Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
5BQwrSLxIZ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5BQwrSLxIZ.exe_a9ba49c7245ad8289743d6dec860987f3a8b130_f5687a89_bb96e053-6649-426c-a59c-48c3ef7832e6\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\CAKKKFBFIDGDBFHJJEHI
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\CBAKFCBF
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A09.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:42:37 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BA1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\chrome.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5b62db7d-4de8-4b33-bf9b-d525046a5cba.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7dd6364e-2921-4813-987c-5a2f1566d216.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\92d6f07d-334c-45d6-9e98-84e692c2dfa2.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67211E82-1EDC.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37ea7.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37fd0.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3800e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c28823ba-998f-427f-959e-c9972e3c59de.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\da546ba8-3058-4122-88e2-49033be096ca.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (5162), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (2287)
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (798)
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (1302)
|
downloaded
|
||
Chrome Cache Entry: 99
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 26 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\5BQwrSLxIZ.exe
|
"C:\Users\user\Desktop\5BQwrSLxIZ.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2788 --field-trial-handle=2428,i,8417053299692469591,16795964137482112875,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin
--flag-switches-end --disable-nacl --do-not-de-elevate
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=952 --field-trial-handle=2052,i,5172159360179937622,2345701733477799989,262144
/prefetch:3
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2124,i,623430963547524201,12155014114524219740,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 1876
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/(
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com//
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v2/tokeninfo
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/1
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/7
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/5
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/:
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/8
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/3586&
|
unknown
|
||
https://publickeyservice.gcp.privacysandboxservices.com
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/G
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://publickeyservice.pa.aws.privacysandboxservices.com
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/J
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/H
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/O
|
unknown
|
||
https://docs.google.com/presentation/ogl
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/M
|
unknown
|
||
http://anglebug.com/3862il
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/Q
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/P
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/V
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/T
|
unknown
|
||
https://drive.google.com/?lfhs=2ation.Result
|
unknown
|
||
https://ogs.google.com/widget/callout?eom=1
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/Y
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2erValidator
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/c
|
unknown
|
||
http://anglebug.com/3832k
|
unknown
|
||
http://anglebug.com/3965l
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/f
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/e
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v4/token
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://chrome.google.com/webstore?hl=enE
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
http://45.88.76.238/3b55d279dd60140c.phpwininit.exe
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://anglebug.com/8229i
|
unknown
|
||
http://45.88.76.238/3b55d279dd60140c.phpuiX
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://45.88.76.238/3b55d279dd60140c.phpdge
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://plus.google.com
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
https://permanently-removed.invalid/chrome/blank.html
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://45.88.76.238/3b55d279dd60140c.php8~
|
unknown
|
||
https://permanently-removed.invalid/v1/issuetoken
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.htmllt
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
|
142.250.74.206
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://permanently-removed.invalid/reauth/v1beta/users/
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.htmlP
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
apis.google.com
|
unknown
|
||
plus.l.google.com
|
142.250.74.206
|
||
play.google.com
|
142.250.186.142
|
||
www.google.com
|
142.250.185.228
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.88.76.238
|
unknown
|
Ukraine
|
||
192.168.2.5
|
unknown
|
unknown
|
||
142.250.185.228
|
www.google.com
|
United States
|
||
142.250.74.206
|
plus.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.186.142
|
play.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Top
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
ProgramId
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
FileId
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
LongPathHash
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Name
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
OriginalFileName
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Publisher
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Version
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
BinFileVersion
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
BinaryType
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
ProductName
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
ProductVersion
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
LinkDate
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
BinProductVersion
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
AppxPackageFullName
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Size
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Language
|
||
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
|
Usn
|
There are 22 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4920000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2CBF000
|
heap
|
page read and write
|
||
279002220000
|
trusted library allocation
|
page read and write
|
||
2790031B4000
|
trusted library allocation
|
page read and write
|
||
457A5FC000
|
stack
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
179E8D50000
|
trusted library section
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
279003984000
|
trusted library allocation
|
page read and write
|
||
3A6C002E4000
|
trusted library allocation
|
page read and write
|
||
1F6C00270000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
73E80030A000
|
direct allocation
|
page read and write
|
||
450D7FE000
|
stack
|
page read and write
|
||
CC4024E4000
|
trusted library allocation
|
page read and write
|
||
279002D58000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
CC4023D8000
|
trusted library allocation
|
page read and write
|
||
279003F48000
|
trusted library allocation
|
page read and write
|
||
279003B60000
|
trusted library allocation
|
page read and write
|
||
2344C000
|
heap
|
page read and write
|
||
279002418000
|
trusted library allocation
|
page read and write
|
||
