615000
trusted library allocation
page read and write
39FC00408000
trusted library allocation
page read and write
72A53FE000
stack
page read and write
25C0178B000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
78ED000
heap
page read and write
2A4001C0000
trusted library allocation
page read and write
4E0C01019000
trusted library allocation
page read and write
1308000F4000
trusted library allocation
page read and write
3F20000
heap
page read and write
25C01988000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
4E0C00C9C000
trusted library allocation
page read and write
3F62000
heap
page read and write
25C00F2C000
trusted library allocation
page read and write
333D7FE000
stack
page read and write
25C02030000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
4E0C00D40000
trusted library allocation
page read and write
106C00244000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
582000220000
trusted library allocation
page read and write
134400143000
trusted library allocation
page read and write
712C00254000
trusted library allocation
page read and write
730400314000
direct allocation
page read and write
1BE5B809000
heap
page read and write
25C013D4000
trusted library allocation
page read and write
1750000
heap
page read and write
77E0000
heap
page read and write
25C0196A000
trusted library allocation
page read and write
5E0000240000
trusted library allocation
page read and write
1E800240000
trusted library allocation
page read and write
25C019A2000
trusted library allocation
page read and write
60EC002E0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
56848000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
78B000DB0000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
25C00B24000
trusted library allocation
page read and write
39FC00854000
trusted library allocation
page read and write
1BE5B85F000
heap
page read and write
1BE5B82B000
heap
page read and write
26C83B1A000
heap
page read and write
3F77000
heap
page read and write
25C019B2000
trusted library allocation
page read and write
7D4400218000
trusted library allocation
page read and write
25C018FD000
trusted library allocation
page read and write
25C00878000
trusted library allocation
page read and write
3FA005E6000
trusted library allocation
page read and write
1C39F2D3000
heap
page read and write
3F58000
heap
page read and write
17E7000
heap
page read and write
1B57EE02000
heap
page read and write
174D000
heap
page read and write
19799000000
heap
page read and write
569A4000
trusted library allocation
page read and write
180B000
heap
page read and write
72A23EF000
stack
page read and write
40C0000
trusted library allocation
page read and write
25C012C4000
trusted library allocation
page read and write
78B0011B0000
trusted library allocation
page read and write
1B640027C000
direct allocation
page read and write
78D2000
heap
page read and write
1D3000378000
trusted library allocation
page read and write
78B000A68000
trusted library allocation
page read and write
9B21FB000
stack
page read and write
1C39F278000
heap
page read and write
17F8000
heap
page read and write
1D3000114000
trusted library allocation
page read and write
26C82D50000
trusted library section
page readonly
1B5AD66F000
heap
page read and write
25C01883000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C008A0000
trusted library allocation
page read and write
130800294000
trusted library allocation
page read and write
5E00001DC000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
39FC00372000
trusted library allocation
page read and write
60EC002A0000
trusted library allocation
page read and write
180D000
heap
page read and write
4E0C00E24000
trusted library allocation
page read and write
3F93000
heap
page read and write
1BE5B811000
heap
page read and write
25C012F4000
trusted library allocation
page read and write
25C01201000
trusted library allocation
page read and write
46A000284000
trusted library allocation
page read and write
554002D4000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
4E0C010AC000
trusted library allocation
page read and write
78B0002E4000
trusted library allocation
page read and write
26CF1B35000
heap
page read and write
7D4400150000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
25C0181C000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
77C800211000
trusted library allocation
page read and write
1C3A1C40000
trusted library allocation
page read and write
130800102000
trusted library allocation
page read and write
1B6400238000
direct allocation
page read and write
7D4400278000
trusted library allocation
page read and write
25C00375000
trusted library allocation
page read and write
25C01948000
trusted library allocation
page read and write
130800154000
trusted library allocation
page read and write
25C0020C000
trusted library allocation
page read and write
7B18002A4000
trusted library allocation
page read and write
5E0000050000
trusted library allocation
page read and write
25C019A6000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
1BE5B811000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
180E000
heap
page read and write
2EB4002A4000
direct allocation
page read and write
1D3000194000
trusted library allocation
page read and write
712C00201000
trusted library allocation
page read and write
4E0C00CEC000
trusted library allocation
page read and write
25C01942000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
3F05000
heap
page read and write
4E0C007AC000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
619000274000
direct allocation
page read and write
25C00624000
trusted library allocation
page read and write
3EED000
heap
page read and write
1BE5B824000
heap
page read and write
39FC007D0000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
4E0C00C29000
trusted library allocation
page read and write
13440047E000
trusted library allocation
page read and write
1B6400264000
direct allocation
page read and write
1BE5B809000
heap
page read and write
25C0192C000
trusted library allocation
page read and write
3FA00842000
trusted library allocation
page read and write
FD12FFE000
unkown
page readonly
3FA004F9000
trusted library allocation
page read and write
5E00001A5000
trusted library allocation
page read and write
25C00E64000
trusted library allocation
page read and write
730400278000
direct allocation
page read and write
3F27000
heap
page read and write
82F73FC000
stack
page read and write
25C00EFC000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
A1047FE000
unkown
page readonly
25C018E8000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1E800258000
trusted library allocation
page read and write
7D4400158000
trusted library allocation
page read and write
3FA00638000
trusted library allocation
page read and write
25C019A6000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
25C01929000
trusted library allocation
page read and write
3FA00340000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
3FA00621000
trusted library allocation
page read and write
78B000234000
trusted library allocation
page read and write
FD0E7FC000
stack
page read and write
25C01543000
trusted library allocation
page read and write
3A497FE000
stack
page read and write
3FAA000
heap
page read and write
38C800201000
direct allocation
page read and write
25C01942000
trusted library allocation
page read and write
134400421000
trusted library allocation
page read and write
4E0C002DF000
trusted library allocation
page read and write
3F6F000
heap
page read and write
25C00884000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
3C3E000
stack
page read and write
3F36000
heap
page read and write
1BE5B80F000
heap
page read and write
26CF1CF0000
heap
page readonly
3F0A000
heap
page read and write
3FA005FF000
trusted library allocation
page read and write
26CF1B44000
heap
page read and write
39FC007D8000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1BE5B80F000
heap
page read and write
25C01314000
trusted library allocation
page read and write
3F43000
heap
page read and write
25C013B9000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1814000
heap
page read and write
25C01902000
trusted library allocation
page read and write
39FC009E0000
trusted library allocation
page read and write
1344005C1000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
60EC002C4000
trusted library allocation
page read and write
1487F49C000
heap
page read and write
1BE5B825000
heap
page read and write
25C00B98000
trusted library allocation
page read and write
1D300036C000
trusted library allocation
page read and write
78B000E3C000
trusted library allocation
page read and write
619000288000
direct allocation
page read and write
39FC00634000
trusted library allocation
page read and write
FD7ADF9000
stack
page read and write
25C01950000
trusted library allocation
page read and write
780A000
heap
page read and write
7D440027C000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
4E0C00B90000
trusted library allocation
page read and write
38C8002BC000
direct allocation
page read and write
582000258000
trusted library allocation
page read and write
106000201000
direct allocation
page read and write
25C019B4000
trusted library allocation
page read and write
88441FE000
stack
page read and write
676000240000
trusted library allocation
page read and write
17C5000
heap
page read and write
3324002DC000
trusted library allocation
page read and write
3FCF000
heap
page read and write
1819000
heap
page read and write
25C003E0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
39FC003C8000
trusted library allocation
page read and write
25C00B98000
trusted library allocation
page read and write
38C800248000
direct allocation
page read and write
77D7000
heap
page read and write
17E5000
heap
page read and write
25C01938000
trusted library allocation
page read and write
3FA0092F000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
4E0C00034000
trusted library allocation
page read and write
3FA00778000
trusted library allocation
page read and write
17E7000
heap
page read and write
3F57000
heap
page read and write
72FC000D8000
trusted library allocation
page read and write
4E0C01194000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C01430000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
25C012E4000
trusted library allocation
page read and write
78B000BD8000
trusted library allocation
page read and write
39FC00A68000
trusted library allocation
page read and write
25C0139E000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C01938000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
26CF1B31000
heap
page read and write
77C800278000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
25C01959000
trusted library allocation
page read and write
4E0C00254000
trusted library allocation
page read and write
1308001D8000
trusted library allocation
page read and write
3FA008BA000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
49E400181000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C020E0000
trusted library allocation
page read and write
4E0C004AC000
trusted library allocation
page read and write
1D3000130000
trusted library allocation
page read and write
3FA00614000
trusted library allocation
page read and write
1814000
heap
page read and write
25C01940000
trusted library allocation
page read and write
25C003AC000
trusted library allocation
page read and write
4E0C00C01000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
1BE5B827000
heap
page read and write
1D300034C000
trusted library allocation
page read and write
4E0C0011C000
trusted library allocation
page read and write
25C018F4000
trusted library allocation
page read and write
25C012FA000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
712C002B8000
trusted library allocation
page read and write
39FC00384000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
1829000
heap
page read and write
78CF000
heap
page read and write
180B000
heap
page read and write
53ED000
stack
page read and write
1D300034C000
trusted library allocation
page read and write
25C0176C000
trusted library allocation
page read and write
25C0122C000
trusted library allocation
page read and write
6E1D000
stack
page read and write
333BFFE000
unkown
page readonly
49E400361000
trusted library allocation
page read and write
1344001C1000
trusted library allocation
page read and write
78EA000
heap
page read and write
1B640020C000
direct allocation
page read and write
3FA0061A000
trusted library allocation
page read and write
730400380000
direct allocation
page read and write
4E0C01190000
trusted library allocation
page read and write
1C39F302000
heap
page read and write
1D69F7D0000
trusted library allocation
page read and write
25C012D4000
trusted library allocation
page read and write
1D300011C000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
4E0C00C46000
trusted library allocation
page read and write
1D30003DC000
trusted library allocation
page read and write
4E0C00B54000
trusted library allocation
page read and write
25C01943000
trusted library allocation
page read and write
25C00340000
trusted library allocation
page read and write
3FA004D6000
trusted library allocation
page read and write
5B6800250000
direct allocation
page read and write
26CF1AA5000
heap
page read and write
25C0199C000
trusted library allocation
page read and write
4E0C00E18000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
2A400082000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
357C00201000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
1E8002B0000
trusted library allocation
page read and write
1979C730000
unclassified section
page read and write
3FA008EB000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
77E0000
heap
page read and write
40A400201000
trusted library allocation
page read and write
39FC00624000
trusted library allocation
page read and write
1B5AD613000
heap
page read and write
25C01902000
trusted library allocation
page read and write
7830000
heap
page read and write
25C00A6A000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
1DDC4541000
heap
page read and write
357C002C8000
trusted library allocation
page read and write
7D4400178000
trusted library allocation
page read and write
1BE5B828000
heap
page read and write
25C019AC000
trusted library allocation
page read and write
39FC006FE000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
26C83B29000
heap
page read and write
FD16FFE000
unkown
page readonly
3F47000
heap
page read and write
25C018F2000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
1B57ED60000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1814000
heap
page read and write
197990C0000
heap
page read and write
3FA00956000
trusted library allocation
page read and write
39FC008A9000
trusted library allocation
page read and write
130800338000
trusted library allocation
page read and write
1D6400211000
direct allocation
page read and write
1BE5B809000
heap
page read and write
3FA008FA000
trusted library allocation
page read and write
25C01959000
trusted library allocation
page read and write
25C00424000
trusted library allocation
page read and write
25C018ED000
trusted library allocation
page read and write
582000418000
trusted library allocation
page read and write
1D3000173000
trusted library allocation
page read and write
78B0002DC000
trusted library allocation
page read and write
1B640029C000
direct allocation
page read and write
64AF000
stack
page read and write
1620000
heap
page read and write
1487F4E6000
heap
page read and write
1480268E000
heap
page read and write
3FA0052B000
trusted library allocation
page read and write
26D1FEE0000
trusted library allocation
page read and write
3FA00975000
trusted library allocation
page read and write
3FA000C2000
trusted library allocation
page read and write
191400274000
trusted library allocation
page read and write
FD71DFB000
stack
page read and write
7D4400280000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
25C013DA000
trusted library allocation
page read and write
39FC00A50000
trusted library allocation
page read and write
25C00620000
trusted library allocation
page read and write
39FC003B9000
trusted library allocation
page read and write
77F7000
heap
page read and write
3F4C000
heap
page read and write
25C0199C000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
25C00EFE000
trusted library allocation
page read and write
676000310000
trusted library allocation
page read and write
25C0087A000
trusted library allocation
page read and write
25C0191C000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
39FC0074C000
trusted library allocation
page read and write
39FC003A5000
trusted library allocation
page read and write
730400318000
direct allocation
page read and write
26CF1B2F000
heap
page read and write
1BE00010000
trusted library allocation
page read and write
3A47FFE000
unkown
page readonly
3FA00631000
trusted library allocation
page read and write
106C00230000
trusted library allocation
page read and write
1D3000350000
trusted library allocation
page read and write
FD0F7FD000
stack
page read and write
25C006A0000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
39FC009AC000
trusted library allocation
page read and write
25C020FB000
trusted library allocation
page read and write
25C018C6000
trusted library allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
39FC00A60000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
2DA000028000
trusted library allocation
page read and write
7D440029F000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
7833000
heap
page read and write
582000408000
trusted library allocation
page read and write
39FC00689000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
26C85404000
trusted library allocation
page read and write
77C800418000
trusted library allocation
page read and write
180B000
heap
page read and write
3F24000
heap
page read and write
3A477FC000
stack
page read and write
26C83B18000
heap
page read and write
3FA008EB000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
106C00418000
trusted library allocation
page read and write
A1087FE000
unkown
page readonly
738000201000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
3FA0097F000
trusted library allocation
page read and write
38C8002DC000
direct allocation
page read and write
25C01959000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
7D440027E000
trusted library allocation
page read and write
7D4400230000
trusted library allocation
page read and write
25C012C8000
trusted library allocation
page read and write
3FA00102000
trusted library allocation
page read and write
7B1800244000
trusted library allocation
page read and write
25C012DC000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
4E0C00790000
trusted library allocation
page read and write
25C00290000
trusted library allocation
page read and write
77F7000
heap
page read and write
4E0C00DE0000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
3F81000
heap
page read and write
25C01936000
trusted library allocation
page read and write
1BE5B445000
heap
page read and write
13080021C000
trusted library allocation
page read and write
1F90FFE000
stack
page read and write
1D300026C000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
37E0002B4000
trusted library allocation
page read and write
7D44002C8000
trusted library allocation
page read and write
25C018E8000
trusted library allocation
page read and write
1BE5B866000
heap
page read and write
4E0C00F78000
trusted library allocation
page read and write
78F7000
heap
page read and write
25C019B9000
trusted library allocation
page read and write
130800294000
trusted library allocation
page read and write
73040020C000
direct allocation
page read and write
39FC009B8000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
130800144000
trusted library allocation
page read and write
55400230000
trusted library allocation
page read and write
39FC00829000
trusted library allocation
page read and write
787C0028C000
trusted library allocation
page read and write
25C0142C000
trusted library allocation
page read and write
A17D5FE000
unkown
page readonly
3FA00888000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
3FA008AC000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
25C018EA000
trusted library allocation
page read and write
78B000A7C000
trusted library allocation
page read and write
7821000
heap
page read and write
130800390000
trusted library allocation
page read and write
3F5A000
heap
page read and write
25C01260000
trusted library allocation
page read and write
17C5000
heap
page read and write
4E0C0022C000
trusted library allocation
page read and write
3FA00040000
trusted library allocation
page readonly
B40000
unkown
page readonly
25C0199E000
trusted library allocation
page read and write
39FC00954000
trusted library allocation
page read and write
77D2000
heap
page read and write
25C0136B000
trusted library allocation
page read and write
1D6A2DF0000
unclassified section
page read and write
1B5AD653000
heap
page read and write
1D30003CC000
trusted library allocation
page read and write
4E0C00AA4000
trusted library allocation
page read and write
25C02120000
trusted library allocation
page read and write
25C0197E000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
582000278000
trusted library allocation
page read and write
39FC008AA000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
619000230000
direct allocation
page read and write
1B5AD705000
heap
page read and write
4E0C000CC000
trusted library allocation
page read and write
1D300023C000
trusted library allocation
page read and write
4E0C0067F000
trusted library allocation
page read and write
3332FFE000
unkown
page readonly
3FA005C2000
trusted library allocation
page read and write
1B57EE78000
heap
page read and write
1BE5B80A000
heap
page read and write
1BE5B3A0000
remote allocation
page read and write
46A000270000
trusted library allocation
page read and write
39FC003AA000
trusted library allocation
page read and write
1344001D2000
trusted library allocation
page read and write
25C0141C000
trusted library allocation
page read and write
1D640029C000
direct allocation
page read and write
2EB400230000
direct allocation
page read and write
582000248000
trusted library allocation
page read and write
39FC0079C000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
169E000
stack
page read and write
1829000
heap
page read and write
1DDC4544000
heap
page read and write
25C00B11000
trusted library allocation
page read and write
39FC0060C000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
554002E4000
trusted library allocation
page read and write
B10000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
