Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LkCinYWgNh.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LkCinYWgNh.exe_b78ee6e1254ac013b6759d849c766ab0c674b17_827300c8_171ce87b-9a06-400e-a499-b0f4ffd39415\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6174.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Oct 27 12:12:29 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62BE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62ED.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jwDqhXNxeUGDiYzIXhpX.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
Chrome Cache Entry: 57
|
ASCII text, with very long lines (810)
|
downloaded
|
||
Chrome Cache Entry: 58
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 59
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 60
|
ASCII text
|
downloaded
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LkCinYWgNh.exe
|
"C:\Users\user\Desktop\LkCinYWgNh.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2412,i,7128520521350205955,4672858383650437130,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 760
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
QUERY|rd|AAAA|IN|home.tventji20vs.top
|
|||
http://tventji20vs.top/v1/upload.php
|
147.45.48.137
|
||
tventji20vs.top
|
|||
ventji20vs.top
|
|||
QUERY|rd|A|IN|home.tventji20vs.top
|
|||
.1.1home.tventji20vs.top
|
|||
analforeverlovyu.top
|
|||
http://home.tventji20vs.top/NWYJPzCYEvZpxoyKvBIK1729953292
|
147.45.48.137
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/Char9e3
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/4324%
|
unknown
|
||
http://anglebug.com/7724B
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/6439il
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://anglebug.com/4966n
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
HTTP://tventji20vs.top/v1/upload.php
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://chrome.google.com/webstore?hl=en%
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.tventji20vs.top
|
147.45.48.137
|
||
tventji20vs.top
|
147.45.48.137
|
||
www.google.com
|
172.217.16.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.45.48.137
|
home.tventji20vs.top
|
Russian Federation
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.16.196
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
ProgramId
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
FileId
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
LongPathHash
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Name
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
OriginalFileName
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Publisher
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Version
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
BinFileVersion
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
BinaryType
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
ProductName
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
ProductVersion
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
LinkDate
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
BinProductVersion
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
AppxPackageFullName
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Size
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Language
|
||
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3E73000
|
heap
|
page read and write
|
||
4F0000760000
|
trusted library allocation
|
page read and write
|
||
275DFFE0000
|
trusted library section
|
page read and write
|
||
3BB002710000
|
trusted library allocation
|
page read and write
|
||
3BB003034000
|
trusted library allocation
|
page read and write
|
||
3BB002854000
|
trusted library allocation
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
19FC000
|
heap
|
page read and write
|
||
D3AC7FE000
|
unkown
|
page readonly
|
||
3BB0034AC000
|
trusted library allocation
|
page read and write
|
||
4F0000614000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
unkown
|
page write copy
|
||
3BB000001000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
3BB00253C000
|
trusted library allocation
|
page read and write
|
||
3BB00253C000
|
trusted library allocation
|
page read and write
|
||
275D5A60000
|
heap
|
page read and write
|
||
1981000
|
heap
|
page read and write
|
||
14FF000
|
heap
|
page read and write
|
||
1DBC00278000
|
trusted library allocation
|
page read and write
|
||
3BB002F94000
|
trusted library allocation
|
page read and write
|
||
4F0000390000
|
trusted library allocation
|
page read and write
|
||
4F0000330000
|
trusted library allocation
|
page read and write
|
||
69CC1000
|
direct allocation
|
page execute read
|
||
3BB00042E000
|
trusted library allocation
|
page read and write
|
||
D398FFC000
|
stack
|
page read and write
|
||
3BB0028EC000
|
trusted library allocation
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
4F00002F4000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
3CFC000
|
heap
|
page read and write
|
||
D38B7FE000
|
unkown
|
page readonly
|
||
3AE6000
|
heap
|
page read and write
|
||
275D94F0000
|
trusted library section
|
page read and write
|
||
D3957FE000
|
unkown
|
page readonly
|
||
3AE5000
|
heap
|
page read and write
|
||
275DFB90000
|
trusted library section
|
page read and write
|
||
275D5AE5000
|
heap
|
page read and write
|
||
3BC3000
|
heap
|
page read and write
|
||
1A14000
|
heap
|
page read and write
|
||
6A2BE000
|
direct allocation
|
page read and write
|
||
3BB0029AC000
|
trusted library allocation
|
page read and write
|
||
6C741000
|
unkown
|
page execute read
|
||
3BB003120000
|
trusted library allocation
|
page read and write
|
||
4F0000418000
|
trusted library allocation
|
page read and write
|
||
D389FFB000
|
stack
|
page read and write
|
||
D3847FE000
|
unkown
|
page readonly
|
||
3B83000
|
heap
|
page read and write
|
||
3BBF000
|
heap
|
page read and write
|
||
4F000080C000
|
trusted library allocation
|
page read and write
|
||
4F000035C000
|
trusted library allocation
|
page read and write
|
||
3BB003058000
|
trusted library allocation
|
page read and write
|
||
3BB00253C000
|
trusted library allocation
|
page read and write
|
||
4F000033C000
|
trusted library allocation
|
page read and write
|
||
3AE2000
|
heap
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
117800250000
|
direct allocation
|
page read and write
|
||
275D80A0000
|
unkown
|
page read and write
|
||
D39CFFC000
|
stack
|
page read and write
|
||
D3A17FE000
|
unkown
|
page readonly
|
||
D39AFFB000
|
stack
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
D380FFD000
|
unkown
|
page read and write
|
||
3BB0031B4000
|
trusted library allocation
|
page read and write
|
||
3BB003158000
|
trusted library allocation
|
page read and write
|
||
1DBC00288000
|
trusted library allocation
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
3BB003314000
|
trusted library allocation
|
page read and write
|
||
3BB003258000
|
trusted library allocation
|
page read and write
|
||
3AED000
|
heap
|
page read and write
|
||
275D588C000
|
heap
|
page read and write
|
||
1DBC0020C000
|
trusted library allocation
|
page read and write
|
||
3BB000A01000
|
trusted library allocation
|
page read and write
|
||
4F0000640000
|
trusted library allocation
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
9A1000
|
unkown
|
page execute read
|
||
3BB002EF4000
|
trusted library allocation
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
3BB000166000
|
trusted library allocation
|
page read and write
|
||
3BB002BB0000
|
trusted library allocation
|
page read and write
|
||
3BB0023D8000
|
trusted library allocation
|
page read and write
|
||
3BB0025CC000
|
trusted library allocation
|
page read and write
|
||
3BB000801000
|
trusted library allocation