279004258000
|
trusted library allocation
|
page read and write
|
||
2790036BC000
|
trusted library allocation
|
page read and write
|
||
CC402460000
|
trusted library allocation
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
473CBFE000
|
unkown
|
page readonly
|
||
CC402580000
|
trusted library allocation
|
page read and write
|
||
279002440000
|
trusted library allocation
|
page read and write
|
||
12C400280000
|
direct allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
279002E50000
|
trusted library allocation
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
3A6C009C4000
|
trusted library allocation
|
page read and write
|
||
3A6C00920000
|
trusted library allocation
|
page read and write
|
||
CC400A01000
|
trusted library allocation
|
page read and write
|
||
279002C0D000
|
trusted library allocation
|
page read and write
|
||
3A6C00904000
|
trusted library allocation
|
page read and write
|
||
CC4025E0000
|
trusted library allocation
|
page read and write
|
||
CC402498000
|
trusted library allocation
|
page read and write
|
||
12C40020C000
|
direct allocation
|
page read and write
|
||
279003FCC000
|
trusted library allocation
|
page read and write
|
||
3A6C00868000
|
trusted library allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
1A4B6D2F000
|
heap
|
page read and write
|
||
179DEC90000
|
heap
|
page read and write
|
||
279002374000
|
trusted library allocation
|
page read and write
|
||
179E2758000
|
heap
|
page read and write
|
||
12C400290000
|
direct allocation
|
page read and write
|
||
1A4B6D31000
|
heap
|
page read and write
|
||
4509FFE000
|
unkown
|
page readonly
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
179E4810000
|
heap
|
page read and write
|
||
279003230000
|
trusted library allocation
|
page read and write
|
||
73E800284000
|
direct allocation
|
page read and write
|
||
2790039A4000
|
trusted library allocation
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
279003540000
|
trusted library allocation
|
page read and write
|
||
279003A34000
|
trusted library allocation
|
page read and write
|
||
23640000
|
trusted library allocation
|
page read and write
|
||
49B000288000
|
trusted library allocation
|
page read and write
|
||
CC4022F8000
|
trusted library allocation
|
page read and write
|
||
279003A3C000
|
trusted library allocation
|
page read and write
|
||
3AA000364000
|
trusted library allocation
|
page read and write
|
||
CC4025A4000
|
trusted library allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
179E47D0000
|
heap
|
page read and write
|
||
CC4022A8000
|
trusted library allocation
|
page read and write
|
||
40E000
|
unkown
|
page execute read
|
||
279002C44000
|
trusted library allocation
|
page read and write
|
||
73E800260000
|
direct allocation
|
page read and write
|
||
279003CE0000
|
trusted library allocation
|
page read and write
|
||
49B000238000
|
trusted library allocation
|
page read and write
|
||
1F6C00294000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
73E800210000
|
direct allocation
|
page read and write
|
||
279002428000
|
trusted library allocation
|
page read and write
|
||
CC402334000
|
trusted library allocation
|
page read and write
|
||
49B0002A4000
|
trusted library allocation
|
page read and write
|
||
47423FC000
|
stack
|
page read and write
|
||
49B000278000
|
trusted library allocation
|
page read and write
|
||
3A6C00890000
|
trusted library allocation
|
page read and write
|
||
279003710000
|
trusted library allocation
|
page read and write
|
||
279003FE0000
|
trusted library allocation
|
page read and write
|
||
179E4627000
|
unclassified section
|
page read and write
|
||
279002F70000
|
trusted library allocation
|
page read and write
|
||
2790039A4000
|
trusted library allocation
|
page read and write
|
||
279004228000
|
trusted library allocation
|
page read and write
|
||
4740BFE000
|
unkown
|
page readonly
|
||
279003E78000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
2790031A9000
|
trusted library allocation
|
page read and write
|
||
CC4024CC000
|
trusted library allocation
|
page read and write
|
||
4739BFE000
|
unkown
|
page readonly
|
||
3A6C00894000
|
trusted library allocation
|
page read and write
|
||
2790042E7000
|
trusted library allocation
|
page read and write
|
||
3AA000220000
|
trusted library allocation
|
page read and write
|
||
2790028C0000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
CC4023EC000
|
trusted library allocation
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
3A6C00601000
|
trusted library allocation
|
page read and write
|
||
27900396C000
|
trusted library allocation
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
279003C01000
|
trusted library allocation
|
page read and write
|
||
279003E88000
|
trusted library allocation
|
page read and write
|
||
3A6C00230000
|
trusted library allocation
|
page read and write
|
||
45655FE000
|
stack
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
279002F18000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
2D13000
|
heap
|
page read and write
|
||
179DEC40000
|
heap
|
page read and write
|
||
279003B88000
|
trusted library allocation
|
page read and write
|
||
4573DFE000
|
unkown
|
page readonly
|
||
45765FE000
|
stack
|
page read and write
|
||
279002EFC000
|
trusted library allocation
|
page read and write
|
||
1F6C00238000
|
trusted library allocation
|
page read and write
|
||
CC402438000
|
trusted library allocation
|
page read and write
|
||
279004A15000
|
trusted library allocation
|
page read and write
|
||
CC4024B0000
|
trusted library allocation
|
page read and write
|
||
279003A18000
|
trusted library allocation
|
page read and write
|
||
73E8002D0000
|
direct allocation
|
page read and write
|
||
279004308000
|
trusted library allocation
|
page read and write
|
||
279003C84000
|
trusted library allocation
|
page read and write
|
||
279003568000
|
trusted library allocation
|
page read and write
|
||
1F6C00220000
|
trusted library allocation
|
page read and write
|
||
179E21C9000
|
heap
|
page read and write
|
||
279003C58000
|
trusted library allocation
|
page read and write
|
||
3A6C00948000
|
trusted library allocation
|
page read and write
|
||
279004170000
|
trusted library allocation
|
page read and write
|
||
3A6C007AC000
|
trusted library allocation
|
page read and write
|
||
179E69DA000
|
heap
|
page read and write
|
||
279003B2C000
|
trusted library allocation
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
23440000
|
heap
|
page read and write
|
||
1A4B4EB4000
|
heap
|
page read and write
|
||
4576DFE000
|
unkown
|
page readonly
|
||
CC4024D8000
|
trusted library allocation
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
4501FFE000
|
unkown
|
page readonly
|
||
1CD8E000
|
stack
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
3A6C0027C000
|
trusted library allocation
|
page read and write
|
||
1A4B4E53000
|
heap
|
page read and write
|
||
456A5F8000
|
stack
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
2790024C4000
|
trusted library allocation
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
2790036B4000
|
trusted library allocation
|
page read and write
|
||
27900438A000
|
trusted library allocation
|
page read and write
|
||
27900425C000
|
trusted library allocation
|
page read and write
|
||
27900252C000
|
trusted library allocation
|
page read and write
|
||
47393FE000
|
stack
|
page read and write
|
||
73E800274000
|
direct allocation
|
page read and write
|
||
472BBFE000
|
unkown
|
page readonly
|
||
2790031B4000
|
trusted library allocation
|
page read and write
|
||
CC40226C000
|
trusted library allocation
|
page read and write
|
||
474BBFE000
|
unkown
|
page readonly
|
||
2790026FC000
|
trusted library allocation
|
page read and write
|
||
3AA000304000
|
trusted library allocation
|
page read and write
|
||
279003EAC000
|
trusted library allocation
|
page read and write
|
||
3A6C002D4000
|
trusted library allocation
|
page read and write
|
||
279004ADE000
|
trusted library allocation
|
page read and write
|