25C01270000
trusted library allocation
page read and write
3F92000
heap
page read and write
4E0C00412000
trusted library allocation
page read and write
25C00378000
trusted library allocation
page read and write
7D4400254000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
3EF9000
heap
page read and write
7D44002B2000
trusted library allocation
page read and write
3FA0062D000
trusted library allocation
page read and write
1813000
heap
page read and write
5820002A0000
trusted library allocation
page read and write
1480257F000
trusted library allocation
page read and write
7313000
heap
page read and write
730400324000
direct allocation
page read and write
3FA005B4000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
39FC009AC000
trusted library allocation
page read and write
46A000240000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
787C00230000
trusted library allocation
page read and write
70D0002D0000
trusted library allocation
page read and write
39FC0060C000
trusted library allocation
page read and write
7B180028C000
trusted library allocation
page read and write
3F65000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
72FC00075000
trusted library allocation
page read and write
19799950000
trusted library allocation
page read and write
FD06FFE000
unkown
page readonly
7D440027C000
trusted library allocation
page read and write
1C39C43D000
heap
page read and write
39FC00AE0000
trusted library allocation
page read and write
56950000
trusted library allocation
page read and write
134400261000
trusted library allocation
page read and write
56910000
trusted library allocation
page read and write
17F7000
heap
page read and write
25C01316000
trusted library allocation
page read and write
25C019CF000
trusted library allocation
page read and write
3A417FD000
stack
page read and write
7808000
heap
page read and write
25C018B4000
trusted library allocation
page read and write
3F9E000
heap
page read and write
568C8000
trusted library allocation
page read and write
3FA00544000
trusted library allocation
page read and write
3FA00889000
trusted library allocation
page read and write
25C020CA000
trusted library allocation
page read and write
FD15FFE000
unkown
page readonly
25C0139D000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
7D44002B1000
trusted library allocation
page read and write
7802000
heap
page read and write
3FA00954000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
4E0C010B8000
trusted library allocation
page read and write
582000238000
trusted library allocation
page read and write
148026C3000
heap
page read and write
619000234000
direct allocation
page read and write
2EB400244000
direct allocation
page read and write
1487F42B000
heap
page read and write
6C9E000
stack
page read and write
25C018EA000
trusted library allocation
page read and write
39FC009B8000
trusted library allocation
page read and write
60EC00230000
trusted library allocation
page read and write
738000288000
trusted library allocation
page read and write
25C008AF000
trusted library allocation
page read and write
26C83B12000
heap
page read and write
78B000254000
trusted library allocation
page read and write
3FD4000
heap
page read and write
4E0C00728000
trusted library allocation
page read and write
25C0203E000
trusted library allocation
page read and write
25C00322000
trusted library allocation
page read and write
4E0C00B4B000
trusted library allocation
page read and write
3FA0091E000
trusted library allocation
page read and write
88541FE000
stack
page read and write
1BE5B80A000
heap
page read and write
25C019AC000
trusted library allocation
page read and write
39FC008B0000
trusted library allocation
page read and write
25C019BB000
trusted library allocation
page read and write
7B1800248000
trusted library allocation
page read and write
60EC00220000
trusted library allocation
page read and write
7B180032B000
trusted library allocation
page read and write
25C020EC000
trusted library allocation
page read and write
40A400220000
trusted library allocation
page read and write
130800148000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
25C00B11000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
7D4400240000
trusted library allocation
page read and write
7D44000E3000
trusted library allocation
page read and write
1D30001E0000
trusted library allocation
page read and write
39FC00A7C000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
5E00000A8000
trusted library allocation
page read and write
5E00000C4000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
5B6800254000
direct allocation
page read and write
1F8B7FE000
unkown
page readonly
33397FE000
stack
page read and write
25C01946000
trusted library allocation
page read and write
14AF6FD0000
heap
page readonly
25C02068000
trusted library allocation
page read and write
25C00F00000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
3F69000
heap
page read and write
26CF1B44000
heap
page read and write
7D44001B8000
trusted library allocation
page read and write
7304002AC000
direct allocation
page read and write
3FBC000
heap
page read and write
46A000260000
trusted library allocation
page read and write
25C01956000
trusted library allocation
page read and write
4E0C005DC000
trusted library allocation
page read and write
25C019A6000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
78B000A34000
trusted library allocation
page read and write
25C00359000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
4E0C00F38000
trusted library allocation
page read and write
FD02FFE000
unkown
page readonly
4E0C00087000
trusted library allocation
page read and write
39FC00B74000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
26C9CA02000
heap
page read and write
4E0C00A80000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
1B5AD660000
heap
page read and write
1060002CC000
direct allocation
page read and write
4E0C000D8000
trusted library allocation
page read and write
787C002B0000
trusted library allocation
page read and write
106000288000
direct allocation
page read and write
72A73FC000
stack
page read and write
78D2000
heap
page read and write
25C0206E000
trusted library allocation
page read and write
25C00751000
trusted library allocation
page read and write
1809000
heap
page read and write
1DDC4555000
heap
page read and write
3A43FFE000
unkown
page readonly
1BE5B824000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
3F7B000
heap
page read and write
3FA0053F000
trusted library allocation
page read and write
4C5000230000
direct allocation
page read and write
1308000D8000
trusted library allocation
page read and write
26CF1AEC000
heap
page read and write
39FC0065C000
trusted library allocation
page read and write
37E000230000
trusted library allocation
page read and write
1DDC4540000
heap
page read and write
39FC002F4000
trusted library allocation
page read and write
787C0028C000
trusted library allocation
page read and write
7D440006C000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
3FA00864000
trusted library allocation
page read and write
787C002C8000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
13080034C000
trusted library allocation
page read and write
25C018BE000
trusted library allocation
page read and write
25C0180C000
trusted library allocation
page read and write
46A000220000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
7D4400254000
trusted library allocation
page read and write
7D4400223000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
4E0C00364000
trusted library allocation
page read and write
25C01942000
trusted library allocation
page read and write
17C5000
heap
page read and write
4E0C00C80000
trusted library allocation
page read and write
25C00730000
trusted library allocation
page read and write
39FC008AC000
trusted library allocation
page read and write
45A400298000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
78B000A6C000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
26CF1B44000
heap
page read and write
4E0C00700000
trusted library allocation
page read and write
7D4400050000
trusted library allocation
page read and write
70D00029C000
trusted library allocation
page read and write
3FBF000
heap
page read and write
25C019A2000
trusted library allocation
page read and write
25C01248000
trusted library allocation
page read and write
1C39F2AC000
heap
page read and write
1DDC4541000
heap
page read and write
425000274000
direct allocation
page read and write
1B5B2002000
heap
page read and write
106C002E0000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
4E0C00D14000
trusted library allocation
page read and write
148026B0000
heap
page read and write
26CF1B32000
heap
page read and write
25C019B2000
trusted library allocation
page read and write
3FA00627000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C01934000
trusted library allocation
page read and write
39FC00A70000
trusted library allocation
page read and write
72FC00058000
trusted library allocation
page read and write
25C00914000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
1487F458000
heap
page read and write
183D9F60000
trusted library allocation
page read and write
1C39F2AA000
heap
page read and write
3FA00142000
trusted library allocation
page read and write
25C01968000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
35FA9FE000
unkown
page readonly
1F927FE000
unkown
page readonly
712C00248000
trusted library allocation
page read and write
17F7000
heap
page read and write
1D30000E0000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
712C00288000
trusted library allocation
page read and write
78F1000
heap
page read and write
26CF1B32000
heap
page read and write
1DDC4541000
heap
page read and write
1BE5B502000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
357C00294000
trusted library allocation
page read and write
4E0C00A0C000
trusted library allocation
page read and write
3FA00973000
trusted library allocation
page read and write
1D30003CC000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
25C00AA7000
trusted library allocation
page read and write
1B57EE59000
heap
page read and write
25C0060C000
trusted library allocation
page read and write
26CF1B42000
heap
page read and write
25C019B6000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
4E0C00554000
trusted library allocation
page read and write
25C017B8000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
1DDC4530000
heap
page read and write
2EB400288000
direct allocation
page read and write
25C0199C000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C00BC8000
trusted library allocation
page read and write
25C012AC000
trusted library allocation
page read and write
582000201000
trusted library allocation
page read and write
1D3000001000
trusted library allocation
page read and write
1C39F273000
heap
page read and write
39FC002B8000
trusted library allocation
page read and write
25C018DA000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
77C5000
heap
page read and write
39FC008D8000
trusted library allocation
page read and write
25C012D0000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
60EC002DC000
trusted library allocation
page read and write
130800114000
trusted library allocation
page read and write
39FC0061C000
trusted library allocation
page read and write
14AF72E0000
trusted library allocation
page read and write
45A4002B0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C018F4000
trusted library allocation
page read and write
3FA00040000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
5E0000038000
trusted library allocation
page read and write
25C00352000
trusted library allocation
page read and write
17E5000
heap
page read and write
25C018B9000
trusted library allocation
page read and write
25C003B1000
trusted library allocation
page read and write
25C0140C000
trusted library allocation
page read and write
38C800280000
direct allocation
page read and write
25C0089C000
trusted library allocation
page read and write
1D6400201000
direct allocation
page read and write
1D3000160000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA0057D000
trusted library allocation
page read and write
78B0011B3000
trusted library allocation
page read and write
1D3000290000
trusted library allocation
page read and write
7304002D0000
direct allocation
page read and write
25C00A30000
trusted library allocation
page read and write
5B6800244000
direct allocation
page read and write
3FD8000
heap
page read and write
1D69F81C000
heap
page read and write
13080033A000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C00BA0000
trusted library allocation
page read and write
780F000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
1809000
heap
page read and write
3F24000
heap
page read and write
25C019A0000
trusted library allocation
page read and write
1487F400000
heap
page read and write
1BE5B809000
heap
page read and write
884C1FE000
stack
page read and write
25C01278000
trusted library allocation
page read and write
3FA00767000
trusted library allocation
page read and write
39FC00A60000
trusted library allocation
page read and write
182E000
heap
page read and write
26CF1B28000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
25C018B6000
trusted library allocation
page read and write
3A45FFE000
unkown
page readonly
180E000
heap
page read and write
738000220000
trusted library allocation
page read and write
4E0C001F0000
trusted library allocation
page read and write
1BE5B3BE000
remote allocation
page execute read
1BE5B809000
heap
page read and write
582000244000
trusted library allocation
page read and write
4E0C0061C000
trusted library allocation
page read and write
182A000
heap
page read and write
56834000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
25C01959000
trusted library allocation
page read and write
1D3000070000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
26C9CC09000
heap
page read and write
1BE5B825000
heap
page read and write
25C01314000
trusted library allocation
page read and write
367C0032C000
direct allocation
page read and write
39FC009A4000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
4E0C00EA4000
trusted library allocation
page read and write
FD117FE000
stack
page read and write
25C0199C000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
3C289FE000
stack
page read and write
70D0002C0000
trusted library allocation
page read and write
3F26000
heap
page read and write
25C019B0000
trusted library allocation
page read and write
FD6CDFE000
stack
page read and write
25C020BB000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
26CF3B02000
heap
page read and write
39FC007E8000
trusted library allocation
page read and write
70D000238000
trusted library allocation
page read and write
25C012BC000
trusted library allocation
page read and write
25C012EC000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
1BE5B3D0000
heap
page read and write
26CF1B45000
heap
page read and write
78B000254000
trusted library allocation
page read and write
884F9FE000
unkown
page readonly
25C020F8000
trusted library allocation
page read and write
2A4001AF000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
1BE5B811000
heap
page read and write
25C019A6000
trusted library allocation
page read and write
1786000
heap
page read and write
25C018F4000
trusted library allocation
page read and write
1D3000292000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
4E0C000AC000
trusted library allocation
page read and write
39FC00A48000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
4E0C00F78000
trusted library allocation
page read and write
4E0C00B14000
trusted library allocation
page read and write
88491FE000
stack
page read and write
25C0142C000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
3FA008ED000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
4C5000264000
direct allocation
page read and write
792D000
heap
page read and write
FD78DFB000
stack
page read and write
77C80032B000
trusted library allocation
page read and write
78B00109C000
trusted library allocation
page read and write
582000310000
trusted library allocation
page read and write
FD08FFE000
unkown
page readonly
25C012A4000
trusted library allocation
page read and write
25C00E0C000
trusted library allocation
page read and write
1487F4EF000
heap
page read and write
25C0061C000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
7D4400268000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
1DDC4543000
heap
page read and write
25C0141C000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
1BE5B80F000
heap
page read and write
7919000
heap
page read and write
25C018B9000
trusted library allocation
page read and write
26C83B93000
heap
page read and write
1C39C4F5000
heap
page read and write
7D4400278000
trusted library allocation
page read and write
25C01268000
trusted library allocation
page read and write
3F28000
heap
page read and write
1480506D000
unclassified section
page read and write
3FA00794000
trusted library allocation
page read and write
25C012AC000
trusted library allocation
page read and write
25C019AA000
trusted library allocation
page read and write
7D44002B8000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
72DB000
stack
page read and write
1B5B1DA4000
trusted library section
page readonly
78B000024000
trusted library allocation
page read and write
2EB400264000
direct allocation
page read and write
25C00884000
trusted library allocation
page read and write
357C002A8000
trusted library allocation
page read and write
1DDC4533000
heap
page read and write
17C3000
heap
page read and write
1B57EE42000
heap
page read and write
3FA00855000
trusted library allocation
page read and write
26CF1B30000
heap
page read and write
332FFFE000
unkown
page readonly
1E800254000
trusted library allocation
page read and write
39FC00888000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1BE5B824000
heap
page read and write
5820002CC000
trusted library allocation
page read and write
7D44001E0000
trusted library allocation
page read and write
367C00314000
direct allocation
page read and write
25C0191C000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1BE5B6E0000
heap
page readonly
1BE5B80F000
heap
page read and write
676000288000
trusted library allocation
page read and write
1B5AD600000
heap
page read and write
5B68002C0000
direct allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
26D607F0000
unclassified section
page read and write
26CF1B41000
heap
page read and write
4E0C002EC000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
4E0C00070000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
72A3BFB000
stack
page read and write
4E0C00258000
trusted library allocation
page read and write
25C008AB000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
7B18002C8000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C00A7F000
trusted library allocation
page read and write
25C00A15000
trusted library allocation
page read and write
26CF1B26000
heap
page read and write
FD765FE000
unkown
page readonly
7D44002D4000
trusted library allocation
page read and write
25C000270000
trusted library allocation
page read and write
37E000264000
trusted library allocation
page read and write
1C39F286000
heap
page read and write
25C02040000
trusted library allocation
page read and write
1D3000134000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
25C00E94000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
25C00BF4000
trusted library allocation
page read and write
49E400341000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
39FC008B0000
trusted library allocation
page read and write
25C00EFF000
trusted library allocation
page read and write
25C01369000
trusted library allocation
page read and write
78B001049000
trusted library allocation
page read and write
25C0128A000
trusted library allocation
page read and write
A17F5FE000
unkown
page readonly
25C00654000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
191400284000
trusted library allocation
page read and write
568A4000
trusted library allocation
page read and write
1829000
heap
page read and write
1BE5B824000
heap
page read and write
6F0C00264000
direct allocation
page read and write
25C016B4000
trusted library allocation
page read and write
1BEDF1B0000
unclassified section
page read and write
25C01314000
trusted library allocation
page read and write
25C018CE000
trusted library allocation
page read and write
25C0189E000
trusted library allocation
page read and write
1813000
heap
page read and write
1B57EF05000
heap
page read and write
1818000
heap
page read and write
7D44002C8000
trusted library allocation
page read and write
25C018EA000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
39FC00618000
trusted library allocation
page read and write
6F0C00234000
direct allocation
page read and write
4E0C00F98000
trusted library allocation
page read and write
78B000844000
trusted library allocation
page read and write
7D44002AD000
trusted library allocation
page read and write
45A4002C8000
trusted library allocation
page read and write
13080028E000
trusted library allocation
page read and write
33307FE000
stack
page read and write
25C019AC000
trusted library allocation
page read and write
25C01500000
trusted library allocation
page read and write
72FC00070000
trusted library allocation
page read and write
106C002CC000
trusted library allocation
page read and write
1BE5B3C0000
remote allocation
page read and write
25C013D4000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C00380000
trusted library allocation
page read and write
3F4E000
heap
page read and write
1DDC4548000
heap
page read and write
26CF1B41000
heap
page read and write
26C9CC23000
heap
page read and write
1809000
heap
page read and write
25C0089D000
trusted library allocation
page read and write
39FC0089C000
trusted library allocation
page read and write
134400581000
trusted library allocation
page read and write
25C003C8000
trusted library allocation
page read and write
39FC00824000
trusted library allocation
page read and write
72E0000
heap
page read and write
26C9C9F7000
unclassified section
page read and write
180E000
heap
page read and write
1DDC4541000
heap
page read and write
134400401000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
1DDC4549000
heap
page read and write
130800140000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B80F000
heap
page read and write
1BE5B825000
heap
page read and write
1BE5B809000
heap
page read and write
39FC0092C000
trusted library allocation
page read and write
25C014A0000
trusted library allocation
page read and write
3FA0056B000
trusted library allocation
page read and write
1C39C4C6000
heap
page read and write
1487F4FE000
heap