|
page read and write
|
||
3BB0026D0000
|
trusted library allocation
|
page read and write
|
||
3BB003104000
|
trusted library allocation
|
page read and write
|
||
6A0F9000
|
direct allocation
|
page read and write
|
||
3BB0023F0000
|
trusted library allocation
|
page read and write
|
||
3BB003120000
|
trusted library allocation
|
page read and write
|
||
D3A67FE000
|
unkown
|
page readonly
|
||
275D5903000
|
heap
|
page read and write
|
||
4F00006EC000
|
trusted library allocation
|
page read and write
|
||
D38BFFC000
|
stack
|
page read and write
|
||
275DF43D000
|
trusted library section
|
page read and write
|
||
3B8F000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
4F00006D0000
|
trusted library allocation
|
page read and write
|
||
1DBC002C8000
|
trusted library allocation
|
page read and write
|
||
3BB002414000
|
trusted library allocation
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
heap
|
page read and write
|
||
E53000
|
unkown
|
page write copy
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
19FB000
|
heap
|
page read and write
|
||
3BA6000
|
heap
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
3AED000
|
heap
|
page read and write
|
||
1981000
|
heap
|
page read and write
|
||
6C869000
|
unkown
|
page read and write
|
||
4F00006D4000
|
trusted library allocation
|
page read and write
|
||
19EB000
|
heap
|
page read and write
|
||
117800303000
|
direct allocation
|
page read and write
|
||
3AE0000
|
heap
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
E52000
|
unkown
|
page write copy
|
||
4F0000230000
|
trusted library allocation
|
page read and write
|
||
3BB00221C000
|
trusted library allocation
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
4F0000404000
|
trusted library allocation
|
page read and write
|
||
3BB002B6F000
|
trusted library allocation
|
page read and write
|
||
117800234000
|
direct allocation
|
page read and write
|
||
275D8EA9000
|
heap
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
4F0000730000
|
trusted library allocation
|
page read and write
|
||
3BB00292D000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
275DF8D0000
|
trusted library section
|
page read and write
|
||
D3927FE000
|
unkown
|
page readonly
|
||
3AEB000
|
heap
|
page read and write
|
||
3BB0023EC000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
275D587B000
|
heap
|
page read and write
|
||
D394FFE000
|
stack
|
page read and write
|
||
3BB002E8C000
|
trusted library allocation
|
page read and write
|
||
3BB000A94000
|
trusted library allocation
|
page read and write
|
||
3B9A000
|
heap
|
page read and write
|
||
D399FFA000
|
stack
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
275DCFB0000
|
trusted library section
|
page read and write
|
||
3BB002994000
|
trusted library allocation
|
page read and write
|
||
1981000
|
heap
|
page read and write
|
||
3BB002F30000
|
trusted library allocation
|
page read and write
|
||
3BB00260C000
|
trusted library allocation
|
page read and write
|
||
3BB00229C000
|
trusted library allocation
|
page read and write
|
||
D3A5FFD000
|
stack
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
3BB0024B8000
|
trusted library allocation
|
page read and write
|
||
1A0A000
|
heap
|
page read and write
|
||
4F0000750000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
3BB002AC0000
|
trusted library allocation
|
page read and write
|
||
D3A97FE000
|
stack
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3BB002500000
|
trusted library allocation
|
page read and write
|
||
4F0000354000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
275DDE43000
|
heap
|
page read and write
|
||
275DD1D2000
|
trusted library allocation
|
page read and write
|
||
4F0000658000
|
trusted library allocation
|
page read and write
|
||
D3A6FFE000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
275DDE40000
|
heap
|
page read and write
|
||
3BB0022DC000
|
trusted library allocation
|
page read and write
|
||
275D5870000
|
heap
|
page read and write
|
||
4F0000248000
|
trusted library allocation
|
page read and write
|
||
3BB003220000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
heap
|
page read and write
|
||
1B8E000
|
heap
|
page read and write
|
||
3BB002A9C000
|
trusted library allocation
|
page read and write
|
||
3BB00235C000
|
trusted library allocation
|
page read and write
|
||
3BB003320000
|
trusted library allocation
|
page read and write
|
||
3BB003314000
|
trusted library allocation
|
page read and write
|
||
3BB0023F4000
|
trusted library allocation
|
page read and write
|
||
3BB0029F0000
|
trusted library allocation
|
page read and write
|
||
6C81F000
|
unkown
|
page readonly
|
||
1576000
|
heap
|
page read and write
|
||
3BB003120000
|
trusted library allocation
|
page read and write
|
||
275D7650000
|
heap
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3BB002580000
|
trusted library allocation
|
page read and write
|
||
11780025C000
|
direct allocation
|
page read and write
|
||
D3817FE000
|
unkown
|
page readonly
|
||
3BB002B38000
|
trusted library allocation
|
page read and write
|
||
3BB003390000
|
trusted library allocation
|
page read and write
|
||
275D93A0000
|
heap
|
page read and write
|
||
4F0000330000
|
trusted library allocation
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
9AE000
|
unkown
|
page read and write
|
||
D3A57FE000
|
unkown
|
page readonly
|
||
E3D000
|
unkown
|
page readonly
|
||
4F0000704000
|
trusted library allocation
|
page read and write
|
||
1981000
|
heap
|
page read and write
|
||
4F00006CC000
|
trusted library allocation
|
page read and write
|
||
1BF0000
|
heap
|
page read and write
|
||
1BFA000
|
heap
|
page read and write
|
||
275DFBF0000
|
trusted library section
|
page read and write
|
||
117800284000
|
direct allocation
|
page read and write
|
||
19FA000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
3BB002530000
|
trusted library allocation
|
page read and write
|
||
3BB002E84000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
D3887FE000
|
unkown
|
page readonly
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
3BB002D3C000
|
trusted library allocation
|
page read and write
|
||
3BB002B1C000
|
trusted library allocation
|
page read and write
|
||
D3947FE000
|
unkown
|
page readonly
|
||
3BB002E68000
|
trusted library allocation
|
page read and write
|
||
3BB0028A4000
|
trusted library allocation
|
page read and write
|
||
3BB002905000
|
trusted library allocation
|
page read and write
|
||
1546000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
11780024C000
|
direct allocation
|
page read and write
|
||
6A629000
|
direct allocation
|
page readonly
|
||
1545000
|
heap
|
page read and write
|
||
275D8EB2000
|
heap
|
page read and write
|
||
3BB003164000
|
trusted library allocation
|
page read and write
|
||
3BB0023E0000
|
trusted library allocation
|
page read and write
|
||
D39EFFB000
|
stack
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3BB002430000
|
trusted library allocation
|
page read and write
|
||
4F0000648000
|
trusted library allocation
|
page read and write
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
3BB002EFC000
|
trusted library allocation
|
page read and write
|
||
3B72000
|
heap
|
page read and write
|
||
3BB002CE0000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
stack
|
page read and write
|
||
275D9470000
|
heap
|
page read and write
|
||
3BB003288000
|
trusted library allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
3BB002F60000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
154C000
|
heap
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
1DBC002B0000
|
trusted library allocation
|
page read and write
|
||
4F00007B4000
|
trusted library allocation
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