||
27900422C000
|
trusted library allocation
|
page read and write
|
||
3A6C0080C000
|
trusted library allocation
|
page read and write
|
||
279003C68000
|
trusted library allocation
|
page read and write
|
||
3A6C0070C000
|
trusted library allocation
|
page read and write
|
||
3AA000320000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
279003BF8000
|
trusted library allocation
|
page read and write
|
||
1CC4F000
|
stack
|
page read and write
|
||
279003C60000
|
trusted library allocation
|
page read and write
|
||
1CE8F000
|
stack
|
page read and write
|
||
1A4B6D2D000
|
heap
|
page read and write
|
||
2790033C4000
|
trusted library allocation
|
page read and write
|
||
2790042C5000
|
trusted library allocation
|
page read and write
|
||
279002890000
|
trusted library allocation
|
page read and write
|
||
CC402220000
|
trusted library allocation
|
page read and write
|
||
279003E68000
|
trusted library allocation
|
page read and write
|
||
CC4023C4000
|
trusted library allocation
|
page read and write
|
||
1A4B4EB7000
|
heap
|
page read and write
|
||
CC40242C000
|
trusted library allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
12C400284000
|
direct allocation
|
page read and write
|
||
CC402470000
|
trusted library allocation
|
page read and write
|
||
CC4024AC000
|
trusted library allocation
|
page read and write
|
||
279003E64000
|
trusted library allocation
|
page read and write
|
||
1A4B6D2F000
|
heap
|
page read and write
|
||
27900260C000
|
trusted library allocation
|
page read and write
|
||
279002244000
|
trusted library allocation
|
page read and write
|
||
279003ABC000
|
trusted library allocation
|
page read and write
|
||
2790029C8000
|
trusted library allocation
|
page read and write
|
||
279004C1C000
|
trusted library allocation
|
page read and write
|
||
CC402490000
|
trusted library allocation
|
page read and write
|
||
279002FB0000
|
trusted library allocation
|
page read and write
|
||
27900297C000
|
trusted library allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
4510FFE000
|
unkown
|
page readonly
|
||
279003679000
|
trusted library allocation
|
page read and write
|
||
279003B7C000
|
trusted library allocation
|
page read and write
|
||
279002C74000
|
trusted library allocation
|
page read and write
|
||
279004A50000
|
trusted library allocation
|
page read and write
|
||
234B0000
|
heap
|
page read and write
|
||
279003F9C000
|
trusted library allocation
|
page read and write
|
||
179DED2D000
|
heap
|
page read and write
|
||
179DED82000
|
heap
|
page read and write
|
||
3A6C007A0000
|
trusted library allocation
|
page read and write
|
||
23447000
|
heap
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279002FF0000
|
trusted library allocation
|
page read and write
|
||
279003801000
|
trusted library allocation
|
page read and write
|
||
279003EF8000
|
trusted library allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
279003524000
|
trusted library allocation
|
page read and write
|
||
45007FC000
|
stack
|
page read and write
|
||
2790042E0000
|
trusted library allocation
|
page read and write
|
||
6C8A1000
|
unkown
|
page execute read
|
||
279003B28000
|
trusted library allocation
|
page read and write
|
||
47453FE000
|
stack
|
page read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
4514FFE000
|
unkown
|
page readonly
|
||
56E000
|
unkown
|
page execute and read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
179DEC70000
|
heap
|
page read and write
|
||
3A6C00430000
|
trusted library allocation
|
page read and write
|
||
3AA00020C000
|
trusted library allocation
|
page read and write
|
||
45735FE000
|
stack
|
page read and write
|
||
CC4023F8000
|
trusted library allocation
|
page read and write
|
||
CC402664000
|
trusted library allocation
|
page read and write
|
||
279003E38000
|
trusted library allocation
|
page read and write
|
||
279002DA0000
|
trusted library allocation
|
page read and write
|
||
1F6C002F8000
|
trusted library allocation
|
page read and write
|
||
279000C01000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
49B0002B0000
|
trusted library allocation
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
279003B14000
|
trusted library allocation
|
page read and write
|
||
2790030D8000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
2790024D0000
|
trusted library allocation
|
page read and write
|
||
279004360000
|
trusted library allocation
|
page read and write
|
||
CC402428000
|
trusted library allocation
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
CC402448000
|
trusted library allocation
|
page read and write
|
||
2C49000
|
heap
|
page execute and read and write
|
||
279003F18000
|
trusted library allocation
|
page read and write
|
||
4746BFE000
|
unkown
|
page readonly
|
||
279004A28000
|
trusted library allocation
|
page read and write
|
||
2790041F0000
|
trusted library allocation
|
page read and write
|
||
179E21D1000
|
heap
|
page read and write
|
||
73E800220000
|
direct allocation
|
page read and write
|
||
279002AD0000
|
trusted library allocation
|
page read and write
|
||
279003662000
|
trusted library allocation
|
page read and write
|
||
179E21C9000
|
heap
|
page read and write
|
||
279004ADC000
|
trusted library allocation
|
page read and write
|
||
CC402468000
|
trusted library allocation
|
page read and write
|
||
279002DAC000
|
trusted library allocation
|
page read and write
|
||
3A6C00401000
|
trusted library allocation
|
page read and write
|
||
2790024A8000
|
trusted library allocation
|
page read and write
|
||
456FDFE000
|
unkown
|
page readonly
|
||
CC4024FC000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
2790035F0000
|
trusted library allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
CC402230000
|
trusted library allocation
|
page read and write
|
||
45027FD000
|
stack
|
page read and write
|
||
279003868000
|
trusted library allocation
|
page read and write
|
||
2790026D8000
|
trusted library allocation
|
page read and write
|
||
CC4022E8000
|
trusted library allocation
|
page read and write
|
||
279003A88000
|
trusted library allocation
|
page read and write
|
||
3A6C00788000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
179E7326000
|
trusted library section
|
page read and write
|
||
2790032A4000
|
trusted library allocation
|
page read and write
|
||
1D14E000
|
stack
|
page read and write
|
||
27900258E000
|
trusted library allocation
|
page read and write
|
||
279000B1A000
|
trusted library allocation
|
page read and write
|
||
279002EDC000
|
trusted library allocation
|
page read and write
|
||
3AA00031C000
|
trusted library allocation
|
page read and write
|
||
279003BB8000
|
trusted library allocation
|
page read and write
|
||
47433FE000
|
unkown
|
page readonly
|
||
1A4B6D55000
|
heap
|
page read and write
|
||
3A6C0079C000
|
trusted library allocation
|
page read and write
|
||
450C7FD000
|
stack
|
page read and write
|
||
179E272D000
|
heap
|
page read and write
|
||
2790029B0000
|
trusted library allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
279003ECC000
|
trusted library allocation
|
page read and write
|
||
279002CB8000
|
trusted library allocation
|
page read and write
|
||
279003A64000
|
trusted library allocation
|
page read and write
|
||
45775FE000
|
stack
|
page read and write
|
||
279004201000
|
trusted library allocation
|
page read and write
|
||
279002794000
|
trusted library allocation
|
page read and write
|
||
CC40249C000
|
trusted library allocation
|
page read and write
|
||
279003F5C000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
1A4B4EBA000
|
heap
|
page read and write
|
||
179DEC30000
|
heap
|
page readonly
|
||
27900243C000
|
trusted library allocation
|
page read and write
|
||
179E92B2000
|
trusted library section
|
page read and write
|
||
279004CA8000
|
trusted library allocation
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
12C4002EC000
|
direct allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
73E800303000
|
direct allocation
|
page read and write
|
||
1A4B6D3D000
|