page read and write
3FA004E7000
trusted library allocation
page read and write
25C018B6000
trusted library allocation
page read and write
180B000
heap
page read and write
1D3000334000
trusted library allocation
page read and write
4E0C0107C000
trusted library allocation
page read and write
26C83B53000
heap
page read and write
568C8000
trusted library allocation
page read and write
3FA0093E000
trusted library allocation
page read and write
25C00878000
trusted library allocation
page read and write
25C018E2000
trusted library allocation
page read and write
730400201000
direct allocation
page read and write
2EB400294000
direct allocation
page read and write
26CF1B44000
heap
page read and write
25C00894000
trusted library allocation
page read and write
25C018D0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
3FA007AD000
trusted library allocation
page read and write
7D440028E000
trusted library allocation
page read and write
26C83B93000
heap
page read and write
25C009EC000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
2DA0000F0000
trusted library allocation
page read and write
5B6800230000
direct allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
4E0C00E24000
trusted library allocation
page read and write
39FC003E0000
trusted library allocation
page read and write
3FA00920000
trusted library allocation
page read and write
77EC000
heap
page read and write
39FC00684000
trusted library allocation
page read and write
25C01992000
trusted library allocation
page read and write
25C00B1C000
trusted library allocation
page read and write
1824000
heap
page read and write
49E400201000
trusted library allocation
page read and write
25C0183C000
trusted library allocation
page read and write
5B68002A0000
direct allocation
page read and write
26CF1B2E000
heap
page read and write
25C018E2000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
17F7000
heap
page read and write
4E0C00244000
trusted library allocation
page read and write
78CC000
heap
page read and write
1BE5B82B000
heap
page read and write
148026BC000
heap
page read and write
25C019B8000
trusted library allocation
page read and write
1DDC452F000
heap
page read and write
4E0C00EB4000
trusted library allocation
page read and write
25C01546000
trusted library allocation
page read and write
25C00A61000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
9B69FE000
unkown
page readonly
1BE5B811000
heap
page read and write
7D4400268000
trusted library allocation
page read and write
FD1D7FE000
stack
page read and write
3F7C000
heap
page read and write
3F6A000
heap
page read and write
1BE5B825000
heap
page read and write
582000211000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C013BC000
trusted library allocation
page read and write
3FA00929000
trusted library allocation
page read and write
148026AA000
heap
page read and write
14802694000
heap
page read and write
7D44000C4000
trusted library allocation
page read and write
582000355000
trusted library allocation
page read and write
25C018FD000
trusted library allocation
page read and write
4E0C0041C000
trusted library allocation
page read and write
26CF3A13000
heap
page read and write
37E00027C000
trusted library allocation
page read and write
7304002BC000
direct allocation
page read and write
1C39C456000
heap
page read and write
1BE5B825000
heap
page read and write
1D300034C000
trusted library allocation
page read and write
106C00288000
trusted library allocation
page read and write
3FA004F8000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
78B000B24000
trusted library allocation
page read and write
25C00BD3000
trusted library allocation
page read and write
3A467FD000
stack
page read and write
7D44002A4000
trusted library allocation
page read and write
40A40028C000
trusted library allocation
page read and write
3F43000
heap
page read and write
25C00B11000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
3FA00620000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
1BE5B809000
heap
page read and write
1D3000201000
trusted library allocation
page read and write
25C020C0000
trusted library allocation
page read and write
3F48000
heap
page read and write
25C013A6000
trusted library allocation
page read and write
7D4400250000
trusted library allocation
page read and write
17E8000
heap
page read and write
3FA005C2000
trusted library allocation
page read and write
88511F9000
stack
page read and write
40A400230000
trusted library allocation
page read and write
39FC0088C000
trusted library allocation
page read and write
1DDC4530000
heap
page read and write
3F87000
heap
page read and write
25C018C0000
trusted library allocation
page read and write
1DDC4529000
heap
page read and write
25C013AC000
trusted library allocation
page read and write
4E0C00B8C000
trusted library allocation
page read and write
3334FFE000
unkown
page readonly
1BE5B827000
heap
page read and write
1BE5B824000
heap
page read and write
1BE5B82B000
heap
page read and write
78B000C18000
trusted library allocation
page read and write
134400121000
trusted library allocation
page read and write
7311000
heap
page read and write
4E0C0020C000
trusted library allocation
page read and write
4E0C006D0000
trusted library allocation
page read and write
1C39C3B0000
heap
page read and write
568B8000
trusted library allocation
page read and write
130800114000
trusted library allocation
page read and write
25C00638000
trusted library allocation
page read and write
4E0C010AC000
trusted library allocation
page read and write
7D440029F000
trusted library allocation
page read and write
25C0194E000
trusted library allocation
page read and write
17F7000
heap
page read and write
7B1800254000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
1B6400248000
direct allocation
page read and write
1DDC452F000
heap
page read and write
1D30001C5000
trusted library allocation
page read and write
67600032B000
trusted library allocation
page read and write
1D64002AC000
direct allocation
page read and write
25C0195E000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1DDC4541000
heap
page read and write
25C0199E000
trusted library allocation
page read and write
25C019D2000
trusted library allocation
page read and write
1D3000130000
trusted library allocation
page read and write
5E00000E9000
trusted library allocation
page read and write
39FC00801000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
39FC00824000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
77C80020C000
trusted library allocation
page read and write
4E0C00C8C000
trusted library allocation
page read and write
367C002D0000
direct allocation
page read and write
1D300038C000
trusted library allocation
page read and write
25C013A4000
trusted library allocation
page read and write
7D4400184000
trusted library allocation
page read and write
25C0190A000
trusted library allocation
page read and write
17BE000
heap
page read and write
25C0031C000
trusted library allocation
page read and write
55400244000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C01959000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
3FA00900000
trusted library allocation
page read and write
3FA00580000
trusted library allocation
page read and write
7380002D4000
trusted library allocation
page read and write
1B64002B0000
direct allocation
page read and write
25C00F20000
trusted library allocation
page read and write
1802000
heap
page read and write
1BE5B825000
heap
page read and write
88559FE000
unkown
page readonly
39FC00211000
trusted library allocation
page read and write
17C2000
heap
page read and write
1BEDF1F0000
unclassified section
page read and write
357C00280000
trusted library allocation
page read and write
180B000
heap
page read and write
25C00F10000
trusted library allocation
page read and write
3EEB000
heap
page read and write
26C9FE30000
unclassified section
page read and write
25C00238000
trusted library allocation
page read and write
7D44002B1000
trusted library allocation
page read and write
4E0C007C0000
trusted library allocation
page read and write
17E7000
heap
page read and write
1D3000291000
trusted library allocation
page read and write
1799000
heap
page read and write
25C00954000
trusted library allocation
page read and write
25C008AF000
trusted library allocation
page read and write
70D000270000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C01986000
trusted library allocation
page read and write
662D000
stack
page read and write
25C0197E000
trusted library allocation
page read and write
17C5000
heap
page read and write
2EE400348000
trusted library allocation
page read and write
25C012CC000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
4E0C00B5C000
trusted library allocation
page read and write
70D000201000
trusted library allocation
page read and write
3FA004C2000
trusted library allocation
page read and write
60EC002A0000
trusted library allocation
page read and write
1F8E7FE000
unkown
page readonly
1F917FE000
unkown
page readonly
130800128000
trusted library allocation
page read and write
17E7000
heap
page read and write
40A4002B0000
trusted library allocation
page read and write
3FC5000
heap
page read and write
13080034C000
trusted library allocation
page read and write
4E0C00B44000
trusted library allocation
page read and write
25C0088C000
trusted library allocation
page read and write
25C02148000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
4E0C00430000
trusted library allocation
page read and write
3FD6000
heap
page read and write
25C003B4000
trusted library allocation
page read and write
7D440028C000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
3FA0087C000
trusted library allocation
page read and write
25C012BC000
trusted library allocation
page read and write
1BE5B80B000
heap
page read and write
26CF3B02000
heap
page read and write
782C000
heap
page read and write
25C020C6000
trusted library allocation
page read and write
4E0C003C0000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
70D000280000
trusted library allocation
page read and write
25C018D4000
trusted library allocation
page read and write
7804000
heap
page read and write
78B000034000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
2EE400370000
trusted library allocation
page read and write
1DDC4529000
heap
page read and write
7345000
heap
page read and write
7D4400090000
trusted library allocation
page read and write
25C0182C000
trusted library allocation
page read and write
25C02070000
trusted library allocation
page read and write
3FA4000
heap
page read and write
4E0C00B83000
trusted library allocation
page read and write
4E0C0032C000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
3324002DC000
trusted library allocation
page read and write
26CF1B40000
heap
page read and write
25C01944000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
4E0C00B04000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
4250002D4000
direct allocation
page read and write
25C00F00000
trusted library allocation
page read and write
7D44000C1000
trusted library allocation
page read and write
1DDC9ABE000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
7D4400184000
trusted library allocation
page read and write
3F34000
heap
page read and write
1D64002B0000
direct allocation
page read and write
77D2000
heap
page read and write
26CF1B35000
heap
page read and write
106000284000
direct allocation
page read and write
45A400238000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
357C002B8000
trusted library allocation
page read and write
25C00AB0000
trusted library allocation
page read and write
46A000418000
trusted library allocation
page read and write
60EC002A0000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
1D3000401000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
39FC00888000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
2EB400211000
direct allocation
page read and write
26CF1B41000
heap
page read and write
5E00001D8000
trusted library allocation
page read and write
26CF1B54000
heap
page read and write
77C800264000
trusted library allocation
page read and write
1487F46E000
heap
page read and write
1308001A0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C00730000
trusted library allocation
page read and write
3FA00564000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
1308000A8000
trusted library allocation
page read and write
7FFF7A304000
trusted library allocation
page execute and read and write
676000334000
trusted library allocation
page read and write
25C0196C000
trusted library allocation
page read and write
1BEDF85C000
unclassified section
page read and write
25C012E2000
trusted library allocation
page read and write
7D440028C000
trusted library allocation
page read and write
1C39F2C7000
heap
page read and write
1D300021C000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
FD75DFD000
stack
page read and write
7B180020C000
trusted library allocation
page read and write
5B6800274000
direct allocation
page read and write
1D3000351000
trusted library allocation
page read and write
1B64002B4000
direct allocation
page read and write
4E0C0067D000
trusted library allocation
page read and write
4E0C00C79000
trusted library allocation
page read and write
39FC00824000
trusted library allocation
page read and write
78B000DB4000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
19799060000
remote allocation
page read and write
25C01950000
trusted library allocation
page read and write
25C0195B000
trusted library allocation
page read and write
46A0002BC000
trusted library allocation
page read and write
37E0002C8000
trusted library allocation
page read and write
4E0C0034B000
trusted library allocation
page read and write
77CF000
heap
page read and write
130800178000
trusted library allocation
page read and write
77C80028C000
trusted library allocation
page read and write
25C018A0000
trusted library allocation
page read and write
1D69FC02000
heap
page read and write
1BE5B824000
heap
page read and write
25C01204000
trusted library allocation
page read and write
5E0000254000
trusted library allocation
page read and write
1DDC4529000
heap
page read and write
4E0C003AC000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
4E0C0055A000
trusted library allocation
page read and write
25C0141E000
trusted library allocation
page read and write
1D3000281000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
77C800300000
trusted library allocation
page read and write
77EB000
heap
page read and write
7D4400254000
trusted library allocation
page read and write
1BFB000
unkown
page read and write
14802677000
heap
page read and write
2DA000060000
trusted library allocation
page read and write
78C1000
heap
page read and write
25C0123C000
trusted library allocation
page read and write
26CF1B30000
heap
page read and write
25C02058000
trusted library allocation
page read and write
25C01952000
trusted library allocation
page read and write
1DDC452E000
heap
page read and write
568C0000
trusted library allocation
page read and write
1DDC452F000
heap
page read and write
3FA00841000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
6760002F4000
trusted library allocation
page read and write
5E0000024000
trusted library allocation
page read and write
25C01428000
trusted library allocation
page read and write
3FA00856000
trusted library allocation
page read and write
26C83B2D000
heap
page read and write
45A400258000
trusted library allocation
page read and write
3FA0077A000
trusted library allocation
page read and write
1B5AD400000
heap
page read and write
25C00972000
trusted library allocation
page read and write
3A48FFE000
unkown
page readonly
26C83BD8000
heap
page read and write
554002E4000
trusted library allocation
page read and write
676000274000
trusted library allocation
page read and write
25C0087A000
trusted library allocation
page read and write
3FA00180000
trusted library allocation
page read and write
1060002C0000
direct allocation
page read and write
25C018F2000
trusted library allocation
page read and write
3FBF000
heap
page read and write
730400212000
direct allocation
page read and write
25C00A66000
trusted library allocation
page read and write
3F1F000
heap
page read and write
3F1F000
heap
page read and write
77C8002B4000
trusted library allocation
page read and write
1E800274000
trusted library allocation
page read and write
26C9CA2A000
heap
page read and write
134400201000
trusted library allocation
page read and write
1DDC4546000
heap
page read and write
19799402000
heap
page read and write
1BE5B858000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
7847000
heap
page read and write
25C003A3000
trusted library allocation
page read and write
17E7000
heap
page read and write
25C01998000
trusted library allocation
page read and write
7833000
heap
page read and write
78B000228000
trusted library allocation
page read and write
7B180040C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
1730000
heap
page read and write
7B18002F0000
trusted library allocation
page read and write
FD1CFFE000
unkown
page readonly
3F54000
heap
page read and write
25C01314000
trusted library allocation
page read and write
26C83BDD000
heap
page read and write
1D3000075000
trusted library allocation
page read and write
1B5AD62B000
heap
page read and write
1D30001D8000
trusted library allocation
page read and write
25C0190E000
trusted library allocation
page read and write
3F36000
heap
page read and write
78B0005D8000
trusted library allocation
page read and write
3324002F0000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
1BEDFB25000
unclassified section
page read and write
7B1800278000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
3FA00854000
trusted library allocation
page read and write
3FA00793000
trusted library allocation
page read and write
3324002B8000
trusted library allocation
page read and write
39FC003EC000
trusted library allocation
page read and write
26C83B93000
heap
page read and write
730400354000
direct allocation
page read and write
1BE5B809000
heap
page read and write
1DDC4541000
heap
page read and write
180E000
heap
page read and write
25C00BEC000
trusted library allocation
page read and write
25C02033000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
134400141000
trusted library allocation
page read and write
3F75000
heap
page read and write
25C008A7000
trusted library allocation
page read and write
1060002AC000
direct allocation
page read and write
42500023C000
direct allocation
page read and write
25C01314000
trusted library allocation
page read and write
730400284000
direct allocation
page read and write
25C00694000
trusted library allocation
page read and write
39FC00A5A000
trusted library allocation
page read and write
39FC00B10000
trusted library allocation
page read and write
25C020D6000
trusted library allocation
page read and write
72A4BFB000
stack
page read and write
25C003D4000
trusted library allocation
page read and write
67600033F000
trusted library allocation
page read and write
3FA00555000
trusted library allocation
page read and write
3FA007A6000
trusted library allocation
page read and write
3FA008E5000
trusted library allocation
page read and write
FD7B5FE000
unkown
page readonly
25C01994000
trusted library allocation
page read and write
39FC002C8000
trusted library allocation
page read and write
17E7000
heap
page read and write
1BEDEFB0000
unclassified section
page read and write
1745000
heap
page read and write
78B000B8C000
trusted library allocation
page read and write
70D0002B4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C01990000
trusted library allocation
page read and write
77FA000
heap
page read and write
180B000
heap
page read and write
25C013A6000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
4E0C00A01000
trusted library allocation
page read and write
676000230000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
17E7000
heap
page read and write
1BE5B824000
heap
page read and write
1BE5B80A000
heap
page read and write
3F83000
heap
page read and write
A1017FE000
unkown
page readonly
4E0C002DC000
trusted library allocation
page read and write
25C018CE000
trusted library allocation
page read and write
2A400040000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
1480265E000
heap
page read and write
60B0000
heap
page read and write
730400307000
direct allocation
page read and write
25C008A8000
trusted library allocation
page read and write
78B0011A0000
trusted library allocation
page read and write
6190002C4000
direct allocation
page read and write
730400298000
direct allocation
page read and write
4E0C000E8000
trusted library allocation
page read and write
3F67000
heap
page read and write
1D30001C0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C01998000
trusted library allocation
page read and write
25C00614000
trusted library allocation
page read and write
1DDC4540000
heap
page read and write
55400278000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
3FA0087F000
trusted library allocation
page read and write
7D44002C8000
trusted library allocation
page read and write
39FC00404000
trusted library allocation
page read and write
40D4000
trusted library allocation
page read and write
25C00724000
trusted library allocation
page read and write
25C018FF000
trusted library allocation
page read and write
25C008DC000
trusted library allocation
page read and write
25C013D4000
trusted library allocation
page read and write
3FA0063D000
trusted library allocation
page read and write
88571FE000
stack
page read and write
25C00684000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
7FFF7A315000
trusted library allocation
page execute and read and write
78B000F1C000
trusted library allocation
page read and write
357C002B8000
trusted library allocation
page read and write
3C291FE000
unkown
page readonly
25C0143C000
trusted library allocation
page read and write
1C39C438000
heap
page read and write
26CF1B46000
heap
page read and write
2EB400234000
direct allocation
page read and write
25C0210D000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1DDC4546000
heap
page read and write
1BE5B82B000
heap
page read and write
25C018CE000
trusted library allocation
page read and write
333DFFE000
unkown
page readonly
3F68000
heap
page read and write
26C9CC61000
heap
page read and write
582000404000
trusted library allocation
page read and write
25C00634000
trusted library allocation
page read and write
712C002A0000
trusted library allocation
page read and write
25C00674000
trusted library allocation
page read and write
134400501000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
FD1A7FC000
stack
page read and write
3FA005B3000
trusted library allocation
page read and write
26CF1A60000
heap
page read and write