4F0000348000
|
trusted library allocation
|
page read and write
|
||
3BDD000
|
heap
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
4F0000788000
|
trusted library allocation
|
page read and write
|
||
1178002DC000
|
direct allocation
|
page read and write
|
||
1178002D0000
|
direct allocation
|
page read and write
|
||
D3977FE000
|
unkown
|
page readonly
|
||
1DBC002A0000
|
trusted library allocation
|
page read and write
|
||
3BB002550000
|
trusted library allocation
|
page read and write
|
||
3BB0028FC000
|
trusted library allocation
|
page read and write
|
||
1DBC00250000
|
trusted library allocation
|
page read and write
|
||
D390FFA000
|
stack
|
page read and write
|
||
3BB002580000
|
trusted library allocation
|
page read and write
|
||
3BB0030FC000
|
trusted library allocation
|
page read and write
|
||
3BB002924000
|
trusted library allocation
|
page read and write
|
||
4F0000310000
|
trusted library allocation
|
page read and write
|
||
4F0000210000
|
trusted library allocation
|
page read and write
|
||
3BB00240C000
|
trusted library allocation
|
page read and write
|
||
3BB002FD4000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
3BB002F0C000
|
trusted library allocation
|
page read and write
|
||
3BB0032F0000
|
trusted library allocation
|
page read and write
|
||
3BB002434000
|
trusted library allocation
|
page read and write
|
||
D38DFFE000
|
stack
|
page read and write
|
||
D39F7FE000
|
unkown
|
page readonly
|
||
275E01E0000
|
trusted library section
|
page read and write
|
||
3BB0027B8000
|
trusted library allocation
|
page read and write
|
||
275D9415000
|
heap
|
page read and write
|
||
275DFFEE000
|
trusted library section
|
page read and write
|
||
4F0000734000
|
trusted library allocation
|
page read and write
|
||
14FD000
|
heap
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
6A0BA000
|
direct allocation
|
page read and write
|
||
4F0000374000
|
trusted library allocation
|
page read and write
|
||
3BB002E64000
|
trusted library allocation
|
page read and write
|
||
D38E7FE000
|
unkown
|
page readonly
|
||
275D7653000
|
heap
|
page read and write
|
||
3BB00318C000
|
trusted library allocation
|
page read and write
|
||
275D9470000
|
heap
|
page read and write
|
||
D38FFFD000
|
stack
|
page read and write
|
||
3BB002FE0000
|
trusted library allocation
|
page read and write
|
||
D38EFFE000
|
stack
|
page read and write
|
||
4F00006E4000
|
trusted library allocation
|
page read and write
|
||
D3A3FFD000
|
stack
|
page read and write
|
||
D3AEFFD000
|
stack
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
D387FFC000
|
stack
|
page read and write
|
||
9AA000
|
unkown
|
page readonly
|
||
3BE6000
|
heap
|
page read and write
|
||
3BB0031DC000
|
trusted library allocation
|
page read and write
|
||
4F0000610000
|
trusted library allocation
|
page read and write
|
||
D3917FE000
|
unkown
|
page readonly
|
||
3BB0024A8000
|
trusted library allocation
|
page read and write
|
||
275D5A40000
|
heap
|
page read and write
|
||
3BB002564000
|
trusted library allocation
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
D38D7FE000
|
unkown
|
page readonly
|
||
4F0000401000
|
trusted library allocation
|
page read and write
|
||
3BB002CCC000
|
trusted library allocation
|
page read and write
|
||
3AED000
|
heap
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
3BB0024B4000
|
trusted library allocation
|
page read and write
|
||
1541000
|
heap
|
page read and write
|
||
D382FFE000
|
stack
|
page read and write
|
||
3BB0027E0000
|
trusted library allocation
|
page read and write
|
||
275D5925000
|
heap
|
page read and write
|
||
D38C7FE000
|
unkown
|
page readonly
|
||
4F0000724000
|
trusted library allocation
|
page read and write
|
||
472B000
|
heap
|
page read and write
|
||
3BB002D1C000
|
trusted library allocation
|
page read and write
|
||
3BB0025D1000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
3BB002D58000
|
trusted library allocation
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
275D9460000
|
heap
|
page read and write
|
||
3BB002980000
|
trusted library allocation
|
page read and write
|
||
4F0000684000
|
trusted library allocation
|
page read and write
|
||
275D9451000
|
heap
|
page read and write
|
||
275D9424000
|
heap
|
page read and write
|
||
3BB002E01000
|
trusted library allocation
|
page read and write
|
||
3BB0023A0000
|
trusted library allocation
|
page read and write
|
||
3BB002BF4000
|
trusted library allocation
|
page read and write
|
||
275D9405000
|
heap
|
page read and write
|
||
275DFCDD000
|
trusted library section
|
page read and write
|
||
3BB002C30000
|
trusted library allocation
|
page read and write
|
||
275D5907000
|
heap
|
page read and write
|
||
3BB0030D0000
|
trusted library allocation
|
page read and write
|
||
D3A07FE000
|
unkown
|
page readonly
|
||
1A11000
|
heap
|
page read and write
|
||
3E70000
|
heap
|
page read and write
|
||
3BB002D98000
|
trusted library allocation
|
page read and write
|
||
275D5920000
|
heap
|
page read and write
|
||
3BB0003AA000
|
trusted library allocation
|
page read and write
|
||
D3A0FFE000
|
stack
|
page read and write
|
||
3AE5000
|
heap
|
page read and write
|
||
3BB003110000
|
trusted library allocation
|
page read and write
|
||
3BB002510000
|
trusted library allocation
|
page read and write
|
||
EB16000
|
heap
|
page read and write
|
||
4F0000330000
|
trusted library allocation
|
page read and write
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
D3A4FFE000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
3BB002401000
|
trusted library allocation
|
page read and write
|
||
1A08000
|
heap
|
page read and write
|
||
3BB002884000
|
trusted library allocation
|
page read and write
|
||
159C000
|
heap
|
page read and write
|
||
4F0000601000
|
trusted library allocation
|
page read and write
|
||
D3A9FFE000
|
unkown
|
page readonly
|
||
3BB00349C000
|
trusted library allocation
|
page read and write
|
||
3BB002420000
|
trusted library allocation
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
3AE3000
|
heap
|
page read and write
|
||
3BB000401000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
3BB0030D8000
|
trusted library allocation
|
page read and write
|
||
D3A77FE000
|
unkown
|
page readonly
|
||
4F0000758000
|
trusted library allocation
|
page read and write
|
||
19EC000
|
heap
|
page read and write
|
||
275D945F000
|
heap
|
page read and write
|
||
3BB9000
|
heap
|
page read and write
|
||
3BB002F94000
|
trusted library allocation
|
page read and write
|
||
3BB002B5C000
|
trusted library allocation
|
page read and write
|
||
1BF4000
|
heap
|
page read and write
|
||
153E000
|
heap
|
page read and write
|
||
3AED000
|
heap
|
page read and write
|
||
3BB002F40000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
unkown
|
page readonly
|
||
3BB00255C000
|
trusted library allocation
|
page read and write
|
||
3BB002324000
|
trusted library allocation
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
275DF393000
|
trusted library section
|
page read and write
|
||
3BAE000
|
heap
|
page read and write
|
||
4F0000744000
|
trusted library allocation
|
page read and write
|
||
3BB0024A8000
|
trusted library allocation
|
page read and write
|
||
3BB002A0C000
|
trusted library allocation
|
page read and write
|
||
D39A7FE000
|
unkown
|
page readonly
|
||
3BB002F23000
|
trusted library allocation
|
page read and write
|
||
3BB002E8C000
|
trusted library allocation
|
page read and write
|
||
4F00002ED000
|
trusted library allocation
|
page read and write
|
||
4F00006B8000
|
trusted library allocation
|
page read and write
|
||
275D9455000
|
heap
|
page read and write
|
||
3BB002418000
|
trusted library allocation
|
page read and write
|
||
19AB000
|
heap
|
page read and write
|
||
1A1F000
|
heap
|