heap
|
page read and write
|
||
279000A18000
|
trusted library allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
279004A92000
|
trusted library allocation
|
page read and write
|
||
4511FFE000
|
unkown
|
page readonly
|
||
279003B78000
|
trusted library allocation
|
page read and write
|
||
279003A78000
|
trusted library allocation
|
page read and write
|
||
27900364C000
|
trusted library allocation
|
page read and write
|
||
2790030A8000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
27900362B000
|
trusted library allocation
|
page read and write
|
||
279002D60000
|
trusted library allocation
|
page read and write
|
||
279003970000
|
trusted library allocation
|
page read and write
|
||
CC402488000
|
trusted library allocation
|
page read and write
|
||
2790037D4000
|
trusted library allocation
|
page read and write
|
||
CC402254000
|
trusted library allocation
|
page read and write
|
||
279003249000
|
trusted library allocation
|
page read and write
|
||
279003F64000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
45047FE000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
27900320C000
|
trusted library allocation
|
page read and write
|
||
27900241C000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
1A4B4F26000
|
heap
|
page read and write
|
||
279003E9C000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
2790026CC000
|
trusted library allocation
|
page read and write
|
||
279004A3D000
|
trusted library allocation
|
page read and write
|
||
1F6C002FC000
|
trusted library allocation
|
page read and write
|
||
CC402474000
|
trusted library allocation
|
page read and write
|
||
CC402260000
|
trusted library allocation
|
page read and write
|
||
279003018000
|
trusted library allocation
|
page read and write
|
||
CC40237C000
|
trusted library allocation
|
page read and write
|
||
279003CA4000
|
trusted library allocation
|
page read and write
|
||
279003F94000
|
trusted library allocation
|
page read and write
|
||
279003998000
|
trusted library allocation
|
page read and write
|
||
CC4023E4000
|
trusted library allocation
|
page read and write
|
||
3A6C00220000
|
trusted library allocation
|
page read and write
|
||
279000F1C000
|
trusted library allocation
|
page read and write
|
||
CC4025BC000
|
trusted library allocation
|
page read and write
|
||
3A6C00860000
|
trusted library allocation
|
page read and write
|
||
279003A30000
|
trusted library allocation
|
page read and write
|
||
279002DA0000
|
trusted library allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
450FFFE000
|
unkown
|
page readonly
|
||
1D2A1000
|
heap
|
page read and write
|
||
279002269000
|
trusted library allocation
|
page read and write
|
||
4504FFE000
|
unkown
|
page readonly
|
||
279003C90000
|
trusted library allocation
|
page read and write
|
||
2790043E0000
|
trusted library allocation
|
page read and write
|
||
4507FFE000
|
unkown
|
page readonly
|
||
1A4B4E5D000
|
heap
|
page read and write
|
||
279003950000
|
trusted library allocation
|
page read and write
|
||
279003078000
|
trusted library allocation
|
page read and write
|
||
3A6C00898000
|
trusted library allocation
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
3A6C007E4000
|
trusted library allocation
|
page read and write
|
||
279002354000
|
trusted library allocation
|
page read and write
|
||
CC40246C000
|
trusted library allocation
|
page read and write
|
||
CC402420000
|
trusted library allocation
|
page read and write
|
||
279003B80000
|
trusted library allocation
|
page read and write
|
||
73E8002EC000
|
direct allocation
|
page read and write
|
||
CC4025E0000
|
trusted library allocation
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
279002D4F000
|
trusted library allocation
|
page read and write
|
||
279003D90000
|
trusted library allocation
|
page read and write
|
||
4505FFE000
|
unkown
|
page readonly
|
||
279003960000
|
trusted library allocation
|
page read and write
|
||
279002430000
|
trusted library allocation
|
page read and write
|
||
2790024C0000
|
trusted library allocation
|
page read and write
|
||
2790026CC000
|
trusted library allocation
|
page read and write
|
||
179E21D3000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
1A4B6D35000
|
heap
|
page read and write
|
||
27900231C000
|
trusted library allocation
|
page read and write
|
||
2790024A0000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
279004194000
|
trusted library allocation
|
page read and write
|
||
279002D48000
|
trusted library allocation
|
page read and write
|
||
4506FFE000
|
unkown
|
page readonly
|
||
45795FC000
|
stack
|
page read and write
|
||
3AA00031C000
|
trusted library allocation
|
page read and write
|
||
CC40240C000
|
trusted library allocation
|
page read and write
|
||
179E2A27000
|
unclassified section
|
page read and write
|
||
3A6C002CC000
|
trusted library allocation
|
page read and write
|
||
279002394000
|
trusted library allocation
|
page read and write
|
||
1A4B4E9E000
|
heap
|
page read and write
|
||
279003C34000
|
trusted library allocation
|
page read and write
|
||
3AA000418000
|
trusted library allocation
|
page read and write
|
||
3A6C00884000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
CC402464000
|
trusted library allocation
|
page read and write
|
||
27900260C000
|
trusted library allocation
|
page read and write
|
||
12C4002E4000
|
direct allocation
|
page read and write
|
||
45147F9000
|
stack
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
27900258C000
|
trusted library allocation
|
page read and write
|
||
279002EDC000
|
trusted library allocation
|
page read and write
|
||
CC402494000
|
trusted library allocation
|
page read and write
|
||
49B000264000
|
trusted library allocation
|
page read and write
|
||
179DED31000
|
heap
|
page read and write
|
||
4742BFD000
|
stack
|
page read and write
|
||
457E5FB000
|
stack
|
page read and write
|
||
2790027B4000
|
trusted library allocation
|
page read and write
|
||
1F6C002E4000
|
trusted library allocation
|
page read and write
|
||
279003C88000
|
trusted library allocation
|
page read and write
|
||
1A4B4E42000
|
heap
|
page read and write
|
||
1A4B4E67000
|
heap
|
page read and write
|
||
279003068000
|
trusted library allocation
|
page read and write
|
||
2790005D6000
|
trusted library allocation
|
page read and write
|
||
CC4023DC000
|
trusted library allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
27900405C000
|
trusted library allocation
|
page read and write
|
||
1A4B6D3D000
|
heap
|
page read and write
|
||
45695FD000
|
stack
|
page read and write
|
||
2790023AC000
|
trusted library allocation
|
page read and write
|
||
2790024C7000
|
trusted library allocation
|
page read and write
|
||
279002F78000
|
trusted library allocation
|
page read and write
|
||
279004362000
|
trusted library allocation
|
page read and write
|
||
12C4002A8000
|
direct allocation
|
page read and write
|
||
1A4B4D40000
|
heap
|
page read and write
|
||
CC400401000
|
trusted library allocation
|
page read and write
|
||
1A4B4E13000
|
heap
|
page read and write
|
||
1F6C002D8000
|
trusted library allocation
|
page read and write
|
||
279003A9C000
|
trusted library allocation
|
page read and write
|
||
2790027F0000
|
trusted library allocation
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
279004CC4000
|
trusted library allocation
|
page read and write
|
||
3A6C00840000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
3AA00025C000
|
trusted library allocation
|
page read and write
|
||
179E2630000
|
trusted library section
|
page read and write
|
||
2790028D0000
|
trusted library allocation
|
page read and write
|
||
3AA0002B0000
|
trusted library allocation
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
3AA000290000
|
trusted library allocation
|
page read and write
|
||
3AA00027C000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
3A6C0081C000
|
trusted library allocation
|
page read and write
|
||
2790030CF000
|
trusted library allocation
|
page read and write
|
||
279003568000
|
trusted library allocation