25C01994000
trusted library allocation
page read and write
78B000258000
trusted library allocation
page read and write
357C002C8000
trusted library allocation
page read and write
72FC00104000
trusted library allocation
page read and write
17BE000
heap
page read and write
582000288000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
5E0000278000
trusted library allocation
page read and write
3324002A4000
trusted library allocation
page read and write
25C01250000
trusted library allocation
page read and write
67600029C000
trusted library allocation
page read and write
26D60830000
unclassified section
page read and write
357C002C4000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
1829000
heap
page read and write
25C0078C000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
25C01399000
trusted library allocation
page read and write
3FA0090C000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
2DA000044000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
39FC00818000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
38C800264000
direct allocation
page read and write
25C00BC0000
trusted library allocation
page read and write
7D44002C4000
trusted library allocation
page read and write
3FA004C4000
trusted library allocation
page read and write
4C500023C000
direct allocation
page read and write
3FA00542000
trusted library allocation
page read and write
39FC006E4000
trusted library allocation
page read and write
4E0C00247000
trusted library allocation
page read and write
4E0C00401000
trusted library allocation
page read and write
25C00878000
trusted library allocation
page read and write
1DDC9B02000
heap
page read and write
1BE5B826000
heap
page read and write
25C01428000
trusted library allocation
page read and write
1B6400280000
direct allocation
page read and write
25C00828000
trusted library allocation
page read and write
78B000E0C000
trusted library allocation
page read and write
78B0009B8000
trusted library allocation
page read and write
77C8002E8000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
4E0C006C4000
trusted library allocation
page read and write
4E0C00AAA000
trusted library allocation
page read and write
3F66000
heap
page read and write
26D60630000
unclassified section
page read and write
42DE000
heap
page read and write
25C00A24000
trusted library allocation
page read and write
25C02108000
trusted library allocation
page read and write
25C0074C000
trusted library allocation
page read and write
676000418000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
4E0C00CB9000
trusted library allocation
page read and write
25C018AE000
trusted library allocation
page read and write
25C0205B000
trusted library allocation
page read and write
1308001D4000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
7B1800310000
trusted library allocation
page read and write
3A41FFE000
unkown
page readonly
25C016AC000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
1D300037C000
trusted library allocation
page read and write
3FA00982000
trusted library allocation
page read and write
1DDC4548000
heap
page read and write
39FC002C8000
trusted library allocation
page read and write
4E0C007D8000
trusted library allocation
page read and write
17E7000
heap
page read and write
17AB000
heap
page read and write
25C0123C000
trusted library allocation
page read and write
5E000006C000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
180B000
heap
page read and write
25C01964000
trusted library allocation
page read and write
25C00824000
trusted library allocation
page read and write
676000238000
trusted library allocation
page read and write
180E000
heap
page read and write
45A4002B0000
trusted library allocation
page read and write
7815000
heap
page read and write
70D000250000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
26CF1B44000
heap
page read and write
25C0194C000
trusted library allocation
page read and write
1D300022C000
trusted library allocation
page read and write
3EE0000
heap
page read and write
25C018B4000
trusted library allocation
page read and write
25C018FA000
trusted library allocation
page read and write
1DDC9C02000
heap
page read and write
25C019A0000
trusted library allocation
page read and write
78B000F88000
trusted library allocation
page read and write
25C0087B000
trusted library allocation
page read and write
4E0C00CC8000
trusted library allocation
page read and write
7B1800274000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
25C01270000
trusted library allocation
page read and write
25C01938000
trusted library allocation
page read and write
77C8002C8000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
37E000220000
trusted library allocation
page read and write
1766000
heap
page read and write
1D300027C000
trusted library allocation
page read and write
17D5000
heap
page read and write
25C0123C000
trusted library allocation
page read and write
1DDC454D000
heap
page read and write
39FC008A0000
trusted library allocation
page read and write
38C800294000
direct allocation
page read and write
357C00248000
trusted library allocation
page read and write
25C019A6000
trusted library allocation
page read and write
130800338000
trusted library allocation
page read and write
1C39C499000
heap
page read and write
1C39C4BD000
heap
page read and write
26CF1B45000
heap
page read and write
FD6CDF2000
stack
page read and write
37E00026C000
trusted library allocation
page read and write
78E8000
heap
page read and write
554002A4000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
55400248000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
25C00BB0000
trusted library allocation
page read and write
3FA0057E000
trusted library allocation
page read and write
3FA00562000
trusted library allocation
page read and write
60EC00274000
trusted library allocation
page read and write
6F0C00294000
direct allocation
page read and write
45A4002C4000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
39FC00770000
trusted library allocation
page read and write
3F5D000
heap
page read and write
25C019AC000
trusted library allocation
page read and write
25C0198A000
trusted library allocation
page read and write
7D4400201000
trusted library allocation
page read and write
26C9CA41000
heap
page read and write
39FC00980000
trusted library allocation
page read and write
730400288000
direct allocation
page read and write
1655000
heap
page read and write
182C000
heap
page read and write
25C019AE000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
730400294000
direct allocation
page read and write
3FA004D4000
trusted library allocation
page read and write
1DDC4555000
heap
page read and write
39FC002C8000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
1BE5B82B000
heap
page read and write
148026BE000
heap
page read and write
25C003D4000
trusted library allocation
page read and write
39FC006D4000
trusted library allocation
page read and write
39FC0088C000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
7804000
heap
page read and write
25C00A18000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
4C5000288000
direct allocation
page read and write
26D605B0000
unclassified section
page read and write
3F6E000
heap
page read and write
72A93FC000
stack
page read and write
130800001000
trusted library allocation
page read and write
7B18002A8000
trusted library allocation
page read and write
3FA0094B000
trusted library allocation
page read and write
4E0C00F6C000
trusted library allocation
page read and write
2A400182000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
3C2B9FE000
stack
page read and write
333FFFE000
unkown
page readonly
25C019A0000
trusted library allocation
page read and write
40A4002A4000
trusted library allocation
page read and write
14AF7002000
heap
page read and write
25C008AF000
trusted library allocation
page read and write
3FA00756000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
77C800258000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C003D4000
trusted library allocation
page read and write
1D30003EC000
trusted library allocation
page read and write
130800128000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
130800024000
trusted library allocation
page read and write
106C002F0000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
26C9C9E0000
unclassified section
page read and write
45A4002D8000
trusted library allocation
page read and write
3FA00951000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
17AB000
heap
page read and write
197991C9000
unclassified section
page read and write
39FC00AB0000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
26C9FDB0000
unclassified section
page read and write
25C0195E000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
730400306000
direct allocation
page read and write
1DDC4546000
heap
page read and write
7D4400278000
trusted library allocation
page read and write
38C800278000
direct allocation
page read and write
4E0C00E01000
trusted library allocation
page read and write
1D30003F0000
trusted library allocation
page read and write
1D69FC05000
heap
page read and write
25C00418000
trusted library allocation
page read and write
1487F413000
heap
page read and write
60EC002D0000
trusted library allocation
page read and write
55400274000
trusted library allocation
page read and write
39FC00662000
trusted library allocation
page read and write
4E0C00AB4000
trusted library allocation
page read and write
9B61FE000
stack
page read and write
25C00878000
trusted library allocation
page read and write
1D300000C000
trusted library allocation
page read and write
FD7C5FE000
unkown
page readonly
72F1000
heap
page read and write
367C00304000
direct allocation
page read and write
7B18002D4000
trusted library allocation
page read and write
78B000258000
trusted library allocation
page read and write
A17FDFE000
stack
page read and write
17BE000
heap
page read and write
26CF1B2F000
heap
page read and write
3FB6000
heap
page read and write
1BE5B80B000
heap
page read and write
25C01998000
trusted library allocation
page read and write
4E0C00CDC000
trusted library allocation
page read and write
72FC000E0000
trusted library allocation
page read and write
FD05FFE000
unkown
page readonly
3FA00743000
trusted library allocation
page read and write
72A43FD000
stack
page read and write
25C0144C000
trusted library allocation
page read and write
3FA00515000
trusted library allocation
page read and write
25C013DC000
trusted library allocation
page read and write
39FC00944000
trusted library allocation
page read and write
1B57EE60000
heap
page read and write
25C0002C8000
trusted library allocation
page read and write
5E0000244000
trusted library allocation
page read and write
25C018C9000
trusted library allocation
page read and write
712C002B8000
trusted library allocation
page read and write
25C019AB000
trusted library allocation
page read and write
3FA008EE000
trusted library allocation
page read and write
619000220000
direct allocation
page read and write
7D4400184000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
1829000
heap
page read and write
3FA0038A000
trusted library allocation
page read and write
39FC009CC000
trusted library allocation
page read and write
77CB000
heap
page read and write
1BE5B811000
heap
page read and write
39FC0040C000
trusted library allocation
page read and write
38C800238000
direct allocation
page read and write
25C0194E000
trusted library allocation
page read and write
1C39F291000
heap
page read and write
FD097FE000
stack
page read and write
1D3000120000
trusted library allocation
page read and write
3FC2000
heap
page read and write
1BE5B80A000
heap
page read and write
25C0197E000
trusted library allocation
page read and write
25C00B98000
trusted library allocation
page read and write
25C012DC000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
13080009C000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
733A000
heap
page read and write
25C01880000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
25C000288000
trusted library allocation
page read and write
1BEDFAC8000
unclassified section
page read and write
25C00BC8000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
1D30000D0000
trusted library allocation
page read and write
25C018DF000
trusted library allocation
page read and write
4E0C00059000
trusted library allocation
page read and write
FD1F7FF000
stack
page read and write
25C00B16000
trusted library allocation
page read and write
1D3000336000
trusted library allocation
page read and write
39FC00884000
trusted library allocation
page read and write
45A4002B0000
trusted library allocation
page read and write
1D3000114000
trusted library allocation
page read and write
1778000
heap
page read and write
39FC0061C000
trusted library allocation
page read and write
4E0C001D8000
trusted library allocation
page read and write
1B64002B4000
direct allocation
page read and write
1BE5B811000
heap
page read and write
55400254000
trusted library allocation
page read and write
39FC008A0000
trusted library allocation
page read and write
4E0C00340000
trusted library allocation
page read and write
1DDC454F000
heap
page read and write
1BE5B80A000
heap
page read and write
25C00B98000
trusted library allocation
page read and write
25C01BF2000
trusted library allocation
page read and write
25C01938000
trusted library allocation
page read and write
1D3000281000
trusted library allocation
page read and write
1DDC4527000
heap
page read and write
78B000C94000
trusted library allocation
page read and write
25C0198A000
trusted library allocation
page read and write
4E0C00A2D000
trusted library allocation
page read and write
3FC8000
heap
page read and write
72A83FE000
stack
page read and write
1DDC4529000
heap
page read and write
25C01E01000
trusted library allocation
page read and write
4E0C00F14000
trusted library allocation
page read and write
25C0136B000
trusted library allocation
page read and write
3FA001C0000
trusted library allocation
page read and write
25C012D4000
trusted library allocation
page read and write
3FA00636000
trusted library allocation
page read and write
3FA005FE000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
13080010C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B811000
heap
page read and write
77C1000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
3FA008D9000
trusted library allocation
page read and write
72FC0010C000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
38C800234000
direct allocation
page read and write
357C002C4000
trusted library allocation
page read and write
4E0C01024000
trusted library allocation
page read and write
738000254000
trusted library allocation
page read and write
3FA00082000
trusted library allocation
page read and write
1BE5B42A000
heap
page read and write
3FA00840000
trusted library allocation
page read and write
25C01910000
trusted library allocation
page read and write
425000250000
direct allocation
page read and write
3333FFE000
unkown
page readonly
1DDC4541000
heap
page read and write
25C01785000
trusted library allocation
page read and write
25C019BC000
trusted library allocation
page read and write
3FA00871000
trusted library allocation
page read and write
3FA00482000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
25C019A2000
trusted library allocation
page read and write
25C00834000
trusted library allocation
page read and write
25C01968000
trusted library allocation
page read and write
46A00031C000
trusted library allocation
page read and write
3F80000
heap
page read and write
25C019B8000
trusted library allocation
page read and write
7B1800230000
trusted library allocation
page read and write
3F9E000
heap
page read and write
7D44002AA000
trusted library allocation
page read and write
25C02040000
trusted library allocation
page read and write
78B000B5C000
trusted library allocation
page read and write
25C00A38000
trusted library allocation
page read and write
26C83BD6000
heap
page read and write
1BE5B809000
heap
page read and write
1D300017C000
trusted library allocation
page read and write
25C0175C000
trusted library allocation
page read and write
3FA0093F000
trusted library allocation
page read and write
425000244000
direct allocation
page read and write
82F23E3000
stack
page read and write
3FA00623000
trusted library allocation
page read and write
3FA0063E000
trusted library allocation
page read and write
25C00B2A000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
3FD1000
heap
page read and write
1DDC4527000
heap
page read and write
49E400142000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
672E000
stack
page read and write
39FC00730000
trusted library allocation
page read and write
3FA00972000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
14802697000
heap
page read and write
3FA00282000
trusted library allocation
page read and write
1DDC4528000
heap
page read and write
25C01318000
trusted library allocation
page read and write
1D3000411000
trusted library allocation
page read and write
FD207FE000
stack
page read and write
1E80027C000
trusted library allocation
page read and write
25C01258000
trusted library allocation
page read and write
26C9C833000
unclassified section
page read and write
14CD000
unkown
page execute and read and write
730400364000
direct allocation
page read and write
182E000
heap
page read and write
72FC0001C000
trusted library allocation
page read and write
25C01912000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
1D69F800000
heap
page read and write
3F0C000
heap
page read and write
3F1F000
heap
page read and write
14AF7013000
heap
page read and write
25C01998000
trusted library allocation
page read and write
78B0003F8000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
3FA0058F000
trusted library allocation
page read and write
77E8000
heap
page read and write
1D300009C000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
7B1800201000
trusted library allocation
page read and write
3F0C000
heap
page read and write
1D300027C000
trusted library allocation
page read and write
37E0002EC000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
1B57EE00000
heap
page read and write
78B000D54000
trusted library allocation
page read and write
25C012E4000
trusted library allocation
page read and write
148025A7000
unclassified section
page read and write
1AE0000
heap
page read and write
25C0188C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
3F02000
heap
page read and write
6F0C00250000
direct allocation
page read and write
26CF1B55000
heap
page read and write
3FA0091A000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
78B000DB0000
trusted library allocation
page read and write
26C83B21000
heap
page read and write
13080000C000
trusted library allocation
page read and write
25C01886000
trusted library allocation
page read and write
787C00274000
trusted library allocation
page read and write
3FB6000
heap
page read and write
25C020AF000
trusted library allocation
page read and write
25C01942000
trusted library allocation
page read and write
3336FFE000
unkown
page readonly
17F0000
heap
page read and write
25C00BA8000
trusted library allocation
page read and write
3FA0090D000
trusted library allocation
page read and write
3F6E000
heap
page read and write
25C0141C000
trusted library allocation
page read and write
77C8002D4000
trusted library allocation
page read and write
78B000B6C000
trusted library allocation
page read and write
78E7000
heap
page read and write
25C01959000
trusted library allocation
page read and write
1D3000180000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
17F8000
heap
page read and write
25C009A8000
trusted library allocation
page read and write
7806000
heap
page read and write
4E0C00D61000
trusted library allocation
page read and write
148026B5000
heap
page read and write
25C00614000
trusted library allocation
page read and write
14802590000
unclassified section
page read and write
25C01314000
trusted library allocation
page read and write
7905000
heap
page read and write
1D6400254000
direct allocation
page read and write
78B000FB4000
trusted library allocation
page read and write
106000234000
direct allocation
page read and write
3F65000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
3FDC000
heap
page read and write
1C39C813000
heap
page read and write
884E1FE000
stack
page read and write
26CF1B27000
heap
page read and write
39FC00794000
trusted library allocation
page read and write
25C018B2000
trusted library allocation
page read and write
78B000B73000
trusted library allocation
page read and write
26D6011C000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
3C2D1FE000
unkown
page readonly
B41000
unkown
page execute and read and write
3FA005E7000
trusted library allocation
page read and write
3FA0098D000
trusted library allocation
page read and write
738000258000
trusted library allocation
page read and write
4E0C0000C000
trusted library allocation
page read and write
3FA00402000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
25C014A8000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
180C000
heap
page read and write
3FA00402000
trusted library allocation
page read and write
4E0C00A24000
trusted library allocation
page read and write
25C013A4000
trusted library allocation
page read and write
25C00EFF000
trusted library allocation
page read and write
25C0191A000
trusted library allocation
page read and write
39FC00694000
trusted library allocation
page read and write
1D3000334000
trusted library allocation
page read and write
6190002B0000
direct allocation
page read and write
25C0195E000
trusted library allocation
page read and write
45A4002C4000
trusted library allocation
page read and write
26CF1B32000
heap
page read and write
25C00888000
trusted library allocation
page read and write
3FA00598000
trusted library allocation
page read and write
25C0175C000
trusted library allocation
page read and write
3FA00938000
trusted library allocation
page read and write
26CF1D10000
heap
page read and write
4E0C000A9000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C0088C000
trusted library allocation
page read and write
738000244000
trusted library allocation
page read and write
25C018DD000
trusted library allocation
page read and write
25C01401000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
1D30000A8000
trusted library allocation
page read and write
39FC0091C000
trusted library allocation
page read and write
25C020AC000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
39FC002D8000
trusted library allocation
page read and write
7D4400038000
trusted library allocation
page read and write
7311000
heap
page read and write
25C00888000
trusted library allocation
page read and write
39FC00284000