page read and write
|
||
4F0000354000
|
trusted library allocation
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
3AE0000
|
heap
|
page read and write
|
||
3BB003378000
|
trusted library allocation
|
page read and write
|
||
6A6EE000
|
direct allocation
|
page read and write
|
||
1178002A8000
|
direct allocation
|
page read and write
|
||
3BB0023B4000
|
trusted library allocation
|
page read and write
|
||
D3AB7FE000
|
unkown
|
page readonly
|
||
1BA7000
|
heap
|
page read and write
|
||
3BB0023D4000
|
trusted library allocation
|
page read and write
|
||
3BB002F20000
|
trusted library allocation
|
page read and write
|
||
1DBC002BD000
|
trusted library allocation
|
page read and write
|
||
3BB003138000
|
trusted library allocation
|
page read and write
|
||
275D8EB3000
|
heap
|
page read and write
|
||
3BB003048000
|
trusted library allocation
|
page read and write
|
||
E57000
|
unkown
|
page readonly
|
||
3BB0029A0000
|
trusted library allocation
|
page read and write
|
||
3BB002F0C000
|
trusted library allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
3BB000F7C000
|
trusted library allocation
|
page read and write
|
||
3BB0032B4000
|
trusted library allocation
|
page read and write
|
||
4F00002FC000
|
trusted library allocation
|
page read and write
|
||
3BB0033C0000
|
trusted library allocation
|
page read and write
|
||
275DF320000
|
trusted library section
|
page read and write
|
||
D38AFFB000
|
stack
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
275DFC13000
|
trusted library section
|
page read and write
|
||
3BB002428000
|
trusted library allocation
|
page read and write
|
||
6A321000
|
direct allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
3BB1000
|
heap
|
page read and write
|
||
D02000
|
unkown
|
page write copy
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
3BB002410000
|
trusted library allocation
|
page read and write
|
||
D39DFFD000
|
stack
|
page read and write
|
||
4F000075C000
|
trusted library allocation
|
page read and write
|
||
1178002E4000
|
direct allocation
|
page read and write
|
||
D3A87FD000
|
stack
|
page read and write
|
||
3BB0024AA000
|
trusted library allocation
|
page read and write
|
||
3BB0025DC000
|
trusted library allocation
|
page read and write
|
||
3B9C000
|
heap
|
page read and write
|
||
4F00006E0000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
unkown
|
page write copy
|
||
4F000033C000
|
trusted library allocation
|
page read and write
|
||
1DBC00294000
|
trusted library allocation
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
11780020C000
|
direct allocation
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
1DBC002A0000
|
trusted library allocation
|
page read and write
|
||
117800280000
|
direct allocation
|
page read and write
|
||
3BB0025A4000
|
trusted library allocation
|
page read and write
|
||
4F0000770000
|
trusted library allocation
|
page read and write
|
||
6A326000
|
direct allocation
|
page read and write
|
||
3BB002801000
|
trusted library allocation
|
page read and write
|
||
3BB002530000
|
trusted library allocation
|
page read and write
|
||
1DBC00220000
|
trusted library allocation
|
page read and write
|
||
1579000
|
heap
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
4F00007CC000
|
trusted library allocation
|
page read and write
|
||
275DF432000
|
trusted library section
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
3BB003104000
|
trusted library allocation
|
page read and write
|
||
3BB0024B8000
|
trusted library allocation
|
page read and write
|
||
3BB003148000
|
trusted library allocation
|
page read and write
|
||
D386FFB000
|
stack
|
page read and write
|
||
4F0000320000
|
trusted library allocation
|
page read and write
|
||
3BB0022EC000
|
trusted library allocation
|
page read and write
|
||
4F0000368000
|
trusted library allocation
|
page read and write
|
||
3BB0024F3000
|
trusted library allocation
|
page read and write
|
||
1DBC002C0000
|
trusted library allocation
|
page read and write
|
||
4F0000664000
|
trusted library allocation
|
page read and write
|
||
1BA1000
|
heap
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
3BB9000
|
heap
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
3BB002F6C000
|
trusted library allocation
|
page read and write
|
||
4F000069C000
|
trusted library allocation
|
page read and write
|
||
4F00002E4000
|
trusted library allocation
|
page read and write
|
||
3BB0025D7000
|
trusted library allocation
|
page read and write
|
||
3C04000
|
heap
|
page read and write
|
||
D3A47FE000
|
unkown
|
page readonly
|
||
6A309000
|
direct allocation
|
page read and write
|
||
D3AF7FE000
|
unkown
|
page readonly
|
||
3BB0023F4000
|
trusted library allocation
|
page read and write
|
||
3BB0026EC000
|
trusted library allocation
|
page read and write
|
||
D3AAFFE000
|
unkown
|
page readonly
|
||
14BE000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
19F7000
|
heap
|
page read and write
|
||
3BB002E0C000
|
trusted library allocation
|
page read and write
|
||
3BB00340C000
|
trusted library allocation
|
page read and write
|
||
D3897FE000
|
unkown
|
page readonly
|
||
4F0000380000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
heap
|
page read and write
|
||
117800290000
|
direct allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
3BB002EF4000
|
trusted library allocation
|
page read and write
|
||
3BB002544000
|
trusted library allocation
|
page read and write
|
||
D3ABFFB000
|
stack
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
D3937FE000
|
unkown
|
page readonly
|
||
3BE7000
|
heap
|
page read and write
|
||
275DFB70000
|
trusted library section
|
page read and write
|
||
3BB002EC8000
|
trusted library allocation
|
page read and write
|
||
F1B000
|
stack
|
page read and write
|
||
3BB000201000
|
trusted library allocation
|
page read and write
|
||
154C000
|
heap
|
page read and write
|
||
1178002EC000
|
direct allocation
|
page read and write
|
||
3AE5000
|
heap
|
page read and write
|
||
4F00007C8000
|
trusted library allocation
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
3AE6000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
3BB002934000
|
trusted library allocation
|
page read and write
|
||
3BB00305C000
|
trusted library allocation
|
page read and write
|
||
275DD6E0000
|
heap
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
3BB002894000
|
trusted library allocation
|
page read and write
|
||
3BB002929000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
275D947F000
|
heap
|
page read and write
|
||
2E9A000
|
stack
|
page read and write
|
||
D04000
|
unkown
|
page readonly
|
||
1A3C000
|
heap
|
page read and write
|
||
3BB002BE8000
|
trusted library allocation
|
page read and write
|
||
3B9B000
|
heap
|
page read and write
|
||
3BB003024000
|
trusted library allocation
|
page read and write
|
||
1DBC00264000
|
trusted library allocation
|
page read and write
|
||
275DF2F0000
|
trusted library section
|
page read and write
|
||
3BB002B78000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
117800217000
|
direct allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
3D2B000
|
heap
|
page read and write
|
||
117800294000
|
direct allocation
|
page read and write
|
||
3BB0023E4000
|
trusted library allocation
|
page read and write
|
||
3BA8000
|
heap
|
page read and write
|
||
D3AD7FE000
|
unkown
|
page readonly
|
||
275D8EB6000
|
heap
|
page read and write
|
||
275D5A80000
|
trusted library allocation
|
page read and write
|
||
275D9483000
|
heap
|
page read and write
|
||
3BB003278000
|
trusted library allocation
|
page read and write
|
||
3BB000601000
|
trusted library allocation
|
page read and write
|
||
275DFBA2000
|
trusted library section
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
4F0000688000
|