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
1A4B6D32000
|
heap
|
page read and write
|
||
279003E74000
|
trusted library allocation
|
page read and write
|
||
456B5FB000
|
stack
|
page read and write
|
||
279004BE0000
|
trusted library allocation
|
page read and write
|
||
49B0002A4000
|
trusted library allocation
|
page read and write
|
||
279002948000
|
trusted library allocation
|
page read and write
|
||
27900232C000
|
trusted library allocation
|
page read and write
|
||
2790043A4000
|
trusted library allocation
|
page read and write
|
||
279002D4D000
|
trusted library allocation
|
page read and write
|
||
279004A5C000
|
trusted library allocation
|
page read and write
|
||
CC4023E0000
|
trusted library allocation
|
page read and write
|
||
2790024F7000
|
trusted library allocation
|
page read and write
|
||
45127FE000
|
stack
|
page read and write
|
||
1A4B4DB0000
|
trusted library allocation
|
page read and write
|
||
2790032BC000
|
trusted library allocation
|
page read and write
|
||
3AA0002A4000
|
trusted library allocation
|
page read and write
|
||
47443FD000
|
stack
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
3AA000284000
|
trusted library allocation
|
page read and write
|
||
279003F7C000
|
trusted library allocation
|
page read and write
|
||
279003488000
|
trusted library allocation
|
page read and write
|
||
CC402684000
|
trusted library allocation
|
page read and write
|
||
2790042B1000
|
trusted library allocation
|
page read and write
|
||
3A6C00210000
|
trusted library allocation
|
page read and write
|
||
3A6C0084C000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
279003638000
|
trusted library allocation
|
page read and write
|
||
4745BFE000
|
unkown
|
page readonly
|
||
279002A01000
|
trusted library allocation
|
page read and write
|
||
2790006C2000
|
trusted library allocation
|
page read and write
|
||
279003FA0000
|
trusted library allocation
|
page read and write
|
||
27900405C000
|
trusted library allocation
|
page read and write
|
||
1A4B4F2A000
|
heap
|
page read and write
|
||
279002C88000
|
trusted library allocation
|
page read and write
|
||
27900317C000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
1A4B4E6B000
|
heap
|
page read and write
|
||
1A4B4EB2000
|
heap
|
page read and write
|
||
279003A58000
|
trusted library allocation
|
page read and write
|
||
2790035C0000
|
trusted library allocation
|
page read and write
|
||
474A3FC000
|
stack
|
page read and write
|
||
279003388000
|
trusted library allocation
|
page read and write
|
||
279003C70000
|
trusted library allocation
|
page read and write
|
||
279003A50000
|
trusted library allocation
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
279003C3C000
|
trusted library allocation
|
page read and write
|
||
279004B2B000
|
trusted library allocation
|
page read and write
|
||
CC4025F0000
|
trusted library allocation
|
page read and write
|
||
279002B84000
|
trusted library allocation
|
page read and write
|
||
1F6C002F0000
|
trusted library allocation
|
page read and write
|
||
279002908000
|
trusted library allocation
|
page read and write
|
||
279002504000
|
trusted library allocation
|
page read and write
|
||
4515FFE000
|
unkown
|
page readonly
|
||
3AA000238000
|
trusted library allocation
|
page read and write
|
||
3A6C006D4000
|
trusted library allocation
|
page read and write
|
||
279003BA8000
|
trusted library allocation
|
page read and write
|
||
1A4B4E2C000
|
heap
|
page read and write
|
||
179E0AD0000
|
heap
|
page read and write
|
||
279002354000
|
trusted library allocation
|
page read and write
|
||
23544000
|
heap
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
279002F0C000
|
trusted library allocation
|
page read and write
|
||
450B7FC000
|
stack
|
page read and write
|
||
456BDFE000
|
unkown
|
page readonly
|
||
1A4B4E00000
|
heap
|
page read and write
|
||
3A6C007D0000
|
trusted library allocation
|
page read and write
|
||
279003524000
|
trusted library allocation
|
page read and write
|
||
279002E50000
|
trusted library allocation
|
page read and write
|
||
4570DFE000
|
unkown
|
page readonly
|
||
CC4024A0000
|
trusted library allocation
|
page read and write
|
||
2354D000
|
heap
|
page read and write
|
||
279004118000
|
trusted library allocation
|
page read and write
|
||
279003661000
|
trusted library allocation
|
page read and write
|
||
49B0002F0000
|
trusted library allocation
|
page read and write
|
||
2790029A0000
|
trusted library allocation
|
page read and write
|
||
CC4024FC000
|
trusted library allocation
|
page read and write
|
||
279002C9C000
|
trusted library allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
3AA000390000
|
trusted library allocation
|
page read and write
|
||
279003338000
|
trusted library allocation
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
73E80024C000
|
direct allocation
|
page read and write
|
||
279003A8C000
|
trusted library allocation
|
page read and write
|
||
2790035A8000
|
trusted library allocation
|
page read and write
|
||
3A6C007D4000
|
trusted library allocation
|
page read and write
|
||
279003AA4000
|
trusted library allocation
|
page read and write
|
||
279003ACC000
|
trusted library allocation
|
page read and write
|
||
4743BFE000
|
unkown
|
page readonly
|
||
2790039CC000
|
trusted library allocation
|
page read and write
|
||
3A6C006AC000
|
trusted library allocation
|
page read and write
|
||
279002934000
|
trusted library allocation
|
page read and write
|
||
179E69B0000
|
heap
|
page read and write
|
||
279004B47000
|
trusted library allocation
|
page read and write
|
||
3A6C00850000
|
trusted library allocation
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
279002438000
|
trusted library allocation
|
page read and write
|
||
179E1520000
|
unkown
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
3A6C002B0000
|
trusted library allocation
|
page read and write
|
||
279004071000
|
trusted library allocation
|
page read and write
|
||
279003EA8000
|
trusted library allocation
|
page read and write
|
||
CC4024F0000
|
trusted library allocation
|
page read and write
|
||
3A6C00974000
|
trusted library allocation
|
page read and write
|
||
CC402444000
|
trusted library allocation
|
page read and write
|
||
45077FC000
|
stack
|
page read and write
|
||
279002F24000
|
trusted library allocation
|
page read and write
|
||
27900340C000
|
trusted library allocation
|
page read and write
|
||
279003D90000
|
trusted library allocation
|
page read and write
|
||
3A6C007E0000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
279003CD8000
|
trusted library allocation
|
page read and write
|
||
279002B38000
|
trusted library allocation
|
page read and write
|
||
27900283C000
|
trusted library allocation
|
page read and write
|
||
1A4B6D9E000
|
heap
|
page read and write
|
||
CC40260C000
|
trusted library allocation
|
page read and write
|
||
CC402224000
|
trusted library allocation
|
page read and write
|
||
279003710000
|
trusted library allocation
|
page read and write
|
||
12C400244000
|
direct allocation
|
page read and write
|
||
73E800217000
|
direct allocation
|
page read and write
|
||
2790027A4000
|
trusted library allocation
|
page read and write
|
||
CC402658000
|
trusted library allocation
|
page read and write
|
||
45675FE000
|
stack
|
page read and write
|
||
2790023F4000
|
trusted library allocation
|
page read and write
|
||
279003BC8000
|
trusted library allocation
|
page read and write
|
||
279003A4C000
|
trusted library allocation
|
page read and write
|
||
279002F80000
|
trusted library allocation
|
page read and write
|
||
279003EF4000
|
trusted library allocation
|
page read and write
|
||
45755FA000
|
stack
|
page read and write
|
||
CC402224000
|
trusted library allocation
|
page read and write
|
||
1A4B4EE7000
|
heap
|
page read and write
|
||
2790031D0000
|
trusted library allocation
|
page read and write
|
||
2790022A0000
|
trusted library allocation
|
page read and write
|
||
2790024C4000
|
trusted library allocation
|
page read and write