trusted library allocation
page read and write
1487F813000
heap
page read and write
25C000328000
trusted library allocation
page read and write
7D440028E000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
25C0199E000
trusted library allocation
page read and write
25C0195B000
trusted library allocation
page read and write
569B0000
trusted library allocation
page read and write
77CB000
heap
page read and write
7B18002B4000
trusted library allocation
page read and write
7D4400178000
trusted library allocation
page read and write
3C2F9FE000
stack
page read and write
7D44002A2000
trusted library allocation
page read and write
130800124000
trusted library allocation
page read and write
4E0C00D9C000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
182E000
heap
page read and write
77C8000
heap
page read and write
4E0C00FEC000
trusted library allocation
page read and write
70D000284000
trusted library allocation
page read and write
3FA007AF000
trusted library allocation
page read and write
25C00724000
trusted library allocation
page read and write
1B5B1DA0000
trusted library section
page readonly
3FA005E8000
trusted library allocation
page read and write
25C01314000
trusted library allocation
page read and write
4C5000244000
direct allocation
page read and write
26CF1B4F000
heap
page read and write
25C01944000
trusted library allocation
page read and write
26C9CC57000
heap
page read and write
25C01954000
trusted library allocation
page read and write
180E000
heap
page read and write
25C0195B000
trusted library allocation
page read and write
25C00EC4000
trusted library allocation
page read and write
6F0C002B4000
direct allocation
page read and write
1DDC4528000
heap
page read and write
25C018E2000
trusted library allocation
page read and write
3F11000
heap
page read and write
4E0C00AD8000
trusted library allocation
page read and write
37E000238000
trusted library allocation
page read and write
14802699000
heap
page read and write
4E0C00E64000
trusted library allocation
page read and write
3FA00630000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B824000
heap
page read and write
1BE5B825000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
367C00309000
direct allocation
page read and write
17E7000
heap
page read and write
712C00274000
trusted library allocation
page read and write
3FA008AE000
trusted library allocation
page read and write
134400381000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA00755000
trusted library allocation
page read and write
25C01456000
trusted library allocation
page read and write
3F88000
heap
page read and write
1BE5B82B000
heap
page read and write
3FA005A2000
trusted library allocation
page read and write
39FC003D4000
trusted library allocation
page read and write
1D30003B4000
trusted library allocation
page read and write
4E0C0108C000
trusted library allocation
page read and write
39FC009EC000
trusted library allocation
page read and write
180E000
heap
page read and write
3FA00000000
trusted library allocation
page readonly
A17BDFB000
stack
page read and write
17E7000
heap
page read and write
25C01258000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
2EE400408000
trusted library allocation
page read and write
39FC00832000
trusted library allocation
page read and write
7D4400248000
trusted library allocation
page read and write
26C83BDA000
heap
page read and write
25C01904000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
FD03FFE000
unkown
page readonly
25C018F2000
trusted library allocation
page read and write
4C50002BC000
direct allocation
page read and write
25C0002C0000
trusted library allocation
page read and write
1B5AD65D000
heap
page read and write
106000290000
direct allocation
page read and write
4E0C00F84000
trusted library allocation
page read and write
26CF1A13000
heap
page read and write
25C01994000
trusted library allocation
page read and write
787C00264000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
77C800408000
trusted library allocation
page read and write
70D000260000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1E800220000
trusted library allocation
page read and write
46A0002E4000
trusted library allocation
page read and write
25C0144C000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
70D000244000
trusted library allocation
page read and write
26D60570000
unclassified section
page read and write
1BE5B82B000
heap
page read and write
FD0CFFE000
unkown
page readonly
25C0094C000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C01450000
trusted library allocation
page read and write
39FC00A50000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
56890000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C00B4A000
trusted library allocation
page read and write
3FA00782000
trusted library allocation
page read and write
25C0144C000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
130800130000
trusted library allocation
page read and write
4E0C00B24000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
72FC00084000
trusted library allocation
page read and write
25C006AC000
trusted library allocation
page read and write
1DDC9A87000
heap
page read and write
1C39C902000
heap
page read and write
1BE5B3F0000
unclassified section
page readonly
39FC00BA3000
trusted library allocation
page read and write
25C01952000
trusted library allocation
page read and write
25C008AD000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
1DDC4544000
heap
page read and write
25C01996000
trusted library allocation
page read and write
39FC00B9C000
trusted library allocation
page read and write
1D30000F4000
trusted library allocation
page read and write
25C00B54000
trusted library allocation
page read and write
39FC009DC000
trusted library allocation
page read and write
4E0C00E4C000
trusted library allocation
page read and write
7B1800408000
trusted library allocation
page read and write
39FC00878000
trusted library allocation
page read and write
45A400268000
trusted library allocation
page read and write
3F2E000
heap
page read and write
1914002B4000
trusted library allocation
page read and write
82F83FE000
stack
page read and write
3FA0062F000
trusted library allocation
page read and write
4E0C00520000
trusted library allocation
page read and write
1487F45F000
heap
page read and write
25C012D4000
trusted library allocation
page read and write
5B6800288000
direct allocation
page read and write
1BE5B811000
heap
page read and write
25C00BA8000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
39FC002A0000
trusted library allocation
page read and write
130800124000
trusted library allocation
page read and write
3FAA000
heap
page read and write
1BE5B82B000
heap
page read and write
3FA004FA000
trusted library allocation
page read and write
26C83BDA000
heap
page read and write
25C019A0000
trusted library allocation
page read and write
25C00730000
trusted library allocation
page read and write
1487F502000
heap
page read and write
26D6011E000
trusted library allocation
page read and write
3FA4000
heap
page read and write
4E0C00C3C000
trusted library allocation
page read and write
25C01904000
trusted library allocation
page read and write
25C0130C000
trusted library allocation
page read and write
25C018CE000
trusted library allocation
page read and write
25C01990000
trusted library allocation
page read and write
25C00B2C000
trusted library allocation
page read and write
7FFF7A28C000
trusted library allocation
page execute and read and write
1DDC4550000
heap
page read and write
1BE5B813000
heap
page read and write
106C002A0000
trusted library allocation
page read and write
3FA0057F000
trusted library allocation
page read and write
25C013A7000
trusted library allocation
page read and write
25C01335000
trusted library allocation
page read and write
25C00730000
trusted library allocation
page read and write
25C019B6000
trusted library allocation
page read and write
7919000
heap
page read and write
25C00750000
trusted library allocation
page read and write
7380002B8000
trusted library allocation
page read and write
787C00258000
trusted library allocation
page read and write
1D300013C000
trusted library allocation
page read and write
39FC006AC000
trusted library allocation
page read and write
3F7A000
heap
page read and write
26CF1B54000
heap
page read and write
7D44002B2000
trusted library allocation
page read and write
26C9CC5D000
heap
page read and write
FD7F5FE000
unkown
page readonly
1480256F000
trusted library allocation
page read and write
106C002A4000
trusted library allocation
page read and write
25C0192E000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
7B1800258000
trusted library allocation
page read and write
25C0074C000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
3FA00557000
trusted library allocation
page read and write
2B7E1B6D2000
trusted library allocation
page read and write
1487F330000
heap
page read and write
25C000260000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
4E0C00788000
trusted library allocation
page read and write
25C012B4000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
3FA00242000
trusted library allocation
page read and write
25C01992000
trusted library allocation
page read and write
49E400121000
trusted library allocation
page read and write
B00000
heap
page read and write
1BE5B811000
heap
page read and write
25C0189A000
trusted library allocation
page read and write
25C02013000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
70D00020C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C019AF000
trusted library allocation
page read and write
25C019B7000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
7D44000D4000
trusted library allocation
page read and write
26C83B2D000
heap
page read and write
1BE5B809000
heap
page read and write
26CF1B33000
heap
page read and write
FD197FB000
stack
page read and write
148026A0000
heap
page read and write
4E0C00A14000
trusted library allocation
page read and write
17F7000
heap
page read and write
7D4400178000
trusted library allocation
page read and write
26C9C950000
heap
page readonly
FD725FE000
unkown
page readonly
17AB000
heap
page read and write
33327FE000
stack
page read and write
1BE5B82B000
heap
page read and write
39FC00338000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
77E4000
heap
page read and write
1BE5B7C7000
unclassified section
page read and write
1BE5B82B000
heap
page read and write
25C00A74000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
25C01214000
trusted library allocation
page read and write
1D69F720000
heap
page read and write
1BE5B82B000
heap
page read and write
2A400040000
trusted library allocation
page readonly
25C01990000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C01986000
trusted library allocation
page read and write
77E0000
heap
page read and write
1BE5B80F000
heap
page read and write
730400230000
direct allocation
page read and write
3EFD000
heap
page read and write
25C0141C000
trusted library allocation
page read and write
58200020C000
trusted library allocation
page read and write
5B680029C000
direct allocation
page read and write
26C83A02000
heap
page read and write
25C018D8000
trusted library allocation
page read and write
33377FE000
stack
page read and write
1BE5B824000
heap
page read and write
4E0C00678000
trusted library allocation
page read and write
182A000
heap
page read and write
25C019CA000
trusted library allocation
page read and write
39FC00A50000
trusted library allocation
page read and write
4E0C00D14000
trusted library allocation
page read and write
4E0C00258000
trusted library allocation
page read and write
25C008EC000
trusted library allocation
page read and write
1D300020C000
trusted library allocation
page read and write
39FC007B4000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
78F6000
heap
page read and write
25C01988000
trusted library allocation
page read and write
78B001194000
trusted library allocation
page read and write
1BEDF867000
unclassified section
page read and write
25C01250000
trusted library allocation
page read and write
332D7FE000
stack
page read and write
5E0000028000
trusted library allocation
page read and write
39FC002B4000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
25C02184000
trusted library allocation
page read and write
63AE000
stack
page read and write
4E0C01198000
trusted library allocation
page read and write
1E8002D8000
trusted library allocation
page read and write
4C5000284000
direct allocation
page read and write
4E0C00064000
trusted library allocation
page read and write
72F0000
heap
page read and write
25C00624000
trusted library allocation
page read and write
58200032B000
trusted library allocation
page read and write
26CF1A00000
heap
page read and write
25C00A80000
trusted library allocation
page read and write
2EE400310000
trusted library allocation
page read and write
17C5000
heap
page read and write
1BE5B809000
heap
page read and write
25C019B2000
trusted library allocation
page read and write
17E5000
heap
page read and write
5E0000228000
trusted library allocation
page read and write
1BEDFB1E000
unclassified section
page read and write
26C83A02000
heap
page read and write
5E0000150000
trusted library allocation
page read and write
3FA00940000
trusted library allocation
page read and write
26CF1B43000
heap
page read and write
3A447FE000
stack
page read and write
25C003E0000
trusted library allocation
page read and write
37E00028C000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
FD00FFE000
unkown
page readonly
70D000240000
trusted library allocation
page read and write
4E0C00688000
trusted library allocation
page read and write
25C00674000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
25C0142A000
trusted library allocation
page read and write
FD157FE000
unkown
page readonly
25C0060C000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
130800164000
trusted library allocation
page read and write
3F2A000
heap
page read and write
3F5D000
heap
page read and write
7FFF7A284000
trusted library allocation
page execute and read and write
25C019C8000
trusted library allocation
page read and write
3FA00784000
trusted library allocation
page read and write
130800168000
trusted library allocation
page read and write
82F2BFE000
stack
page read and write
1C39C502000
heap
page read and write
7D4400268000
trusted library allocation
page read and write
25C019E8000
trusted library allocation
page read and write
39FC003DD000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
70D000254000
trusted library allocation
page read and write
26CF1B40000
heap
page read and write
7903000
heap
page read and write
7D440027C000
trusted library allocation
page read and write
2EB4002B0000
direct allocation
page read and write
25C01990000
trusted library allocation
page read and write
25C0002B4000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
25C006DC000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
1B57EE13000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
25C012FC000
trusted library allocation
page read and write
4C5000294000
direct allocation
page read and write
26CF1B26000
heap
page read and write
78F5000
heap
page read and write
4E0C00760000
trusted library allocation
page read and write
1812000
heap
page read and write
25C019B0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
1BE5B80F000
heap
page read and write
1914002B4000
trusted library allocation
page read and write
25C01982000
trusted library allocation
page read and write
25C02174000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
5E000014C000
trusted library allocation
page read and write
38C80026C000
direct allocation
page read and write
7D440027A000
trusted library allocation
page read and write
33367FD000
stack
page read and write
1BE5B824000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
191400230000
trusted library allocation
page read and write
25C00848000
trusted library allocation
page read and write
191400220000
trusted library allocation
page read and write
333F7FE000
stack
page read and write
7304002B0000
direct allocation
page read and write
884A1FE000
stack
page read and write
1487F3A7000
remote allocation
page execute read
4E0C00247000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
7D4400098000
trusted library allocation
page read and write
4E0C00758000
trusted library allocation
page read and write
39FC006B7000
trusted library allocation
page read and write
25C013E0000
trusted library allocation
page read and write
191400298000
trusted library allocation
page read and write
73040031B000
direct allocation
page read and write
39FC002D8000
trusted library allocation
page read and write
134400561000
trusted library allocation
page read and write
4E0C00698000
trusted library allocation
page read and write
7D4400223000
trusted library allocation
page read and write
7830000
heap
page read and write
7D4400278000
trusted library allocation
page read and write
4E0C003A1000
trusted library allocation
page read and write
25C019B8000
trusted library allocation
page read and write
25C00BDC000
trusted library allocation
page read and write
676000308000
trusted library allocation
page read and write
25C008AE000
trusted library allocation
page read and write
78B000DB4000
trusted library allocation
page read and write
4E0C0036C000
trusted library allocation
page read and write
82F33FE000
stack
page read and write
1E80028C000
trusted library allocation
page read and write
25C0142E000
trusted library allocation
page read and write
25C018BE000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
7D44001DC000
trusted library allocation
page read and write
7D4400254000
trusted library allocation
page read and write
39FC00AA4000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1C39C7B7000
unclassified section
page read and write
3F65000
heap
page read and write
78B000D95000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
191400201000
trusted library allocation
page read and write
17C2000
heap
page read and write
1BE5B811000
heap
page read and write
26CF1B27000
heap
page read and write
1B6400284000
direct allocation
page read and write
181A000
heap
page read and write
25C0142C000
trusted library allocation
page read and write
3FA00503000
trusted library allocation
page read and write
26C83B44000
heap
page read and write
25C003D4000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
26CF3A02000
heap
page read and write
712C00264000
trusted library allocation
page read and write
1822000
heap
page read and write
1914002A8000
trusted library allocation
page read and write
4E0C00CA8000
trusted library allocation
page read and write
782F000
heap
page read and write
367C00321000
direct allocation
page read and write
60EC00284000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C00888000
trusted library allocation
page read and write
33317FE000
stack
page read and write
5820002C0000
trusted library allocation
page read and write
7D440007C000
trusted library allocation
page read and write
7380002A8000
trusted library allocation
page read and write
33240023C000
trusted library allocation
page read and write
1D6400284000
direct allocation
page read and write
3C279FC000
stack
page read and write
25C019AC000
trusted library allocation
page read and write
25C01399000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
25C018DD000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C018E4000
trusted library allocation
page read and write
37E0002D8000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
148026DE000
heap
page read and write
4E0C00346000
trusted library allocation
page read and write
1F937FE000
unkown
page readonly
39FC006DC000
trusted library allocation
page read and write
1817000
heap
page read and write
25C018E8000
trusted library allocation
page read and write
4E0C006DC000
trusted library allocation
page read and write
2DA00001C000
trusted library allocation
page read and write
4E0C0037E000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
25C0142C000
trusted library allocation
page read and write
106C00278000
trusted library allocation
page read and write
191400284000
trusted library allocation
page read and write
25C018C9000
trusted library allocation
page read and write
3FA0062E000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C008A9000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
738000278000
trusted library allocation
page read and write
25C00B90000
trusted library allocation
page read and write
17D5000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
25C02036000
trusted library allocation
page read and write
72ED000
heap
page read and write
3F06000
heap
page read and write
1308001D0000
trusted library allocation
page read and write
1DDC6302000
heap
page read and write
730400254000
direct allocation
page read and write
1DDC9A46000
heap
page read and write
77C800201000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
3F5A000
heap
page read and write
7D4400001000
trusted library allocation
page read and write
39FC00A48000
trusted library allocation
page read and write
1D69F813000
heap
page read and write
25C01425000
trusted library allocation
page read and write
7D4400024000
trusted library allocation
page read and write
884D1FE000
stack
page read and write
25C01316000
trusted library allocation
page read and write
25C018BE000
trusted library allocation
page read and write
5820002E0000
trusted library allocation
page read and write
4250002C0000
direct allocation
page read and write
7830000
heap
page read and write
25C00AB0000
trusted library allocation
page read and write
4E0C00001000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
25C0140C000
trusted library allocation
page read and write
26CF3810000
heap
page read and write
1BE5B82B000
heap
page read and write
3F4C000
heap
page read and write
738000264000
trusted library allocation
page read and write
26CF1B40000
heap
page read and write
25C003A6000
trusted library allocation
page read and write
4C5000201000
direct allocation
page read and write
1D30003A8000
trusted library allocation
page read and write
5E00001F0000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
77F0000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
25C018E8000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
106C00238000
trusted library allocation
page read and write
2A4000CA000
trusted library allocation
page read and write
1813000
heap
page read and write
17E7000
heap
page read and write
182B000
heap
page read and write
3FA0053E000
trusted library allocation
page read and write
1BE5B823000
heap
page read and write
73800020D000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
4E0C00B54000
trusted library allocation
page read and write