trusted library allocation
|
page read and write
|
||
3BB0023C4000
|
trusted library allocation
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
4F000078C000
|
trusted library allocation
|
page read and write
|
||
3BB002658000
|
trusted library allocation
|
page read and write
|
||
69CC0000
|
direct allocation
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
4F00006C8000
|
trusted library allocation
|
page read and write
|
||
3CD9000
|
heap
|
page read and write
|
||
3BB00247C000
|
trusted library allocation
|
page read and write
|
||
4F0000310000
|
trusted library allocation
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
304F000
|
unkown
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
4F000020C000
|
trusted library allocation
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
4F00006E8000
|
trusted library allocation
|
page read and write
|
||
3BB002918000
|
trusted library allocation
|
page read and write
|
||
1DBC002C0000
|
trusted library allocation
|
page read and write
|
||
3BB002814000
|
trusted library allocation
|
page read and write
|
||
3BB002E48000
|
trusted library allocation
|
page read and write
|
||
3BB0023DC000
|
trusted library allocation
|
page read and write
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
6C740000
|
unkown
|
page readonly
|
||
3AE5000
|
heap
|
page read and write
|
||
275DFB67000
|
unclassified section
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
154A000
|
heap
|
page read and write
|
||
4F0000320000
|
trusted library allocation
|
page read and write
|
||
3BB002AF0000
|
trusted library allocation
|
page read and write
|
||
3BB002EB0000
|
trusted library allocation
|
page read and write
|
||
3BB002490000
|
trusted library allocation
|
page read and write
|
||
3BB003104000
|
trusted library allocation
|
page read and write
|
||
3BB0027CC000
|
trusted library allocation
|
page read and write
|
||
D396FFC000
|
stack
|
page read and write
|
||
3BB003138000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
9AE000
|
unkown
|
page write copy
|
||
19FB000
|
heap
|
page read and write
|
||
D04000
|
unkown
|
page readonly
|
||
3BB002F14000
|
trusted library allocation
|
page read and write
|
||
4F0000250000
|
trusted library allocation
|
page read and write
|
||
275D592A000
|
heap
|
page read and write
|
||
3BB00304C000
|
trusted library allocation
|
page read and write
|
||
6C86C000
|
unkown
|
page readonly
|
||
19F7000
|
heap
|
page read and write
|
||
3BB002C64000
|
trusted library allocation
|
page read and write
|
||
3BB002E30000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
3BB0031B4000
|
trusted library allocation
|
page read and write
|
||
275D941B000
|
heap
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
3BB00265C000
|
trusted library allocation
|
page read and write
|
||
D3A37FE000
|
unkown
|
page readonly
|
||
3AE4000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
3BB002B73000
|
trusted library allocation
|
page read and write
|
||
3BB002A2C000
|
trusted library allocation
|
page read and write
|
||
1DBC00270000
|
trusted library allocation
|
page read and write
|
||
3BB002D98000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
unkown
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
3BB00280C000
|
trusted library allocation
|
page read and write
|
||
3BB002D04000
|
trusted library allocation
|
page read and write
|
||
3BB00237C000
|
trusted library allocation
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
4F0000288000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
3AED000
|
heap
|
page read and write
|
||
3BB002601000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
3BB002550000
|
trusted library allocation
|
page read and write
|
||
4F00007E0000
|
trusted library allocation
|
page read and write
|
||
275D9468000
|
heap
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
3BB002CCC000
|
trusted library allocation
|
page read and write
|
||
6A31B000
|
direct allocation
|
page read and write
|
||
275DF33E000
|
trusted library section
|
page read and write
|
||
3BB002A54000
|
trusted library allocation
|
page read and write
|
||
275DF4F7000
|
unclassified section
|
page read and write
|
||
3BDB000
|
heap
|
page read and write
|
||
3BB002EE4000
|
trusted library allocation
|
page read and write
|
||
3BB000C01000
|
trusted library allocation
|
page read and write
|
||
3BB0026D0000
|
trusted library allocation
|
page read and write
|
||
4F0000320000
|
trusted library allocation
|
page read and write
|
||
3AEB000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
3BB0023F8000
|
trusted library allocation
|
page read and write
|
||
3BB0033D4000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
unkown
|
page readonly
|
||
1DBC00274000
|
trusted library allocation
|
page read and write
|
||
117800201000
|
direct allocation
|
page read and write
|
||
4F0000700000
|
trusted library allocation
|
page read and write
|
||
3BDB000
|
heap
|
page read and write
|
||
4F0000694000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
3BB003148000
|
trusted library allocation
|
page read and write
|
||
3BB0022FC000
|
trusted library allocation
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
3BB003401000
|
trusted library allocation
|
page read and write
|
||
D384FFE000
|
stack
|
page read and write
|
||
9AE000
|
unkown
|
page read and write
|
||
3BB0033A0000
|
trusted library allocation
|
page read and write
|
||
3BB002550000
|
trusted library allocation
|
page read and write
|
||
3BB0029D0000
|
trusted library allocation
|
page read and write
|
||
3BB0024A8000
|
trusted library allocation
|
page read and write
|
||
3BB002C01000
|
trusted library allocation
|
page read and write
|
||
D3B07FE000
|
unkown
|
page readonly
|
||
3BB002DA4000
|
trusted library allocation
|
page read and write
|
||
19EB000
|
heap
|
page read and write
|
||
3BB002E64000
|
trusted library allocation
|
page read and write
|
||
3BB0024D0000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
heap
|
page read and write
|
||
14E3000
|
heap
|
page read and write
|
||
D3AE7FE000
|
unkown
|
page readonly
|
||
D3837FE000
|
unkown
|
page readonly
|
||
19F6000
|
heap
|
page read and write
|
||
3BB00238C000
|
trusted library allocation
|
page read and write
|
||
275DB660000
|
trusted library allocation
|
page read and write
|
||
4F00002B8000
|
trusted library allocation
|
page read and write
|
||
3BB0030C8000
|
trusted library allocation
|
page read and write
|
||
275D9417000
|
heap
|
page read and write
|
||
4F0000248000
|
trusted library allocation
|
page read and write
|
||
3BB002CF0000
|
trusted library allocation
|
page read and write
|
||
3BE7000
|
heap
|
page read and write
|
||
3BB002398000
|
trusted library allocation
|
page read and write
|
||
9B1000
|
unkown
|
page readonly
|
||
4F00002B0000
|
trusted library allocation
|
page read and write
|
||
3BB002B28000
|
trusted library allocation
|
page read and write
|
||
3CED000
|
heap
|
page read and write
|
||
117800230000
|
direct allocation
|
page read and write
|
||
3BB0030A8000
|
trusted library allocation
|
page read and write
|
||
D3997FE000
|
unkown
|
page readonly
|
||
3BB002FEC000
|
trusted library allocation
|
page read and write
|
||
D38CFFE000
|
stack
|
page read and write
|
||
3BB00307C000
|
trusted library allocation
|
page read and write
|
||
D3A27FE000
|
unkown
|
page readonly
|
||
147E000
|
stack
|
page read and write
|
||
3BB00242C000
|
trusted library allocation
|
page read and write
|
||
19F1000
|
heap
|
page read and write
|
||
275D8E90000
|
heap
|
page read and write
|
||
D391FFE000
|
stack
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
1BFA000
|
heap
|
page read and write
|
||
3BB00225B000
|
trusted library allocation
|
page read and write
|
||
3BB003048000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