|
||
3A6C007C0000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
27900408C000
|
trusted library allocation
|
page read and write
|
||
4744BFE000
|
unkown
|
page readonly
|
||
3AA000250000
|
trusted library allocation
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
179E21BA000
|
heap
|
page read and write
|
||
27900250C000
|
trusted library allocation
|
page read and write
|
||
1A4B4E81000
|
heap
|
page read and write
|
||
279002DC8000
|
trusted library allocation
|
page read and write
|
||
179E26E7000
|
heap
|
page read and write
|
||
27900419C000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
179E4813000
|
heap
|
page read and write
|
||
3A6C008F0000
|
trusted library allocation
|
page read and write
|
||
279003E34000
|
trusted library allocation
|
page read and write
|
||
23540000
|
heap
|
page read and write
|
||
2790039CC000
|
trusted library allocation
|
page read and write
|
||
2790023C4000
|
trusted library allocation
|
page read and write
|
||
CC402240000
|
trusted library allocation
|
page read and write
|
||
2790023DC000
|
trusted library allocation
|
page read and write
|
||
279003770000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
279003780000
|
trusted library allocation
|
page read and write
|
||
1F6C00250000
|
trusted library allocation
|
page read and write
|
||
179DED7D000
|
heap
|
page read and write
|
||
3A6C0060C000
|
trusted library allocation
|
page read and write
|
||
279003C8C000
|
trusted library allocation
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
279002D45000
|
trusted library allocation
|
page read and write
|
||
73E800316000
|
direct allocation
|
page read and write
|
||
279004CB8000
|
trusted library allocation
|
page read and write
|
||
279003974000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
279002201000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
279003994000
|
trusted library allocation
|
page read and write
|
||
279004AB4000
|
trusted library allocation
|
page read and write
|
||
3A6C002FC000
|
trusted library allocation
|
page read and write
|
||
27900256C000
|
trusted library allocation
|
page read and write
|
||
2790031A9000
|
trusted library allocation
|
page read and write
|
||
279003B38000
|
trusted library allocation
|
page read and write
|
||
CC4023F4000
|
trusted library allocation
|
page read and write
|
||
73E800234000
|
direct allocation
|
page read and write
|
||
CC402350000
|
trusted library allocation
|
page read and write
|
||
27900305C000
|
trusted library allocation
|
page read and write
|
||
3AA000300000
|
trusted library allocation
|
page read and write
|
||
279004168000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
279003494000
|
trusted library allocation
|
page read and write
|
||
3A6C006F0000
|
trusted library allocation
|
page read and write
|
||
279002C18000
|
trusted library allocation
|
page read and write
|
||
279002354000
|
trusted library allocation
|
page read and write
|
||
23562000
|
heap
|
page read and write
|
||
279004B94000
|
trusted library allocation
|
page read and write
|
||
279003980000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
457EDFE000
|
unkown
|
page readonly
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
3A6C002B8000
|
trusted library allocation
|
page read and write
|
||
12C400303000
|
direct allocation
|
page read and write
|
||
279003558000
|
trusted library allocation
|
page read and write
|
||
279003F60000
|
trusted library allocation
|
page read and write
|
||
279003CC4000
|
trusted library allocation
|
page read and write
|
||
179E21D3000
|
heap
|
page read and write
|
||
279003488000
|
trusted library allocation
|
page read and write
|
||
3AA00032C000
|
trusted library allocation
|
page read and write
|
||
27900318C000
|
trusted library allocation
|
page read and write
|
||
1A4B4EBA000
|
heap
|
page read and write
|
||
279000601000
|
trusted library allocation
|
page read and write
|
||
1F6C002B8000
|
trusted library allocation
|
page read and write
|
||
1A4B4EE7000
|
heap
|
page read and write
|
||
279002B68000
|
trusted library allocation
|
page read and write
|
||
279002E50000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
1A4B4EE7000
|
heap
|
page read and write
|
||
279004AD0000
|
trusted library allocation
|
page read and write
|
||
179E2749000
|
heap
|
page read and write
|
||
49B000235000
|
trusted library allocation
|
page read and write
|
||
234C0000
|
heap
|
page read and write
|
||
472A3FE000
|
stack
|
page read and write
|
||
233AA000
|
heap
|
page read and write
|
||
45157FE000
|
stack
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
2790023C4000
|
trusted library allocation
|
page read and write
|
||
279004C70000
|
trusted library allocation
|
page read and write
|
||
279004244000
|
trusted library allocation
|
page read and write
|
||
179DEDD0000
|
trusted library section
|
page readonly
|
||
1A4B4EC6000
|
heap
|
page read and write
|
||
27900369C000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
279004068000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
2790035E8000
|
trusted library allocation
|
page read and write
|
||
12C400215000
|
direct allocation
|
page read and write
|
||
279004BCE000
|
trusted library allocation
|
page read and write
|
||
1A4B6D1A000
|
heap
|
page read and write
|
||
1D10D000
|
stack
|
page read and write
|
||
45057FE000
|
stack
|
page read and write
|
||
2790025A0000
|
trusted library allocation
|
page read and write
|
||
2790030B8000
|
trusted library allocation
|
page read and write
|
||
2790036CA000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
1A4B4EE7000
|
heap
|
page read and write
|
||
1F6C00288000
|
trusted library allocation
|
page read and write
|
||
279002420000
|
trusted library allocation
|
page read and write
|
||
279003F40000
|
trusted library allocation
|
page read and write
|
||
2790033B4000
|
trusted library allocation
|
page read and write
|
||
12C400220000
|
direct allocation
|
page read and write
|
||
CC402601000
|
trusted library allocation
|
page read and write
|
||
279002EDA000
|
trusted library allocation
|
page read and write
|
||
1F6C002B8000
|
trusted library allocation
|
page read and write
|
||
1F6C00274000
|
trusted library allocation
|
page read and write
|
||
279003550000
|
trusted library allocation
|
page read and write
|
||
279003530000
|
trusted library allocation
|
page read and write
|
||
279002558000
|
trusted library allocation
|
page read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
279003314000
|
trusted library allocation
|
page read and write
|
||
2790039A4000
|
trusted library allocation
|
page read and write
|
||
279003354000
|
trusted library allocation
|
page read and write
|
||
2790026E8000
|
trusted library allocation
|
page read and write
|
||
47283F3000
|
stack
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
279002BE4000
|
trusted library allocation
|
page read and write
|
||
549000
|
unkown
|
page execute and read and write
|
||
3AA0002D0000
|
trusted library allocation
|
page read and write
|
||
2355B000
|
heap
|
page read and write
|
||
279003B48000
|
trusted library allocation
|
page read and write
|
||
4747BFE000
|
unkown
|
page readonly
|
||
179E21D3000
|
heap
|
page read and write
|
||
279003928000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
2790027DC000
|
trusted library allocation
|
page read and write
|
||
279003F8C000
|
trusted library allocation
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
49B000230000
|
trusted library allocation
|
page read and write
|
||
27900421A000
|
trusted library allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
3A6C00801000
|
trusted library allocation
|
page read and write
|
||
6C949000
|
unkown
|
page readonly
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
279004B2F000
|
trusted library allocation
|
page read and write
|
||
279003328000
|
trusted library allocation
|
page read and write
|
||
179E69C3000
|
heap
|
page read and write
|
||
279002524000
|
trusted library allocation
|
page read and write
|
||