25C01904000
trusted library allocation
page read and write
26CF1B13000
heap
page read and write
25C01984000
trusted library allocation
page read and write
7D44002B4000
trusted library allocation
page read and write
39FC00A48000
trusted library allocation
page read and write
182E000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
148026D8000
heap
page read and write
25C012E4000
trusted library allocation
page read and write
4E0C005DC000
trusted library allocation
page read and write
39FC0032F000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
26C83B2D000
heap
page read and write
39FC00A60000
trusted library allocation
page read and write
37E000268000
trusted library allocation
page read and write
25C00B11000
trusted library allocation
page read and write
26CF1B2E000
heap
page read and write
60EC00201000
trusted library allocation
page read and write
1D3000430000
trusted library allocation
page read and write
4E0C006B1000
trusted library allocation
page read and write
14AF7000000
heap
page read and write
46A0002B0000
trusted library allocation
page read and write
25C012CC000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
5E0000104000
trusted library allocation
page read and write
67600020C000
trusted library allocation
page read and write
7875000
heap
page read and write
4E0C00CA4000
trusted library allocation
page read and write
26C83BE7000
heap
page read and write
7D44002D4000
trusted library allocation
page read and write
4E0C01164000
trusted library allocation
page read and write
357C00280000
trusted library allocation
page read and write
1C39C46B000
heap
page read and write
1D30000EC000
trusted library allocation
page read and write
26C83B02000
heap
page read and write
3FA00554000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
26D604F0000
unclassified section
page read and write
25C00B24000
trusted library allocation
page read and write
26CF1A42000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
26C83B4F000
heap
page read and write
1B6400211000
direct allocation
page read and write
182E000
heap
page read and write
568A4000
trusted library allocation
page read and write
78B000A3D000
trusted library allocation
page read and write
45A400230000
trusted library allocation
page read and write
7D44002C8000
trusted library allocation
page read and write
4E0C0012C000
trusted library allocation
page read and write
25C02103000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
25C00A4C000
trusted library allocation
page read and write
78B000A6C000
trusted library allocation
page read and write
134400161000
trusted library allocation
page read and write
3F0F000
heap
page read and write
70D0002CC000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
25C02066000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1308001C0000
trusted library allocation
page read and write
3EE7000
heap
page read and write
4E0C006A5000
trusted library allocation
page read and write
25C0141C000
trusted library allocation
page read and write
1BEDF8DC000
unclassified section
page read and write
4E0C00BE0000
trusted library allocation
page read and write
25C018EF000
trusted library allocation
page read and write
78B000A58000
trusted library allocation
page read and write
39FC00254000
trusted library allocation
page read and write
26C83B3E000
heap
page read and write
2F1C0023C000
trusted library allocation
page read and write
60EC00238000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
1DDC4546000
heap
page read and write
3F8E000
heap
page read and write
3FA0058C000
trusted library allocation
page read and write
6F1C000
stack
page read and write
1BE5B809000
heap
page read and write
1BE5B824000
heap
page read and write
25C000274000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
191400294000
trusted library allocation
page read and write
25C018B4000
trusted library allocation
page read and write
17E6000
heap
page read and write
26CF1B2E000
heap
page read and write
37E0002DC000
trusted library allocation
page read and write
182A000
heap
page read and write
1BE5B80A000
heap
page read and write
1BE5B811000
heap
page read and write
26CF1B42000
heap
page read and write
25C019A2000
trusted library allocation
page read and write
4E0C00F9B000
trusted library allocation
page read and write
49E4001A1000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
7D44002B4000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C01998000
trusted library allocation
page read and write
73F9000
trusted library allocation
page read and write
130800368000
trusted library allocation
page read and write
1DDC4544000
heap
page read and write
4C5000408000
direct allocation
page read and write
17DB000
heap
page read and write
39FC00B65000
trusted library allocation
page read and write
7D4400248000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
77C8002F0000
trusted library allocation
page read and write
1B57EE2B000
heap
page read and write
3FA00873000
trusted library allocation
page read and write
4E0C00C44000
trusted library allocation
page read and write
3F26000
heap
page read and write
787C00248000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
39FC00A01000
trusted library allocation
page read and write
5E000020D000
trusted library allocation
page read and write
35F31FB000
stack
page read and write
45A40023C000
trusted library allocation
page read and write
1C39F25E000
heap
page read and write
25C00B98000
trusted library allocation
page read and write
25C00F00000
trusted library allocation
page read and write
78B000F6F000
trusted library allocation
page read and write
191400264000
trusted library allocation
page read and write
3FA00962000
trusted library allocation
page read and write
25C01250000
trusted library allocation
page read and write
4E0C003E1000
trusted library allocation
page read and write
1DDC454B000
heap
page read and write
1DDC4545000
heap
page read and write
1D64002C0000
direct allocation
page read and write
1DDC6302000
heap
page read and write
25C008BC000
trusted library allocation
page read and write
25C00B88000
trusted library allocation
page read and write
19799090000
heap
page read and write
38C800230000
direct allocation
page read and write
1B5AD647000
heap
page read and write
7D44002AA000
trusted library allocation
page read and write
25C0191A000
trusted library allocation
page read and write
1308001A4000
trusted library allocation
page read and write
1B57ED40000
heap
page read and write
1BE5B80A000
heap
page read and write
1DDC9ABD000
heap
page read and write
1BE5B811000
heap
page read and write
25C01798000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
25C006AC000
trusted library allocation
page read and write
25C01960000
trusted library allocation
page read and write
554002B8000
trusted library allocation
page read and write
3F4B000
heap
page read and write
1BE5B82B000
heap
page read and write
25C019AE000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1BE5B80F000
heap
page read and write
39FC006C4000
trusted library allocation
page read and write
17E5000
heap
page read and write
25C01959000
trusted library allocation
page read and write
4E0C00D04000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
619000294000
direct allocation
page read and write
1DDC4546000
heap
page read and write
4E0C00D65000
trusted library allocation
page read and write
25C020B6000
trusted library allocation
page read and write
1BE5B86D000
heap
page read and write
1BE5B82B000
heap
page read and write
1D3000114000
trusted library allocation
page read and write
25C0190C000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
25C012A0000
trusted library allocation
page read and write
4C50002A8000
direct allocation
page read and write
45A400248000
trusted library allocation
page read and write
2A4001C2000
trusted library allocation
page read and write
25C013A0000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
2DA0000C0000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
25C02068000
trusted library allocation
page read and write
3F95000
heap
page read and write
3F2E000
heap
page read and write
4E0C00C28000
trusted library allocation
page read and write
134400241000
trusted library allocation
page read and write
25C00220000
trusted library allocation
page read and write
1C39F29C000
heap
page read and write
26D6012F000
trusted library allocation
page read and write
1B64002F4000
direct allocation
page read and write
425000201000
direct allocation
page read and write
25C019A4000
trusted library allocation
page read and write
1BE5B828000
heap
page read and write
25C02150000
trusted library allocation
page read and write
1795000
heap
page read and write
25C018C0000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
17C2000
heap
page read and write
1D3000114000
trusted library allocation
page read and write
4E0C00201000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
38C800220000
direct allocation
page read and write
130800114000
trusted library allocation
page read and write
5E0000090000
trusted library allocation
page read and write
14AF7102000
heap
page read and write
25C019A0000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
1DDC4530000
heap
page read and write
1D3000352000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
357C00258000
trusted library allocation
page read and write
39FC007C4000
trusted library allocation
page read and write
7D440028E000
trusted library allocation
page read and write
25C01904000
trusted library allocation
page read and write
25C019B9000
trusted library allocation
page read and write
25C00B24000
trusted library allocation
page read and write
25C009F5000
trusted library allocation
page read and write
180A000
heap
page read and write
25C02204000
trusted library allocation
page read and write
26C9FDF0000
unclassified section
page read and write
25C01936000
trusted library allocation
page read and write
77EE000
heap
page read and write
25C0088C000
trusted library allocation
page read and write
25C01902000
trusted library allocation
page read and write
46A00040C000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C018AC000
trusted library allocation
page read and write
78B000A25000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
3FA008F4000
trusted library allocation
page read and write
3FA00870000
trusted library allocation
page read and write
26C9CC02000
heap
page read and write
3FA00941000
trusted library allocation
page read and write
19140020C000
trusted library allocation
page read and write
A1027FE000
unkown
page readonly
13080036D000
trusted library allocation
page read and write
37E0002AC000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
17C2000
heap
page read and write
17E7000
heap
page read and write
25C018EF000
trusted library allocation
page read and write
2EB400254000
direct allocation
page read and write
25C01335000
trusted library allocation
page read and write
25C0201C000
trusted library allocation
page read and write
4C50002CC000
direct allocation
page read and write
183D9F20000
heap
page readonly
5687C000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
425000284000
direct allocation
page read and write
7D440027E000
trusted library allocation
page read and write
1DDC9A02000
heap
page read and write
3FA00572000
trusted library allocation
page read and write
45A4002B0000
trusted library allocation
page read and write
25C018EF000
trusted library allocation
page read and write
77C1000
heap
page read and write
26CF1B4B000
heap
page read and write
357C002C8000
trusted library allocation
page read and write
182E000
heap
page read and write
1BE5B825000
heap
page read and write
1D300016D000
trusted library allocation
page read and write
1E8002A0000
trusted library allocation
page read and write
25C00878000
trusted library allocation
page read and write
1D3000168000
trusted library allocation
page read and write
5E00000E7000
trusted library allocation
page read and write
25C0196A000
trusted library allocation
page read and write
25C01934000
trusted library allocation
page read and write
3F38000
heap
page read and write
25C009B8000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
78B001098000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
1BE5B809000
heap
page read and write
25C01372000
trusted library allocation
page read and write
25C018C9000
trusted library allocation
page read and write
26C9C825000
remote allocation
page execute read
25C00B0C000
trusted library allocation
page read and write
39FC00264000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
7380002B8000
trusted library allocation
page read and write
4E0C0007C000
trusted library allocation
page read and write
1914002B8000
trusted library allocation
page read and write
676000211000
trusted library allocation
page read and write
71DD000
stack
page read and write
4E0C00DC4000
trusted library allocation
page read and write
181A000
heap
page read and write
17E5000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
26D608D0000
unclassified section
page read and write
FD76DFE000
stack
page read and write
56990000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
25C01450000
trusted library allocation
page read and write
77CB000
heap
page read and write
33337FE000
stack
page read and write
FD18FFE000
unkown
page readonly
1828000
heap
page read and write
1D3000420000
trusted library allocation
page read and write
3F69000
heap
page read and write
1DDC4544000
heap
page read and write
55400258000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
25C013D4000
trusted library allocation
page read and write
582000300000
trusted library allocation
page read and write
39FC00B88000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1308001F4000
trusted library allocation
page read and write
4E0C0005D000
trusted library allocation
page read and write
3FA00842000
trusted library allocation
page read and write
357C002A4000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
787C00254000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
39FC00601000
trusted library allocation
page read and write
78B000DA1000
trusted library allocation
page read and write
25C01298000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
3FA00182000
trusted library allocation
page read and write
3FA00544000
trusted library allocation
page read and write
1DDC9AAF000
heap
page read and write
14802560000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
4E0C0068D000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
25C01450000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
181A000
heap
page read and write
78B000864000
trusted library allocation
page read and write
4E0C00C44000
trusted library allocation
page read and write
1829000
heap
page read and write
3FA00632000
trusted library allocation
page read and write
39FC00730000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
39FC00418000
trusted library allocation
page read and write
425000294000
direct allocation
page read and write
42D7000
heap
page read and write
4E0C01153000
trusted library allocation
page read and write
25C01316000
trusted library allocation
page read and write
3A40000
heap
page read and write
1D69F690000
heap
page read and write
25C0142C000
trusted library allocation
page read and write
3FA002C2000
trusted library allocation
page read and write
45A400201000
trusted library allocation
page read and write
1914002B4000
trusted library allocation
page read and write
39FC00A48000
trusted library allocation
page read and write
B40000
unkown
page readonly
1BE5B80A000
heap
page read and write
1DDC4548000
heap
page read and write
3FA00302000
trusted library allocation
page read and write
1BE5B86A000
heap
page read and write
7D44002AA000
trusted library allocation
page read and write
33347FE000
stack
page read and write
25C012EA000
trusted library allocation
page read and write
1DDC454F000
heap
page read and write
25C02038000
trusted library allocation
page read and write
26CF1B28000
heap
page read and write
72FC00044000
trusted library allocation
page read and write
25C018CE000
trusted library allocation
page read and write
7D4400280000
trusted library allocation
page read and write
25C02070000
trusted library allocation
page read and write
25C01918000
trusted library allocation
page read and write
25C00B08000
trusted library allocation
page read and write
25C00C01000
trusted library allocation
page read and write
4E0C01184000
trusted library allocation
page read and write
25C01944000
trusted library allocation
page read and write
26CF3B43000
heap
page read and write
4E0C0025C000
trusted library allocation
page read and write
4E0C00FD4000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
39FC00662000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
4E0C00EF0000
trusted library allocation
page read and write
49E4001C8000
trusted library allocation
page read and write
180D000
heap
page read and write
25C01880000
trusted library allocation
page read and write
25C02110000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
17C4000
heap
page read and write
25C0121C000
trusted library allocation
page read and write
25C00B4C000
trusted library allocation
page read and write
25C01423000
trusted library allocation
page read and write
25C00254000
trusted library allocation
page read and write
26C9CC00000
heap
page read and write
26C83B5A000
heap
page read and write
25C00322000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
554002A4000
trusted library allocation
page read and write
1D300013D000
trusted library allocation
page read and write
1B6400298000
direct allocation
page read and write
1BE5B825000
heap
page read and write
78F1000
heap
page read and write
3F8B000
heap
page read and write
4E0C003D8000
trusted library allocation
page read and write
25C01897000
trusted library allocation
page read and write
25C012CC000
trusted library allocation
page read and write
25C0199A000
trusted library allocation
page read and write
1813000
heap
page read and write
25C018FD000
trusted library allocation
page read and write
2EB400220000
direct allocation
page read and write
1B5AD602000
heap
page read and write
1817000
heap
page read and write
106C00274000
trusted library allocation
page read and write
1D30000E7000
trusted library allocation
page read and write
39FC0074C000
trusted library allocation
page read and write
333B7F8000
stack
page read and write
4E0C005DC000
trusted library allocation
page read and write
25C016AC000
trusted library allocation
page read and write
39FC0094C000
trusted library allocation
page read and write
25C0195E000
trusted library allocation
page read and write
25C018D0000
trusted library allocation
page read and write
25C01860000
trusted library allocation
page read and write
4E0C00A70000
trusted library allocation
page read and write
25C00A7A000
trusted library allocation
page read and write
554002C8000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
4E0C00F94000
trusted library allocation
page read and write
3FA00622000
trusted library allocation
page read and write
39FC00614000
trusted library allocation
page read and write
17F7000
heap
page read and write
1DDC4541000
heap
page read and write
FD1E7FE000
stack
page read and write
17B0000
heap
page read and write
619000254000
direct allocation
page read and write
1344001AE000
trusted library allocation
page read and write
17F7000
heap
page read and write
7B1800220000
trusted library allocation
page read and write
106000230000
direct allocation
page read and write
25C01944000
trusted library allocation
page read and write
1D3000081000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
78B000254000
trusted library allocation
page read and write
25C01998000
trusted library allocation
page read and write
4C5000234000
direct allocation
page read and write
134400301000
trusted library allocation
page read and write
712C00230000
trusted library allocation
page read and write
25C0027C000
trusted library allocation
page read and write
39FC00338000
trusted library allocation
page read and write
1DDC9B02000
heap
page read and write
3FA00902000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
568B0000
trusted library allocation
page read and write
78B000DB4000
trusted library allocation
page read and write
25C0065E000
trusted library allocation
page read and write
17AB000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
3FA004E8000
trusted library allocation
page read and write
77C800220000
trusted library allocation
page read and write
67600040C000
trusted library allocation
page read and write
39FC008EC000
trusted library allocation
page read and write
39FC00338000
trusted library allocation
page read and write
26C9CC09000
heap
page read and write
4E0C001C1000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C0002A0000
trusted library allocation
page read and write
26CF1B43000
heap
page read and write
3F89000
heap
page read and write
1BE5B811000
heap
page read and write
1BE5B82B000
heap
page read and write
25C0061C000
trusted library allocation
page read and write
A1007FE000
unkown
page readonly
106C00284000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
26CDFEE7000
trusted library allocation
page read and write
1BEDFB98000
unclassified section
page read and write
39FC009EC000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
3324002CC000
trusted library allocation
page read and write
181A000
heap
page read and write
25C01998000
trusted library allocation
page read and write
1D6400234000
direct allocation
page read and write
25C00B16000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
1DDC4528000
heap
page read and write
25C018E8000
trusted library allocation
page read and write
25C01980000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
5E000019C000
trusted library allocation
page read and write
25C0136E000
trusted library allocation
page read and write
77E0000
heap
page read and write
25C01314000
trusted library allocation
page read and write
2DA000110000
trusted library allocation
page read and write
1DDC4527000
heap
page read and write
25C01946000
trusted library allocation
page read and write
77E4000
heap
page read and write
332C7F6000
stack
page read and write
7317000
heap
page read and write
1D6400264000
direct allocation
page read and write
25C018C4000
trusted library allocation
page read and write
3FA00853000
trusted library allocation
page read and write
39FC00310000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
197991B2000
unclassified section
page read and write
1BE5B80A000
heap
page read and write
3F53000
heap
page read and write
1BE5B80F000
heap
page read and write
25C0141C000
trusted library allocation
page read and write
3EE3000
heap
page read and write
1BE5B82B000
heap
page read and write