stack
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
3BB002CCC000
|
trusted library allocation
|
page read and write
|
||
3BB002201000
|
trusted library allocation
|
page read and write
|
||
3BB002570000
|
trusted library allocation
|
page read and write
|
||
4F0000678000
|
trusted library allocation
|
page read and write
|
||
117800210000
|
direct allocation
|
page read and write
|
||
D3ACFFC000
|
stack
|
page read and write
|
||
3BB002E68000
|
trusted library allocation
|
page read and write
|
||
4F0000620000
|
trusted library allocation
|
page read and write
|
||
3BB0034BC000
|
trusted library allocation
|
page read and write
|
||
3BB002F7C000
|
trusted library allocation
|
page read and write
|
||
4F00006FC000
|
trusted library allocation
|
page read and write
|
||
275D93D5000
|
heap
|
page read and write
|
||
3BB003250000
|
trusted library allocation
|
page read and write
|
||
3BB002860000
|
trusted library allocation
|
page read and write
|
||
3BB002580000
|
trusted library allocation
|
page read and write
|
||
3BB00253C000
|
trusted library allocation
|
page read and write
|
||
3BB0034C0000
|
trusted library allocation
|
page read and write
|
||
3AE3000
|
heap
|
page read and write
|
||
D39B7FE000
|
unkown
|
page readonly
|
||
D397FFC000
|
stack
|
page read and write
|
||
275D8EAE000
|
heap
|
page read and write
|
||
3BB0023AC000
|
trusted library allocation
|
page read and write
|
||
D3907FE000
|
unkown
|
page readonly
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3BB003190000
|
trusted library allocation
|
page read and write
|
||
1DBC002F4000
|
trusted library allocation
|
page read and write
|
||
3C97000
|
heap
|
page read and write
|
||
275DFC01000
|
trusted library section
|
page read and write
|
||
19EB000
|
heap
|
page read and write
|
||
D39C7FE000
|
unkown
|
page readonly
|
||
D38A7FE000
|
unkown
|
page readonly
|
||
3BB002278000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
D39E7FE000
|
unkown
|
page readonly
|
||
1AFA000
|
heap
|
page read and write
|
||
3AEB000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
6A5BE000
|
direct allocation
|
page read and write
|
||
D38F7FE000
|
unkown
|
page readonly
|
||
3BB002DE8000
|
trusted library allocation
|
page read and write
|
||
CFB000
|
unkown
|
page read and write
|
||
275DDE57000
|
unclassified section
|
page read and write
|
||
300E000
|
unkown
|
page read and write
|
||
3C5B000
|
heap
|
page read and write
|
||
D39BFFD000
|
stack
|
page read and write
|
||
4F0000220000
|
trusted library allocation
|
page read and write
|
||
3BB00226B000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
19FC000
|
heap
|
page read and write
|
||
3BB0030B4000
|
trusted library allocation
|
page read and write
|
||
1A04000
|
heap
|
page read and write
|
||
3BB00253C000
|
trusted library allocation
|
page read and write
|
||
275D942F000
|
heap
|
page read and write
|
||
275DFB81000
|
trusted library section
|
page read and write
|
||
3BB0028C8000
|
trusted library allocation
|
page read and write
|
||
4F0000424000
|
trusted library allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
4F000060C000
|
trusted library allocation
|
page read and write
|
||
3BB00284A000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
3BB00318C000
|
trusted library allocation
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
159C000
|
heap
|
page read and write
|
||
9B1000
|
unkown
|
page readonly
|
||
275DF332000
|
trusted library section
|
page read and write
|
||
19FD000
|
heap
|
page read and write
|
||
275D94A0000
|
trusted library section
|
page read and write
|
||
D381FFE000
|
stack
|
page read and write
|
||
3AE0000
|
heap
|
page read and write
|
||
3BB002824000
|
trusted library allocation
|
page read and write
|
||
3BB003264000
|
trusted library allocation
|
page read and write
|
||
9B1000
|
unkown
|
page readonly
|
||
1DBC002C0000
|
trusted library allocation
|
page read and write
|
||
3BB0030F0000
|
trusted library allocation
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
275DF470000
|
trusted library section
|
page read and write
|
||
D39FFFA000
|
stack
|
page read and write
|
||
11780023C000
|
direct allocation
|
page read and write
|
||
3BB00320C000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
heap
|
page read and write
|
||
3BB003378000
|
trusted library allocation
|
page read and write
|
||
1DBC00238000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
3C6A000
|
heap
|
page read and write
|
||
275D9419000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
3BB003098000
|
trusted library allocation
|
page read and write
|
||
3BB0025B0000
|
trusted library allocation
|
page read and write
|
||
3BB002ADC000
|
trusted library allocation
|
page read and write
|
||
3BB002DD0000
|
trusted library allocation
|
page read and write
|
||
D393FFE000
|
stack
|
page read and write
|
||
153B000
|
heap
|
page read and write
|
||
3BB9000
|
heap
|
page read and write
|
||
275D8EB2000
|
heap
|
page read and write
|
||
3BB002544000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
heap
|
page read and write
|
||
4F000039C000
|
trusted library allocation
|
page read and write
|
||
1BFA000
|
heap
|
page read and write
|
||
4F0000720000
|
trusted library allocation
|
page read and write
|
||
4F0000754000
|
trusted library allocation
|
page read and write
|
||
1178002AC000
|
direct allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
3BB003238000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
3BB002D2C000
|
trusted library allocation
|
page read and write
|
||
3BB0028F0000
|
trusted library allocation
|
page read and write
|
||
117800215000
|
direct allocation
|
page read and write
|
||
3BB002E98000
|
trusted library allocation
|
page read and write
|
||
4F0000364000
|
trusted library allocation
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
3F49000
|
heap
|
page read and write
|
||
3BB002AAC000
|
trusted library allocation
|
page read and write
|
||
275D5A90000
|
trusted library allocation
|
page read and write
|
||
1A03000
|
heap
|
page read and write
|
||
3BB002CB8000
|
trusted library allocation
|
page read and write
|
||
4F0000430000
|
trusted library allocation
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
3D21000
|
heap
|
page read and write
|
||
507E000
|
heap
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
3BB002954000
|
trusted library allocation
|
page read and write
|
||
275D8EBB000
|
heap
|
page read and write
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
4F00006AC000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
19FD000
|
heap
|
page read and write
|
||
6C868000
|
unkown
|
page readonly
|
||
4F00007D0000
|
trusted library allocation
|
page read and write
|
||
3BD8000
|
heap
|
page read and write
|
||
3BB00271C000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
4F0000368000
|
trusted library allocation
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
1546000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
3BB002907000
|
trusted library allocation
|
page read and write
|
||
D392FFE000
|
stack
|
page read and write
|
||
4F00006F0000
|
trusted library allocation
|
page read and write
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
1B8F000
|
heap
|
page read and write
|
||
3BB003138000
|
trusted library allocation
|
page read and write
|
||
3BD9000
|
heap
|
page read and write
|
||
1DBC002B0000
|
trusted library allocation
|
page read and write
|
||
3BB00300C000
|
trusted library allocation
|
page read and write
|
||
3BB0024A4000
|
trusted library allocation
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
3BB002264000
|
trusted library allocation
|
page read and write
|
||
3BB0023E8000
|
trusted library allocation
|
page read and write
|
||
3BB003040000
|