279002384000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
27900391C000
|
trusted library allocation
|
page read and write
|
||
27900250C000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
279004060000
|
trusted library allocation
|
page read and write
|
||
3A6C00830000
|
trusted library allocation
|
page read and write
|
||
3AA000248000
|
trusted library allocation
|
page read and write
|
||
CC40239C000
|
trusted library allocation
|
page read and write
|
||
279002884000
|
trusted library allocation
|
page read and write
|
||
3A6C00418000
|
trusted library allocation
|
page read and write
|
||
3A6C0087C000
|
trusted library allocation
|
page read and write
|
||
73E800270000
|
direct allocation
|
page read and write
|
||
3A6C00864000
|
trusted library allocation
|
page read and write
|
||
279002AF4000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
279003EE4000
|
trusted library allocation
|
page read and write
|
||
CC402554000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
179E2749000
|
heap
|
page read and write
|
||
279004228000
|
trusted library allocation
|
page read and write
|
||
279003F0C000
|
trusted library allocation
|
page read and write
|
||
179E279F000
|
heap
|
page read and write
|
||
3A6C0078C000
|
trusted library allocation
|
page read and write
|
||
279002EDC000
|
trusted library allocation
|
page read and write
|
||
3A6C008EC000
|
trusted library allocation
|
page read and write
|
||
27900364C000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
CC402201000
|
trusted library allocation
|
page read and write
|
||
CC402440000
|
trusted library allocation
|
page read and write
|
||
279003314000
|
trusted library allocation
|
page read and write
|
||
27900315C000
|
trusted library allocation
|
page read and write
|
||
179E2749000
|
heap
|
page read and write
|
||
1A4B6D35000
|
heap
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
CC402590000
|
trusted library allocation
|
page read and write
|
||
279003054000
|
trusted library allocation
|
page read and write
|
||
279002E74000
|
trusted library allocation
|
page read and write
|
||
279002B9C000
|
trusted library allocation
|
page read and write
|
||
279002F30000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
2790036A6000
|
trusted library allocation
|
page read and write
|
||
CC4024B0000
|
trusted library allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
279003F30000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page execute and read and write
|
||
179E46D0000
|
trusted library allocation
|
page read and write
|
||
279002254000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
27900315C000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
1A4B4E99000
|
heap
|
page read and write
|
||
279004188000
|
trusted library allocation
|
page read and write
|
||
1A4B4F60000
|
heap
|
page read and write
|
||
279004404000
|
trusted library allocation
|
page read and write
|
||
456E5FB000
|
stack
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
3AA000401000
|
trusted library allocation
|
page read and write
|
||
279003EA4000
|
trusted library allocation
|
page read and write
|
||
279002434000
|
trusted library allocation
|
page read and write
|
||
456F5FC000
|
stack
|
page read and write
|
||
2790028A4000
|
trusted library allocation
|
page read and write
|
||
2355F000
|
heap
|
page read and write
|
||
1F6C00278000
|
trusted library allocation
|
page read and write
|
||
179E2190000
|
heap
|
page read and write
|
||
279003B18000
|
trusted library allocation
|
page read and write
|
||
2790031B4000
|
trusted library allocation
|
page read and write
|
||
CC40244C000
|
trusted library allocation
|
page read and write
|
||
2790041B4000
|
trusted library allocation
|
page read and write
|
||
1A4B4D70000
|
heap
|
page read and write
|
||
279003314000
|
trusted library allocation
|
page read and write
|
||
3A6C0039C000
|
trusted library allocation
|
page read and write
|
||
279003690000
|
trusted library allocation
|
page read and write
|
||
45785FE000
|
stack
|
page read and write
|
||
2790035E4000
|
trusted library allocation
|
page read and write
|
||
2790041E0000
|
trusted library allocation
|
page read and write
|
||
CC4024CC000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
4736BFE000
|
unkown
|
page readonly
|
||
1A4B4E35000
|
heap
|
page read and write
|
||
279000201000
|
trusted library allocation
|
page read and write
|
||
279002ED4000
|
trusted library allocation
|
page read and write
|
||
279004B81000
|
trusted library allocation
|
page read and write
|
||
3A6C008B8000
|
trusted library allocation
|
page read and write
|
||
279003230000
|
trusted library allocation
|
page read and write
|
||
CC4024D8000
|
trusted library allocation
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
1D2A1000
|
heap
|
page read and write
|
||
3AA00060C000
|
trusted library allocation
|
page read and write
|
||
450CFFE000
|
unkown
|
page readonly
|
||
27900405C000
|
trusted library allocation
|
page read and write
|
||
CC4023A8000
|
trusted library allocation
|
page read and write
|
||
CC40257C000
|
trusted library allocation
|
page read and write
|
||
27900433D000
|
trusted library allocation
|
page read and write
|
||
279003AFC000
|
trusted library allocation
|
page read and write
|
||
179E272E000
|
heap
|
page read and write
|
||
27900415C000
|
trusted library allocation
|
page read and write
|
||
279002744000
|
trusted library allocation
|
page read and write
|
||
27900226B000
|
trusted library allocation
|
page read and write
|
||
279003390000
|
trusted library allocation
|
page read and write
|
||
279003618000
|
trusted library allocation
|
page read and write
|
||
279003196000
|
trusted library allocation
|
page read and write
|
||
279003E01000
|
trusted library allocation
|
page read and write
|
||
279002560000
|
trusted library allocation
|
page read and write
|
||
45107FE000
|
stack
|
page read and write
|
||
12C400294000
|
direct allocation
|
page read and write
|
||
2790029D4000
|
trusted library allocation
|
page read and write
|
||
279003430000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
73E800294000
|
direct allocation
|
page read and write
|
||
CC4022A2000
|
trusted library allocation
|
page read and write
|
||
279003CB0000
|
trusted library allocation
|
page read and write
|
||
279002414000
|
trusted library allocation
|
page read and write
|
||
279003EFC000
|
trusted library allocation
|
page read and write
|
||
27900240C000
|
trusted library allocation
|
page read and write
|
||
1A4B6D90000
|
heap
|
page read and write
|
||
CC402670000
|
trusted library allocation
|
page read and write
|
||
179E9161000
|
trusted library section
|
page read and write
|
||
3A6C006BC000
|
trusted library allocation
|
page read and write
|
||
27900282C000
|
trusted library allocation
|
page read and write
|
||
279002A80000
|
trusted library allocation
|
page read and write
|
||
472EBFE000
|
unkown
|
page readonly
|
||
27900364C000
|
trusted library allocation
|
page read and write
|
||
73E8002AC000
|
direct allocation
|
page read and write
|
||
1A4B6D93000
|
heap
|
page read and write
|
||
CC4024E4000
|
trusted library allocation
|
page read and write
|
||
2790042AC000
|
trusted library allocation
|
page read and write
|
||
457ADFE000
|
unkown
|
page readonly
|
||
CC402430000
|
trusted library allocation
|
page read and write
|
||
279002F38000
|
trusted library allocation
|
page read and write
|
||
73E800244000
|
direct allocation
|
page read and write
|
||
49B000270000
|
trusted library allocation
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
2790039CC000
|
trusted library allocation
|
page read and write
|
||
4567DFE000
|
unkown
|
page readonly
|
||
49B000201000
|
trusted library allocation
|
page read and write
|
||
CC402690000
|
trusted library allocation
|
page read and write
|
||
12C400230000
|
direct allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
CC402594000
|
trusted library allocation
|
page read and write
|
||
279003AF8000
|
trusted library allocation
|
page read and write