39FC00730000
trusted library allocation
page read and write
7B1800288000
trusted library allocation
page read and write
4380000
remote allocation
page read and write
3F43000
heap
page read and write
39FC00AEC000
trusted library allocation
page read and write
26C83B93000
heap
page read and write
25C00F30000
trusted library allocation
page read and write
3A49FFE000
unkown
page readonly
148026CD000
heap
page read and write
3FA00582000
trusted library allocation
page read and write
1809000
heap
page read and write
1BE5B811000
heap
page read and write
357C00230000
trusted library allocation
page read and write
25C006F0000
trusted library allocation
page read and write
712C0020D000
trusted library allocation
page read and write
25C019B2000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
1C39C4FF000
heap
page read and write
39FC00AF5000
trusted library allocation
page read and write
7D44002B1000
trusted library allocation
page read and write
17C2000
heap
page read and write
25C020D4000
trusted library allocation
page read and write
25C02105000
trusted library allocation
page read and write
26C9C990000
heap
page read and write
4E0C00194000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C01959000
trusted library allocation
page read and write
3FA00872000
trusted library allocation
page read and write
25C00B1C000
trusted library allocation
page read and write
3324002DC000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
26C9CA00000
heap
page read and write
3A4BFFE000
unkown
page readonly
1BE5B825000
heap
page read and write
25C0142C000
trusted library allocation
page read and write
26CF1B54000
heap
page read and write
25C01994000
trusted library allocation
page read and write
39FC00824000
trusted library allocation
page read and write
26CF3B02000
heap
page read and write
182E000
heap
page read and write
77C3000
heap
page read and write
3F82000
heap
page read and write
56870000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
25C018C0000
trusted library allocation
page read and write
25C00B4C000
trusted library allocation
page read and write
192D000
stack
page read and write
17C5000
heap
page read and write
7815000
heap
page read and write
4380000
remote allocation
page read and write
7D44000E9000
trusted library allocation
page read and write
78C1000
heap
page read and write
3C2E1FE000
unkown
page readonly
1BE5B7B0000
unclassified section
page read and write
182E000
heap
page read and write
17AB000
heap
page read and write
1DDC4546000
heap
page read and write
25C018C0000
trusted library allocation
page read and write
1D30000B4000
trusted library allocation
page read and write
4E0C00EF0000
trusted library allocation
page read and write
88589FE000
unkown
page readonly
1C39C310000
remote allocation
page read and write
4E0C0100F000
trusted library allocation
page read and write
25C0139D000
trusted library allocation
page read and write
1DDC9A5B000
heap
page read and write
7D44001A4000
trusted library allocation
page read and write
39FC009A4000
trusted library allocation
page read and write
25C009A4000
trusted library allocation
page read and write
3FA00102000
trusted library allocation
page read and write
1C39C382000
unclassified section
page read and write
25C008E4000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
25C018E4000
trusted library allocation
page read and write
4E0C0114C000
trusted library allocation
page read and write
49E40011B000
trusted library allocation
page read and write
56960000
trusted library allocation
page read and write
7D4400169000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
78B000247000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
2A4001AF000
trusted library allocation
page read and write
1DDC4554000
heap
page read and write
25C01998000
trusted library allocation
page read and write
1D300035D000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
181A000
heap
page read and write
38C800298000
direct allocation
page read and write
7D44002B4000
trusted library allocation
page read and write
712C00244000
trusted library allocation
page read and write
1DDC454D000
heap
page read and write
1BE5B825000
heap
page read and write
783B000
heap
page read and write
26CF1B28000
heap
page read and write
4E0C00244000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
1BE5B866000
heap
page read and write
3F27000
heap
page read and write
3F79000
heap
page read and write
106C002DC000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
4E0C00337000
trusted library allocation
page read and write
3A437FB000
stack
page read and write
46A00020C000
trusted library allocation
page read and write
39FC00628000
trusted library allocation
page read and write
106C00248000
trusted library allocation
page read and write
1BE5B827000
heap
page read and write
1BE5B82B000
heap
page read and write
1BE5B82B000
heap
page read and write
1BE5B811000
heap
page read and write
1DDC4527000
heap
page read and write
4E0C0119A000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
25C009F5000
trusted library allocation
page read and write
67600031C000
trusted library allocation
page read and write
3FA0086F000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
26CF1B35000
heap
page read and write
78B000DCC000
trusted library allocation
page read and write
39FC008A7000
trusted library allocation
page read and write
7919000
heap
page read and write
3FA00905000
trusted library allocation
page read and write
25C0087C000
trusted library allocation
page read and write
25C00330000
trusted library allocation
page read and write
78F2000
heap
page read and write
77C8002C0000
trusted library allocation
page read and write
14AF8C02000
heap
page read and write
582000274000
trusted library allocation
page read and write
676000284000
trusted library allocation
page read and write
3FA00783000
trusted library allocation
page read and write
3FA005A0000
trusted library allocation
page read and write
3EEF000
heap
page read and write
183DA013000
heap
page read and write
1791000
heap
page read and write
78B000AAC000
trusted library allocation
page read and write
25C01500000
trusted library allocation
page read and write
1487F440000
heap
page read and write
25C009F4000
trusted library allocation
page read and write
7D44002D7000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
3F4C000
heap
page read and write
738000284000
trusted library allocation
page read and write
2A400282000
trusted library allocation
page read and write
25C00B54000
trusted library allocation
page read and write
39FC00201000
trusted library allocation
page read and write
17C4000
heap
page read and write
25C009EC000
trusted library allocation
page read and write
332E7FE000
stack
page read and write
25C002F4000
trusted library allocation
page read and write
3FA00846000
trusted library allocation
page read and write
25C018BB000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
A100FFE000
stack
page read and write
3FD6000
heap
page read and write
1D300024C000
trusted library allocation
page read and write
26C83A1C000
heap
page read and write
38C8002B8000
direct allocation
page read and write
134400423000
trusted library allocation
page read and write
26CF1B33000
heap
page read and write
25C01318000
trusted library allocation
page read and write
7D44002B4000
trusted library allocation
page read and write
39FC00B84000
trusted library allocation
page read and write
72A6BFF000
stack
page read and write
46A000230000
trusted library allocation
page read and write
78B000F9C000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
17C2000
heap
page read and write
60EC00254000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
25C019A8000
trusted library allocation
page read and write
1D3000448000
trusted library allocation
page read and write
49E400221000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B80F000
heap
page read and write
5E0000134000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
106C00220000
trusted library allocation
page read and write
3F75000
heap
page read and write
25C019A6000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
2EE400424000
trusted library allocation
page read and write
13080036D000
trusted library allocation
page read and write
39FC0020C000
trusted library allocation
page read and write
19799405000
heap
page read and write
39FC00878000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
712C00238000
trusted library allocation
page read and write
FD047FD000
stack
page read and write
3F5A000
heap
page read and write
7D440029C000
trusted library allocation
page read and write
1DDC4540000
heap
page read and write
1BE5B720000
heap
page read and write
7800000
heap
page read and write
39FC00AD0000
trusted library allocation
page read and write
106000220000
direct allocation
page read and write
789A000
heap
page read and write
25C012CC000
trusted library allocation
page read and write
FD1EFFE000
unkown
page readonly
7D44000FC000
trusted library allocation
page read and write
3F20000
heap
page read and write
1487F46B000
heap
page read and write
25C00888000
trusted library allocation
page read and write
7808000
heap
page read and write
2DA000096000
trusted library allocation
page read and write
26CF1B48000
heap
page read and write
2EB400284000
direct allocation
page read and write
78C1000
heap
page read and write
78B000F88000
trusted library allocation
page read and write
26CF1B45000
heap
page read and write
7D4400290000
trusted library allocation
page read and write
25C00EFE000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
3FA00442000
trusted library allocation
page read and write
25C01EAC000
trusted library allocation
page read and write
7D440020C000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
3FA00744000
trusted library allocation
page read and write
25C019B4000
trusted library allocation
page read and write
7D44001E0000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
5E0000165000
trusted library allocation
page read and write
72FC000D0000
trusted library allocation
page read and write
25C0192C000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
25C01984000
trusted library allocation
page read and write
357C0025C000
trusted library allocation
page read and write
17C5000
heap
page read and write
1B64002C4000
direct allocation
page read and write
25C01992000
trusted library allocation
page read and write
39FC0034C000
trusted library allocation
page read and write
26C9FE70000
unclassified section
page read and write
25C019A8000
trusted library allocation
page read and write
25C020D2000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
1DDC4545000
heap
page read and write
7FFF7A284000
trusted library allocation
page execute and read and write
3A4A7FE000
stack
page read and write
1817000
heap
page read and write
25C01990000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
1487F430000
heap
page read and write
7D440027E000
trusted library allocation
page read and write
3F24000
heap
page read and write
25C01404000
trusted library allocation
page read and write
884C9FE000
unkown
page readonly
25C01984000
trusted library allocation
page read and write
37E000244000
trusted library allocation
page read and write
1B64002E4000
direct allocation
page read and write
25C0196A000
trusted library allocation
page read and write
39FC0083D000
trusted library allocation
page read and write
4C50002D4000
direct allocation
page read and write
26CF1B32000
heap
page read and write
1BE5E8A0000
trusted library allocation
page read and write
25C01399000
trusted library allocation
page read and write
3324002B8000
trusted library allocation
page read and write
1829000
heap
page read and write
25C018C9000
trusted library allocation
page read and write
FD127FD000
stack
page read and write
26CF1B2F000
heap
page read and write
1D3000138000
trusted library allocation
page read and write
1487F3E0000
heap
page read and write
25C0141E000
trusted library allocation
page read and write
1D69F760000
heap
page readonly
1C39C360000
heap
page read and write
25C019B4000
trusted library allocation
page read and write
25C019A6000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3F76000
heap
page read and write
2DA000108000
trusted library allocation
page read and write
1BEDF1C7000
unclassified section
page read and write
7824000
heap
page read and write
3F2E000
heap
page read and write
1BE5B824000
heap
page read and write
1DDC4548000
heap
page read and write
181A000
heap
page read and write
40A4000
trusted library allocation
page read and write
7304002D8000
direct allocation
page read and write
25C00888000
trusted library allocation
page read and write
3FA00984000
trusted library allocation
page read and write
425000408000
direct allocation
page read and write
130800240000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
25C00944000
trusted library allocation
page read and write
25C0123C000
trusted library allocation
page read and write
39FC0090C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
4E0C00A54000
trusted library allocation
page read and write
26C836A0000
heap
page read and write
25C0192C000
trusted library allocation
page read and write
25C00EFF000
trusted library allocation
page read and write
1D30001C8000
trusted library allocation
page read and write
25C018EF000
trusted library allocation
page read and write
45A400220000
trusted library allocation
page read and write
70D000230000
trusted library allocation
page read and write
88521FE000
stack
page read and write
17C5000
heap
page read and write
1BEDFA87000
unclassified section
page read and write
106C00404000
trusted library allocation
page read and write
39FC00858000
trusted library allocation
page read and write
39FC009AE000
trusted library allocation
page read and write
3FA00840000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1D300040C000
trusted library allocation
page read and write
25C012F4000
trusted library allocation
page read and write
7D4400184000
trusted library allocation
page read and write
1C39C43F000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
25C01EB0000
trusted library allocation
page read and write
1B57EE69000
heap
page read and write
25C0191C000
trusted library allocation
page read and write
78B000F4C000
trusted library allocation
page read and write
25C018B0000
trusted library allocation
page read and write
25C00654000
trusted library allocation
page read and write
106000250000
direct allocation
page read and write
39FC00AE0000
trusted library allocation
page read and write
3FA00305000
trusted library allocation
page read and write
65EE000
stack
page read and write
25C00869000
trusted library allocation
page read and write
26C83B5E000
heap
page read and write
730400220000
direct allocation
page read and write
1740000
heap
page read and write
1BE5B811000
heap
page read and write
3F79000
heap
page read and write
25C000244000
trusted library allocation
page read and write
39FC009C1000
trusted library allocation
page read and write
26CF1B4E000
heap
page read and write
3F76000
heap
page read and write
25C02042000
trusted library allocation
page read and write
25C012E4000
trusted library allocation
page read and write
13440058B000
trusted library allocation
page read and write
4E0C00C58000
trusted library allocation
page read and write
39FC008AE000
trusted library allocation
page read and write
1D30003AC000
trusted library allocation
page read and write
357C00280000
trusted library allocation
page read and write
39FC00AD4000
trusted library allocation
page read and write
1BE5B869000
heap
page read and write
1D3000138000
trusted library allocation
page read and write
4E0C0013C000
trusted library allocation
page read and write
26CF1B44000
heap
page read and write
25C01428000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C009DA000
trusted library allocation
page read and write
5B6800234000
direct allocation
page read and write
4E0C00EC4000
trusted library allocation
page read and write
1344002E1000
trusted library allocation
page read and write
4E0C002FC000
trusted library allocation
page read and write
25C012F8000
trusted library allocation
page read and write
4E0C00256000
trusted library allocation
page read and write
25C008A0000
trusted library allocation
page read and write
7D440005C000
trusted library allocation
page read and write
25C00BE4000
trusted library allocation
page read and write
7D4400220000
trusted library allocation
page read and write
40C0000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
5E000005C000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
130800260000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1BE5B80A000
heap
page read and write
1487F464000
heap
page read and write
1BE5B825000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
25C01428000
trusted library allocation
page read and write
367C00324000
direct allocation
page read and write
3F79000
heap
page read and write
46A000328000
trusted library allocation
page read and write
77C800230000
trusted library allocation
page read and write
5E00000DD000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
25C01952000
trusted library allocation
page read and write
25C012D4000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
4E0C00484000
trusted library allocation
page read and write
78B000BB4000
trusted library allocation
page read and write
39FC00AF8000
trusted library allocation
page read and write
367C0030E000
direct allocation
page read and write
1BE5B80A000
heap
page read and write
77F0000
heap
page read and write
1060002D8000
direct allocation
page read and write
4E0C005EC000
trusted library allocation
page read and write
25C019AB000
trusted library allocation
page read and write
14AF6FA0000
heap
page read and write
56834000
trusted library allocation
page read and write
4E0C00774000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
88481FE000
stack
page read and write
1BE5B809000
heap
page read and write
3F2E000
heap
page read and write
3F1F000
heap
page read and write
25C01710000
trusted library allocation
page read and write
181A000
heap
page read and write
3FA00906000
trusted library allocation
page read and write
4E0C0100C000
trusted library allocation
page read and write
5B6800264000
direct allocation
page read and write
25C019CD000
trusted library allocation
page read and write
1BE5B330000
unclassified section
page readonly
26C83B2D000
heap
page read and write
25C00794000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
25C02020000
trusted library allocation
page read and write
1D3000336000
trusted library allocation
page read and write
25C0188C000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C019B0000
trusted library allocation
page read and write
7D440027C000
trusted library allocation
page read and write
77C800248000
trusted library allocation
page read and write
39FC00A98000
trusted library allocation
page read and write
78B000AE8000
trusted library allocation
page read and write
1C39F244000
heap
page read and write
39FC008AB000
trusted library allocation
page read and write
17E7000
heap
page read and write
1DDC4541000
heap
page read and write
25C00230000
trusted library allocation
page read and write
77D0000
heap
page read and write
25C018E2000
trusted library allocation
page read and write
1781000
heap
page read and write
26CF3B00000
heap
page read and write
FD1DFFE000
unkown
page readonly
1BE5B80F000
heap
page read and write
1BE5B825000
heap
page read and write
25C0144C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA005A1000
trusted library allocation
page read and write
25C00684000
trusted library allocation
page read and write
1344002A1000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
3FA00516000
trusted library allocation
page read and write
183D9E40000
heap
page read and write
6760002B8000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1BE5B811000
heap
page read and write
25C02118000
trusted library allocation
page read and write
72FC000C0000
trusted library allocation
page read and write
3A4AFFE000
unkown
page readonly
2DA0000B4000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1BE5B80A000
heap
page read and write
1DDC4548000
heap
page read and write
17F7000
heap
page read and write
25C008A0000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
25C00BA8000
trusted library allocation
page read and write
1B57EE79000
heap
page read and write
37E000238000
trusted library allocation
page read and write
39FC00338000
trusted library allocation
page read and write
78B00025C000
trusted library allocation
page read and write
3FA00556000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
1DDC454F000
heap
page read and write
26CF1B29000
heap
page read and write
4E0C00147000
trusted library allocation
page read and write
39FC00B30000
trusted library allocation
page read and write
45A4002C4000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C018BB000
trusted library allocation
page read and write
25C013D4000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
25C01428000
trusted library allocation
page read and write
2EE40023C000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
25C018E8000
trusted library allocation
page read and write
1D6400274000
direct allocation
page read and write
64ED000
stack
page read and write
25C0038C000
trusted library allocation
page read and write
37E0002A0000
trusted library allocation
page read and write
25C0197C000
trusted library allocation
page read and write
4E0C010C4000
trusted library allocation
page read and write
5E00000FC000
trusted library allocation
page read and write
78B000A3D000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
3B3E000
stack
page read and write
1D6400288000
direct allocation
page read and write
3FC0000C000
trusted library allocation
page read and write
78F1000
heap
page read and write
39FC00A74000
trusted library allocation
page read and write
17E5000
heap
page read and write
3331FFE000
unkown
page readonly
25C00B44000
trusted library allocation
page read and write
25C019B6000
trusted library allocation
page read and write
130800358000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
25C018B4000
trusted library allocation
page read and write
25C019AE000
trusted library allocation
page read and write
39FC00230000
trusted library allocation
page read and write
26C83B4D000
heap
page read and write
3FA0058E000
trusted library allocation
page read and write
37E0002C8000
trusted library allocation
page read and write
58200033C000
trusted library allocation
page read and write
5820002A0000
trusted library allocation
page read and write
1BE5B402000
heap
page read and write
25C01930000
trusted library allocation
page read and write
25C020DE000
trusted library allocation
page read and write
4E0C00372000