trusted library allocation
|
page read and write
|
||
D3FF9EF000
|
stack
|
page read and write
|
||
3BB00312C000
|
trusted library allocation
|
page read and write
|
||
153B000
|
heap
|
page read and write
|
||
3BB003120000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
unkown
|
page read and write
|
||
3BB002504000
|
trusted library allocation
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
3BB00290C000
|
trusted library allocation
|
page read and write
|
||
3B7C000
|
heap
|
page read and write
|
||
4F0000320000
|
trusted library allocation
|
page read and write
|
||
275D5840000
|
heap
|
page read and write
|
||
D3867FE000
|
unkown
|
page readonly
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
4F000040C000
|
trusted library allocation
|
page read and write
|
||
D388FFE000
|
stack
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
3BB003001000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
unkown
|
page read and write
|
||
275D5AE0000
|
heap
|
page read and write
|
||
3BB00322C000
|
trusted library allocation
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
3EDA000
|
heap
|
page read and write
|
||
3BB002594000
|
trusted library allocation
|
page read and write
|
||
3BC3000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
3BB002EF7000
|
trusted library allocation
|
page read and write
|
||
3BB0024F7000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
unkown
|
page write copy
|
||
3BB002648000
|
trusted library allocation
|
page read and write
|
||
3BB002784000
|
trusted library allocation
|
page read and write
|
||
D3A1FFE000
|
stack
|
page read and write
|
||
3BB002B14000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
3BBA000
|
heap
|
page read and write
|
||
3BDF000
|
heap
|
page read and write
|
||
3BEA000
|
heap
|
page read and write
|
||
9AA000
|
unkown
|
page readonly
|
||
3BB2000
|
heap
|
page read and write
|
||
69FB4000
|
direct allocation
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
3B9A000
|
heap
|
page read and write
|
||
4F0000408000
|
trusted library allocation
|
page read and write
|
||
275DF3D6000
|
trusted library section
|
page read and write
|
||
1DBC002F0000
|
trusted library allocation
|
page read and write
|
||
275DF6D0000
|
trusted library section
|
page read and write
|
||
3BB002EFC000
|
trusted library allocation
|
page read and write
|
||
275D940A000
|
heap
|
page read and write
|
||
3AE0000
|
heap
|
page read and write
|
||
3D20000
|
heap
|
page read and write
|
||
3AE8000
|
heap
|
page read and write
|
||
3BA9000
|
heap
|
page read and write
|
||
3BB000E01000
|
trusted library allocation
|
page read and write
|
||
3BB00307C000
|
trusted library allocation
|
page read and write
|
||
4F0000644000
|
trusted library allocation
|
page read and write
|
||
9A1000
|
unkown
|
page execute read
|
||
3BB002C0C000
|
trusted library allocation
|
page read and write
|
||
3B92000
|
heap
|
page read and write
|
||
3BB0031DC000
|
trusted library allocation
|
page read and write
|
||
4F00006B4000
|
trusted library allocation
|
page read and write
|
||
3BB001001000
|
trusted library allocation
|
page read and write
|
||
3BB002C24000
|
trusted library allocation
|
page read and write
|
||
6C81D000
|
unkown
|
page read and write
|
||
9B1000
|
unkown
|
page readonly
|
||
143E000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
1DBC00230000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1DBC002C0000
|
trusted library allocation
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
3BB002638000
|
trusted library allocation
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
3BB0023C8000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
3BB002EF0000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
275D9402000
|
heap
|
page read and write
|
||
275DFD90000
|
trusted library section
|
page read and write
|
||
4F000035C000
|
trusted library allocation
|
page read and write
|
||
9A1000
|
unkown
|
page execute read
|
||
3BB002334000
|
trusted library allocation
|
page read and write
|
||
275D8EBE000
|
heap
|
page read and write
|
||
4F000027C000
|
trusted library allocation
|
page read and write
|
||
3BB002DF8000
|
trusted library allocation
|
page read and write
|
||
275DF187000
|
unclassified section
|
page read and write
|
||
3CA5000
|
heap
|
page read and write
|
||
3BB003138000
|
trusted library allocation
|
page read and write
|
||
3BB002254000
|
trusted library allocation
|
page read and write
|
||
3BB0023AC000
|
trusted library allocation
|
page read and write
|
||
D3AFFFE000
|
stack
|
page read and write
|
||
3BB0024C4000
|
trusted library allocation
|
page read and write
|
||
6A2FF000
|
direct allocation
|
page read and write
|
||
1DBC002A0000
|
trusted library allocation
|
page read and write
|
||
275DFD10000
|
trusted library section
|
page read and write
|
||
275DFCB6000
|
trusted library section
|
page read and write
|
||
3BB00234C000
|
trusted library allocation
|
page read and write
|
||
3BB0023AC000
|
trusted library allocation
|
page read and write
|
||
3BB00265C000
|
trusted library allocation
|
page read and write
|
||
3BB002F38000
|
trusted library allocation
|
page read and write
|
||
19FC000
|
heap
|
page read and write
|
||
3BB002550000
|
trusted library allocation
|
page read and write
|
||
3BB002C88000
|
trusted library allocation
|
page read and write
|
||
275D9479000
|
heap
|
page read and write
|
||
1A08000
|
heap
|
page read and write
|
||
1A04000
|
heap
|
page read and write
|
||
CFB000
|
unkown
|
page write copy
|
||
3BB0027A4000
|
trusted library allocation
|
page read and write
|
||
275D90F0000
|
heap
|
page read and write
|
||
6A6F3000
|
direct allocation
|
page read and write
|
||
3BB0031DC000
|
trusted library allocation
|
page read and write
|
||
275DFBE0000
|
trusted library section
|
page read and write
|
||
E57000
|
unkown
|
page readonly
|
||
9A1000
|
unkown
|
page execute read
|
||
1540000
|
heap
|
page read and write
|
||
117800220000
|
direct allocation
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
3BB00311C000
|
trusted library allocation
|
page read and write
|
||
3BB002DC0000
|
trusted library allocation
|
page read and write
|
||
3BE8000
|
heap
|
page read and write
|
||
D3967FE000
|
unkown
|
page readonly
|
||
3BB002B94000
|
trusted library allocation
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
D3ADFFE000
|
stack
|
page read and write
|
||
3BB002D48000
|
trusted library allocation
|
page read and write
|
||
275D8E80000
|
heap
|
page read and write
|
||
3BB002424000
|
trusted library allocation
|
page read and write
|
||
275D9412000
|
heap
|
page read and write
|
||
D3AA7F4000
|
stack
|
page read and write
|
||
3ED0000
|
heap
|
page read and write
|
||
275DD127000
|
unclassified section
|
page read and write
|
||
117800270000
|
direct allocation
|
page read and write
|
||
3BB003070000
|
trusted library allocation
|
page read and write
|
||
155E000
|
heap
|
page read and write
|
||
4F00002D4000
|
trusted library allocation
|
page read and write
|
||
4F0000698000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
unkown
|
page read and write
|
||
275DFD9E000
|
trusted library section
|
page read and write
|
||
3BB003300000
|
trusted library allocation
|
page read and write
|
||
19FD000
|
heap
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
3BB0024C4000
|
trusted library allocation
|
page read and write
|
||
19ED000
|
heap
|
page read and write
|
||
1DBC00235000
|
trusted library allocation
|
page read and write
|
||
3BB0023B4000
|
trusted library allocation
|
page read and write
|
||
D3A7FFD000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
275D5AC0000
|
trusted library section
|
page readonly
|
||
1558000
|
heap
|
page read and write
|
||
275D93CC000
|
heap
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