trusted library allocation
page read and write
25C019A2000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
4E0C007E0000
trusted library allocation
page read and write
1D30001E8000
trusted library allocation
page read and write
25C018D0000
trusted library allocation
page read and write
2DA000080000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
1B57EE64000
heap
page read and write
25C00BA8000
trusted library allocation
page read and write
106C00201000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
25C00B90000
trusted library allocation
page read and write
A17EDFC000
stack
page read and write
26CF1B41000
heap
page read and write
1BE5B824000
heap
page read and write
2A4000C2000
trusted library allocation
page read and write
4E0C00F90000
trusted library allocation
page read and write
39FC009B0000
trusted library allocation
page read and write
25C020E0000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
3FA004F9000
trusted library allocation
page read and write
7D4400168000
trusted library allocation
page read and write
1D300019C000
trusted library allocation
page read and write
5685C000
trusted library allocation
page read and write
25C019AA000
trusted library allocation
page read and write
3F8F000
heap
page read and write
1BE5B80F000
heap
page read and write
26D6088D000
unclassified section
page read and write
19140027C000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
25C01423000
trusted library allocation
page read and write
676000430000
trusted library allocation
page read and write
25C008A4000
trusted library allocation
page read and write
25C01368000
trusted library allocation
page read and write
4E0C00B40000
trusted library allocation
page read and write
1809000
heap
page read and write
25C00B4C000
trusted library allocation
page read and write
3F4C000
heap
page read and write
134400221000
trusted library allocation
page read and write
1C39C2B0000
heap
page read and write
25C01988000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
7D4400290000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
26CF1B31000
heap
page read and write
3FA005BE000
trusted library allocation
page read and write
88581FE000
stack
page read and write
25C018B9000
trusted library allocation
page read and write
4E0C005DC000
trusted library allocation
page read and write
25C00B0C000
trusted library allocation
page read and write
25C003D4000
trusted library allocation
page read and write
26CF1B29000
heap
page read and write
25C018D8000
trusted library allocation
page read and write
181A000
heap
page read and write
3FDC000
heap
page read and write
7D4400185000
trusted library allocation
page read and write
26CF1B46000
heap
page read and write
17C4000
heap
page read and write
4E0C00174000
trusted library allocation
page read and write
4E0C01130000
trusted library allocation
page read and write
3FA0091F000
trusted library allocation
page read and write
25C01996000
trusted library allocation
page read and write
45A40027C000
trusted library allocation
page read and write
60EC00288000
trusted library allocation
page read and write
425000234000
direct allocation
page read and write
3EF4000
heap
page read and write
715C000
stack
page read and write
1DDC4540000
heap
page read and write
67600026C000
trusted library allocation
page read and write
4E0C007C8000
trusted library allocation
page read and write
26C83B45000
heap
page read and write
884B9FE000
unkown
page readonly
17F7000
heap
page read and write
88501FE000
stack
page read and write
1BE5B80A000
heap
page read and write
25C01984000
trusted library allocation
page read and write
7D44002A8000
trusted library allocation
page read and write
26C83A02000
heap
page read and write
7D44002A8000
trusted library allocation
page read and write
3FA008D6000
trusted library allocation
page read and write
130800198000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1B10000
heap
page read and write
26CF1B29000
heap
page read and write
1C39F2A4000
heap
page read and write
25C017B8000
trusted library allocation
page read and write
4E0C0025A000
trusted library allocation
page read and write
17E5000
heap
page read and write
1BE5B809000
heap
page read and write
332EFFE000
unkown
page readonly
7D44002A8000
trusted library allocation
page read and write
676000404000
trusted library allocation
page read and write
4E0C01040000
trusted library allocation
page read and write
77C8002C8000
trusted library allocation
page read and write
425000220000
direct allocation
page read and write
3FA005B2000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
14FA000
unkown
page write copy
FD775FE000
unkown
page readonly
25C003D4000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
4E0C0060C000
trusted library allocation
page read and write
3FBC000
heap
page read and write
568B0000
trusted library allocation
page read and write
39FC00871000
trusted library allocation
page read and write
78B000D52000
trusted library allocation
page read and write
FD715FE000
unkown
page readonly
7898000
heap
page read and write
3FA00514000
trusted library allocation
page read and write
39FC003B4000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1308000E4000
trusted library allocation
page read and write
3FC0000C000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
1D3000135000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
357C0020C000
trusted library allocation
page read and write
25C00884000
trusted library allocation
page read and write
25C01898000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
134400101000
trusted library allocation
page read and write
738000274000
trusted library allocation
page read and write
1BE5B80A000
heap
page read and write
130800368000
trusted library allocation
page read and write
25C01420000
trusted library allocation
page read and write
1BE5B826000
heap
page read and write
1BE5B811000
heap
page read and write
3FA00540000
trusted library allocation
page read and write
25C020DC000
trusted library allocation
page read and write
3C7D000
stack
page read and write
1BE5B825000
heap
page read and write
7D4400280000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
6B9D000
stack
page read and write
7D4400280000
trusted library allocation
page read and write
4250002CC000
direct allocation
page read and write
1BE5B82B000
heap
page read and write
25C006FC000
trusted library allocation
page read and write
72E1000
heap
page read and write
25C01801000
trusted library allocation
page read and write
25C01994000
trusted library allocation
page read and write
425000264000
direct allocation
page read and write
7D4400228000
trusted library allocation
page read and write
25C0144C000
trusted library allocation
page read and write
77D6000
heap
page read and write
3F06000
heap
page read and write
26CF1B29000
heap
page read and write
173C000
heap
page read and write
25C01960000
trusted library allocation
page read and write
25C00BAC000
trusted library allocation
page read and write
7D4400184000
trusted library allocation
page read and write
25C000418000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
46A000238000
trusted library allocation
page read and write
1C39C802000
heap
page read and write
25C015C2000
trusted library allocation
page read and write
25C01908000
trusted library allocation
page read and write
39FC008BC000
trusted library allocation
page read and write
25C020EF000
trusted library allocation
page read and write
37E0002A0000
trusted library allocation
page read and write
3FA00904000
trusted library allocation
page read and write
25C02100000
trusted library allocation
page read and write
77C8000
heap
page read and write
25C01914000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
1BE5B85A000
heap
page read and write
25C0092C000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
5E000007C000
trusted library allocation
page read and write
4E0C00A2B000
trusted library allocation
page read and write
568B8000
trusted library allocation
page read and write
25C013B1000
trusted library allocation
page read and write
4E0C0021C000
trusted library allocation
page read and write
26C9FD70000
unclassified section
page read and write
25C01984000
trusted library allocation
page read and write
25C019A4000
trusted library allocation
page read and write
25C01250000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1BE5B82B000
heap
page read and write
1DDC4543000
heap
page read and write
6CDD000
stack
page read and write
46A0002A0000
trusted library allocation
page read and write
25C00B68000
trusted library allocation
page read and write
5E000017C000
trusted library allocation
page read and write
1AF0000
heap
page read and write
72A5BF6000
stack
page read and write
25C00BD4000
trusted library allocation
page read and write
181A000
heap
page read and write
25C02048000
trusted library allocation
page read and write
130800044000
trusted library allocation
page read and write
26C83B90000
heap
page read and write
39FC00339000
trusted library allocation
page read and write
49E400101000
trusted library allocation
page read and write
3FA008DB000
trusted library allocation
page read and write
2DA000001000
trusted library allocation
page read and write
26C83B93000
heap
page read and write
39FC00654000
trusted library allocation
page read and write
17F8000
heap
page read and write
FD04FFE000
unkown
page readonly
191400254000
trusted library allocation
page read and write
134400321000
trusted library allocation
page read and write
4E0C00D30000
trusted library allocation
page read and write
25C0170C000
trusted library allocation
page read and write
17C4000
heap
page read and write
1C39C400000
heap
page read and write
3F08000
heap
page read and write
25C019B7000
trusted library allocation
page read and write
1809000
heap
page read and write
25C01871000
trusted library allocation
page read and write
4E0C00DC0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
25C00801000
trusted library allocation
page read and write
6F0C00288000
direct allocation
page read and write
25C01314000
trusted library allocation
page read and write
7D4400134000
trusted library allocation
page read and write
77C8000
heap
page read and write
39FC00A88000
trusted library allocation
page read and write
25C01706000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
1DDC4535000
heap
page read and write
FD0EFFE000
unkown
page readonly
4E0C00114000
trusted library allocation
page read and write
25C013D4000
trusted library allocation
page read and write
46A000274000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
46A0002D8000
trusted library allocation
page read and write
7944000
heap
page read and write
88551FE000
stack
page read and write
25C00A8A000
trusted library allocation
page read and write
25C01986000
trusted library allocation
page read and write
2EE400340000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
7D44002B2000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
78B00101B000
trusted library allocation
page read and write
1818000
heap
page read and write
25C00B45000
trusted library allocation
page read and write
25C012EC000
trusted library allocation
page read and write
1D3000336000
trusted library allocation
page read and write
25C00AD8000
trusted library allocation
page read and write
25C00E34000
trusted library allocation
page read and write
3F0F000
heap
page read and write
2EB400274000
direct allocation
page read and write
1D64002A0000
direct allocation
page read and write
9B81FE000
stack
page read and write
1BE5B82B000
heap
page read and write
39FC00878000
trusted library allocation
page read and write
3FA0092C000
trusted library allocation
page read and write
39FC00220000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
7D4400268000
trusted library allocation
page read and write
7D4400184000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
25C0198E000
trusted library allocation
page read and write
25C019AC000
trusted library allocation
page read and write
25C00A74000
trusted library allocation
page read and write
25C003EC000
trusted library allocation
page read and write
25C012C4000
trusted library allocation
page read and write
1060002B0000
direct allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
181A000
heap
page read and write
3337FFE000
unkown
page readonly
738000230000
trusted library allocation
page read and write
1D3000281000
trusted library allocation
page read and write
39FC00A2C000
trusted library allocation
page read and write
3FA00595000
trusted library allocation
page read and write
1DDC4541000
heap
page read and write
4E0C00FC4000
trusted library allocation
page read and write
25C01604000
trusted library allocation
page read and write
106000254000
direct allocation
page read and write
49E4001C1000
trusted library allocation
page read and write
1DDC4531000
heap
page read and write
25C0198C000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
1DDC9A70000
heap
page read and write
2EE400418000
trusted library allocation
page read and write
AF6000
stack
page read and write
676000290000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
7B1800238000
trusted library allocation
page read and write
4E0C002DF000
trusted library allocation
page read and write
39FC00366000
trusted library allocation
page read and write
13080012C000
trusted library allocation
page read and write
3FB6000
heap
page read and write
25C01942000
trusted library allocation
page read and write
2DA000024000
trusted library allocation
page read and write
25C01934000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
4E0C01034000
trusted library allocation
page read and write
1DDC454A000
heap
page read and write
25C019A8000
trusted library allocation
page read and write
7D440029C000
trusted library allocation
page read and write
134400481000
trusted library allocation
page read and write
7D44002D4000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
78B0010B7000
trusted library allocation
page read and write
45A4002B4000
trusted library allocation
page read and write
39FC0087B000
trusted library allocation
page read and write
55400238000
trusted library allocation
page read and write
4E0C00E27000
trusted library allocation
page read and write
3FA0088A000
trusted library allocation
page read and write
25C01996000
trusted library allocation
page read and write
25C02118000
trusted library allocation
page read and write
1BE5B825000
heap
page read and write
72FC00054000
trusted library allocation
page read and write
1BE5B80B000
heap
page read and write
180A000
heap
page read and write
25C02058000
trusted library allocation
page read and write
25C01340000
trusted library allocation
page read and write
25C00324000
trusted library allocation
page read and write
4E0C00750000
trusted library allocation
page read and write
3FA00482000
trusted library allocation
page read and write
3F89000
heap
page read and write
73E0000
trusted library allocation
page read and write
25C01988000
trusted library allocation
page read and write
1D30003CC000
trusted library allocation
page read and write
3F0D000
heap
page read and write
1660000
trusted library allocation
page read and write
17BE000
heap
page read and write
1BE5B809000
heap
page read and write
1813000
heap
page read and write
25C00BE4000
trusted library allocation
page read and write
39FC0060C000
trusted library allocation
page read and write
26CF1B2F000
heap
page read and write
7D4400124000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
7D44002B2000
trusted library allocation
page read and write
1D3000130000
trusted library allocation
page read and write
26CF1B27000
heap
page read and write
25C00CFC000
trusted library allocation
page read and write
1B57EE5A000
heap
page read and write
17C5000
heap
page read and write
25C012A0000
trusted library allocation
page read and write
25C01950000
trusted library allocation
page read and write
1B5AD64B000
heap
page read and write
25C019A4000
trusted library allocation
page read and write
25C00888000
trusted library allocation
page read and write
25C0031F000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
3FA005EB000
trusted library allocation
page read and write
25C008AB000
trusted library allocation
page read and write
40A400274000
trusted library allocation
page read and write
60EC00244000
trusted library allocation
page read and write
3F36000
heap
page read and write
3A4B7FC000
stack
page read and write
37E0002A0000
trusted library allocation
page read and write
6760002F8000
trusted library allocation
page read and write
173F000
heap
page read and write
25C00BC0000
trusted library allocation
page read and write
77C800404000
trusted library allocation
page read and write
4E0C00C5E000
trusted library allocation
page read and write
25C009E0000
trusted library allocation
page read and write
77C8002A4000
trusted library allocation
page read and write
3FA003C2000
trusted library allocation
page read and write
4E0C00D4C000
trusted library allocation
page read and write
2A400183000
trusted library allocation
page read and write
17C2000
heap
page read and write
25C01450000
trusted library allocation
page read and write
25C01954000
trusted library allocation
page read and write
4C5000250000
direct allocation
page read and write
1C39C710000
heap
page read and write
1BE5B811000
heap
page read and write
1DDC4546000
heap
page read and write
17C8000
heap
page read and write
39FC00A5A000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
7D4400254000
trusted library allocation
page read and write
333A7FE000
stack
page read and write
25C019B8000
trusted library allocation
page read and write
1762000
heap
page read and write
77FA000
heap
page read and write
6F0C002A4000
direct allocation
page read and write
367C00314000
direct allocation
page read and write
1D6400250000
direct allocation
page read and write
106C002C0000
trusted library allocation
page read and write
25C019B0000
trusted library allocation
page read and write
4E0C010FC000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
1DDC4544000
heap
page read and write
1BE5B80A000
heap
page read and write
1BE5B811000
heap
page read and write
40A400258000
trusted library allocation
page read and write
4E0C00E74000
trusted library allocation
page read and write
25C00201000
trusted library allocation
page read and write
173B000
heap
page read and write
25C003E0000
trusted library allocation
page read and write
1BE5B82B000
heap
page read and write
19799202000
heap
page read and write
3324002A4000
trusted library allocation
page read and write
25C003E0000
trusted library allocation
page read and write
25C0192E000
trusted library allocation
page read and write
25C00B44000
trusted library allocation
page read and write
26CF1B34000
heap
page read and write
1BE5B80F000
heap
page read and write
3F0D000
heap
page read and write
733E000
heap
page read and write
17A9000
heap
page read and write
25C01601000
trusted library allocation
page read and write
FD0DFFE000
unkown
page readonly
26C83A00000
heap
page read and write
4E0C0068D000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
1BE5B811000
heap
page read and write
25C00730000
trusted library allocation
page read and write
72A7BFF000
stack
page read and write
25C006C4000
trusted library allocation
page read and write
1D3000024000
trusted library allocation
page read and write
17E7000
heap
page read and write
25C02108000
trusted library allocation
page read and write
3FA00002000
trusted library allocation
page readonly
26CF1AE2000
heap
page read and write
25C02164000
trusted library allocation
page read and write
1B5AD520000
heap
page read and write
56910000
trusted library allocation
page read and write
1BE5B80F000
heap
page read and write
26C85422000
trusted library allocation
page read and write
2EB4002A0000
direct allocation
page read and write
4E0C004C0000
trusted library allocation
page read and write
3FA00613000
trusted library allocation
page read and write
7D440027A000
trusted library allocation
page read and write
1DDC9A46000
heap
page read and write
1B5AD640000
heap
page read and write
77C1000
heap
page read and write
40A4002A4000
trusted library allocation
page read and write
25C02001000
trusted library allocation
page read and write
7D440027E000
trusted library allocation
page read and write
25C0199C000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
2EB4002D0000
direct allocation
page read and write
4E0C00158000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
1B64002B8000
direct allocation
page read and write
25C019B4000
trusted library allocation
page read and write
25C00A38000
trusted library allocation
page read and write
7D4400278000
trusted library allocation
page read and write
25C00BA8000
trusted library allocation
page read and write
4E0C002DC000
trusted library allocation
page read and write
1829000
heap
page read and write
25C01998000
trusted library allocation
page read and write
25C0196C000
trusted library allocation
page read and write
1D3000198000
trusted library allocation
page read and write
7D44002B8000
trusted library allocation
page read and write
72F1000
heap
page read and write
25C00B0C000
trusted library allocation
page read and write
39FC002C8000
trusted library allocation
page read and write
25C0198C000
trusted library allocation
page read and write
73040030C000
direct allocation
page read and write
1C39F258000
heap
page read and write
1C39F300000
heap
page read and write
25C018C4000
trusted library allocation
page read and write
3FA0052C000
trusted library allocation
page read and write
357C00278000
trusted library allocation
page read and write
25C000408000
trusted library allocation
page read and write
39FC008A4000
trusted library allocation
page read and write
49E400161000
trusted library allocation
page read and write
3324002C4000
trusted library allocation
page read and write
26CF1B41000
heap
page read and write
56971000
trusted library allocation
page read and write
25C01940000
trusted library allocation
page read and write
1BE5B824000
heap
page read and write
25C020FD000
trusted library allocation
page read and write
25C009EC000
trusted library allocation
page read and write
25C012D4000
trusted library allocation
page read and write
1D3000150000
trusted library allocation
page read and write
7D4400290000
trusted library allocation
page read and write
67600033C000
trusted library allocation
page read and write
25C000240000
trusted library allocation
page read and write
78E2000
heap
page read and write
3FA001C2000
trusted library allocation
page read and write
45A4002A4000
trusted library allocation
page read and write
25C019A0000
trusted library allocation
page read and write
1BE5B809000
heap
page read and write
There are 6802 hidden memdumps, click here to show them.