3BB0033AC000
|
trusted library allocation
|
page read and write
|
||
D395FFB000
|
stack
|
page read and write
|
||
3BB0026B4000
|
trusted library allocation
|
page read and write
|
||
3BB0024F0000
|
trusted library allocation
|
page read and write
|
||
3C8C000
|
heap
|
page read and write
|
||
3BB002FA4000
|
trusted library allocation
|
page read and write
|
||
3BB002A68000
|
trusted library allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
1AF9000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
3BB003064000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
3BB002580000
|
trusted library allocation
|
page read and write
|
||
1BFA000
|
heap
|
page read and write
|
||
275D9453000
|
heap
|
page read and write
|
||
3BB00349C000
|
trusted library allocation
|
page read and write
|
||
D383FFE000
|
stack
|
page read and write
|
||
1DBC002D8000
|
trusted library allocation
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
4F0000668000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
4F00003EC000
|
trusted library allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
1DBC002A0000
|
trusted library allocation
|
page read and write
|
||
3BB0032E8000
|
trusted library allocation
|
page read and write
|
||
3BB002284000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
unkown
|
page write copy
|
||
19FD000
|
heap
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
4F00006B0000
|
trusted library allocation
|
page read and write
|
||
3BB002544000
|
trusted library allocation
|
page read and write
|
||
D39D7FE000
|
unkown
|
page readonly
|
||
D03000
|
unkown
|
page read and write
|
||
3BB002BC0000
|
trusted library allocation
|
page read and write
|
||
3BB003120000
|
trusted library allocation
|
page read and write
|
||
3BB002D5C000
|
trusted library allocation
|
page read and write
|
||
3BB002528000
|
trusted library allocation
|
page read and write
|
||
158D000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
4F0000201000
|
trusted library allocation
|
page read and write
|
||
1DBC00201000
|
trusted library allocation
|
page read and write
|
||
1A02000
|
heap
|
page read and write
|
||
19FC000
|
heap
|
page read and write
|
||
1DBC002F8000
|
trusted library allocation
|
page read and write
|
||
3BB002EF4000
|
trusted library allocation
|
page read and write
|
||
4F0000784000
|
trusted library allocation
|
page read and write
|
||
6A310000
|
direct allocation
|
page read and write
|
||
3BB002794000
|
trusted library allocation
|
page read and write
|
||
3BB00251C000
|
trusted library allocation
|
page read and write
|
||
3BB00241C000
|
trusted library allocation
|
page read and write
|
||
3BB003201000
|
trusted library allocation
|
page read and write
|
||
4F0000238000
|
trusted library allocation
|
page read and write
|
||
4F00006C4000
|
trusted library allocation
|
page read and write
|
||
3BB002CC8000
|
trusted library allocation
|
page read and write
|
||
3BB00304C000
|
trusted library allocation
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
3BB002E68000
|
trusted library allocation
|
page read and write
|
||
D3A8FFE000
|
unkown
|
page readonly
|
||
3BB002F88000
|
trusted library allocation
|
page read and write
|
||
3BB002DC8000
|
trusted library allocation
|
page read and write
|
||
3BB003298000
|
trusted library allocation
|
page read and write
|
||
1AC1000
|
heap
|
page read and write
|
||
1DBC00248000
|
trusted library allocation
|
page read and write
|
||
3BB00240C000
|
trusted library allocation
|
page read and write
|
||
3BB0024AC000
|
trusted library allocation
|
page read and write
|
||
1A0F000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
3BB002DAC000
|
trusted library allocation
|
page read and write
|
||
275D8EAE000
|
heap
|
page read and write
|
||
3BB002A01000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
unkown
|
page read and write
|
||
3BB00283C000
|
trusted library allocation
|
page read and write
|
||
4F0000624000
|
trusted library allocation
|
page read and write
|
||
3BA3000
|
heap
|
page read and write
|
||
275D5850000
|
heap
|
page readonly
|
||
3BB0023B4000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
heap
|
page read and write
|
||
3BB002290000
|
trusted library allocation
|
page read and write
|
||
4BB9000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
3BB002C44000
|
trusted library allocation
|
page read and write
|
||
13F2000
|
stack
|
page read and write
|
||
275DFBAE000
|
trusted library section
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
3BB002A7C000
|
trusted library allocation
|
page read and write
|
||
3BB0029BC000
|
trusted library allocation
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
3BB00236C000
|
trusted library allocation
|
page read and write
|
||
1ABE000
|
stack
|
page read and write
|
||
3BB0026D4000
|
trusted library allocation
|
page read and write
|
||
D3987FE000
|
unkown
|
page readonly
|
||
D385FFD000
|
stack
|
page read and write
|
||
275DFCD2000
|
trusted library section
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
3BB0026A4000
|
trusted library allocation
|
page read and write
|
||
4F0000714000
|
trusted library allocation
|
page read and write
|
||
3BB0022B4000
|
trusted library allocation
|
page read and write
|
||
3BB002734000
|
trusted library allocation
|
page read and write
|
||
3BB003088000
|
trusted library allocation
|
page read and write
|
||
1DBC002E4000
|
trusted library allocation
|
page read and write
|
||
3BB002550000
|
trusted library allocation
|
page read and write
|
||
4F00002CC000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
heap
|
page read and write
|
||
3BB003190000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
heap
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
275D8EBF000
|
heap
|
page read and write
|
||
19FB000
|
heap
|
page read and write
|
||
D3857FE000
|
unkown
|
page readonly
|
||
275D941D000
|
heap
|
page read and write
|
||
D3877FE000
|
unkown
|
page readonly
|
||
3050000
|
heap
|
page read and write
|
||
2E5D000
|
stack
|
page read and write
|
||
E52000
|
unkown
|
page read and write
|
||
3BB002BCC000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
unkown
|
page readonly
|
||
1989000
|
heap
|
page read and write
|
||
D3A2FFC000
|
stack
|
page read and write
|
||
3BB00220C000
|
trusted library allocation
|
page read and write
|
||
1BF4000
|
heap
|
page read and write
|
||
3BB0026DC000
|
trusted library allocation
|
page read and write
|
||
3BB0024AC000
|
trusted library allocation
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
1DBC002BC000
|
trusted library allocation
|
page read and write
|
||
3C9D000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
3BB0031C4000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
19FD000
|
heap
|
page read and write
|
||
275DF1B0000
|
heap
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
19FB000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
1DBC00260000
|
trusted library allocation
|
page read and write
|
||
3BB002AB3000
|
trusted library allocation
|
page read and write
|
||
3B9D000
|
heap
|
page read and write
|
||
5ABC000
|
stack
|
page read and write
|
||
4F000025C000
|
trusted library allocation
|
page read and write
|
||
1556000
|
heap
|
page read and write
|
||
11780026C000
|
direct allocation
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
1DBC002C0000
|
trusted library allocation
|
page read and write
|
||
3BB002F48000
|
trusted library allocation
|
page read and write
|
||
4F0000630000
|
trusted library allocation
|
page read and write
|
||
3BB002FF8000
|
trusted library allocation
|
page read and write
|
||
3BF2000
|
heap
|
page read and write
|
||
3BB002ED4000
|
trusted library allocation
|
page read and write
|
There are 1154 hidden memdumps, click here to show them.