|
||
6C947000
|
unkown
|
page read and write
|
||
279003630000
|
trusted library allocation
|
page read and write
|
||
279003A98000
|
trusted library allocation
|
page read and write
|
||
4569DFE000
|
unkown
|
page readonly
|
||
179E21BC000
|
heap
|
page read and write
|
||
279003BA4000
|
trusted library allocation
|
page read and write
|
||
73E800230000
|
direct allocation
|
page read and write
|
||
2790041F0000
|
trusted library allocation
|
page read and write
|
||
279002A1C000
|
trusted library allocation
|
page read and write
|
||
179E21D3000
|
heap
|
page read and write
|
||
279002954000
|
trusted library allocation
|
page read and write
|
||
1A4B6DD6000
|
heap
|
page read and write
|
||
1A4B6D10000
|
heap
|
page read and write
|
||
49B000274000
|
trusted library allocation
|
page read and write
|
||
3A6C006AC000
|
trusted library allocation
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
279003AE8000
|
trusted library allocation
|
page read and write
|
||
279003A54000
|
trusted library allocation
|
page read and write
|
||
450A7FE000
|
stack
|
page read and write
|
||
47353FB000
|
stack
|
page read and write
|
||
456ADFE000
|
unkown
|
page readonly
|
||
279003C64000
|
trusted library allocation
|
page read and write
|
||
279003420000
|
trusted library allocation
|
page read and write
|
||
279003731000
|
trusted library allocation
|
page read and write
|
||
2790032E8000
|
trusted library allocation
|
page read and write
|
||
27900400C000
|
trusted library allocation
|
page read and write
|
||
279002C28000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
1A4B4F57000
|
heap
|
page read and write
|
||
179E91C0000
|
trusted library section
|
page read and write
|
||
1A4B6D3B000
|
heap
|
page read and write
|
||
279003BCC000
|
trusted library allocation
|
page read and write
|
||
279002A98000
|
trusted library allocation
|
page read and write
|
||
61E01000
|
direct allocation
|
page execute read
|
||
179E21C9000
|
heap
|
page read and write
|
||
279003309000
|
trusted library allocation
|
page read and write
|
||
27900300C000
|
trusted library allocation
|
page read and write
|
||
1A4B4E9E000
|
heap
|
page read and write
|
||
179E6A0D000
|
heap
|
page read and write
|
||
2790023E8000
|
trusted library allocation
|
page read and write
|
||
3A6C00778000
|
trusted library allocation
|
page read and write
|
||
27900380C000
|
trusted library allocation
|
page read and write
|
||
73E8002E0000
|
direct allocation
|
page read and write
|
||
2790040A6000
|
trusted library allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
279003F98000
|
trusted library allocation
|
page read and write
|
||
279003E8C000
|
trusted library allocation
|
page read and write
|
||
CC400601000
|
trusted library allocation
|
page read and write
|
||
279003C20000
|
trusted library allocation
|
page read and write
|
||
179E6E57000
|
unclassified section
|
page read and write
|
||
279003BA0000
|
trusted library allocation
|
page read and write
|
||
45715FE000
|
stack
|
page read and write
|
||
279002E50000
|
trusted library allocation
|
page read and write
|
||
2790024B4000
|
trusted library allocation
|
page read and write
|
||
279003F14000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
4502FFE000
|
unkown
|
page readonly
|
||
27900257C000
|
trusted library allocation
|
page read and write
|
||
179E278C000
|
heap
|
page read and write
|
||
27900258C000
|
trusted library allocation
|
page read and write
|
||
279003024000
|
trusted library allocation
|
page read and write
|
||
1F6C00260000
|
trusted library allocation
|
page read and write
|
||
45017FB000
|
stack
|
page read and write
|
||
2790023F0000
|
trusted library allocation
|
page read and write
|
||
1A4B4E2E000
|
heap
|
page read and write
|
||
2790039B8000
|
trusted library allocation
|
page read and write
|
||
279004073000
|
trusted library allocation
|
page read and write
|
||
3A6C00424000
|
trusted library allocation
|
page read and write
|
||
179E26D0000
|
heap
|
page read and write
|
||
279003A2C000
|
trusted library allocation
|
page read and write
|
||
2790024B4000
|
trusted library allocation
|
page read and write
|
||
1CFCD000
|
stack
|
page read and write
|
||
CC40248C000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
CC400801000
|
trusted library allocation
|
page read and write
|
||
279003B84000
|
trusted library allocation
|
page read and write
|
||
279003BEC000
|
trusted library allocation
|
page read and write
|
||
279003E30000
|
trusted library allocation
|
page read and write
|
||
279004C44000
|
trusted library allocation
|
page read and write
|
||
279003BE0000
|
trusted library allocation
|
page read and write
|
||
1A4B6DAD000
|
heap
|
page read and write
|
||
2790030E4000
|
trusted library allocation
|
page read and write
|
||
179E27BC000
|
heap
|
page read and write
|
||
279003128000
|
trusted library allocation
|
page read and write
|
||
CC402454000
|
trusted library allocation
|
page read and write
|
||
457CDFE000
|
unkown
|
page readonly
|
||
179E92BD000
|
trusted library section
|
page read and write
|
||
45037FA000
|
stack
|
page read and write
|
||
279002E9C000
|
trusted library allocation
|
page read and write
|
||
45645FE000
|
unkown
|
page read and write
|
||
456C5FC000
|
stack
|
page read and write
|
||
179E91E1000
|
trusted library section
|
page read and write
|
||
CC40220C000
|
trusted library allocation
|
page read and write
|
||
CC402324000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
12C4002D0000
|
direct allocation
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
279002E50000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
1A4B4E6A000
|
heap
|
page read and write
|
||
279002310000
|
trusted library allocation
|
page read and write
|
||
457DDFE000
|
unkown
|
page readonly
|
||
1A4B4EA4000
|
heap
|
page read and write
|
||
CC4024A8000
|
trusted library allocation
|
page read and write
|
||
279004C53000
|
trusted library allocation
|
page read and write
|
||
279003FAC000
|
trusted library allocation
|
page read and write
|
||
4572DFE000
|
unkown
|
page readonly
|
||
279003C30000
|
trusted library allocation
|
page read and write
|
||
279000E01000
|
trusted library allocation
|
page read and write
|
||
4A7E000
|
heap
|
page read and write
|
||
73E800318000
|
direct allocation
|
page read and write
|
||
3A6C008A8000
|
trusted library allocation
|
page read and write
|
||
179E6A24000
|
heap
|
page read and write
|
||
279002928000
|
trusted library allocation
|
page read and write
|
||
279002FA8000
|
trusted library allocation
|
page read and write
|
||
49B0002A4000
|
trusted library allocation
|
page read and write
|
||
457B5FC000
|
stack
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
179E8D5E000
|
trusted library section
|
page read and write
|
||
279001001000
|
trusted library allocation
|
page read and write
|
||
279004169000
|
trusted library allocation
|
page read and write
|
||
279002F94000
|
trusted library allocation
|
page read and write
|
||
27900408C000
|
trusted library allocation
|
page read and write
|
||
279003AD8000
|
trusted library allocation
|
page read and write
|
||
279002C10000
|
trusted library allocation
|
page read and write
|
||
279003770000
|
trusted library allocation
|
page read and write
|
||
CC40227C000
|
trusted library allocation
|
page read and write
|
||
3AA0003C4000
|
trusted library allocation
|
page read and write
|
||
279003E0C000
|
trusted library allocation
|
page read and write
|
||
27900406C000
|
trusted library allocation
|
page read and write
|
||
279004124000
|
trusted library allocation
|
page read and write
|
||
4737BFE000
|
unkown
|
page readonly
|
||
472ABFE000
|
unkown
|
page readonly
|
||
4574DFE000
|
unkown
|
page readonly
|
||
2790040B4000
|
trusted library allocation
|
page read and write
|
||
279002B48000
|
trusted library allocation
|
page read and write
|
||
3AA000201000
|
trusted library allocation
|
page read and write
|
||
3AA0002F4000
|
trusted library allocation
|
page read and write
|
||
279002A54000
|
trusted library allocation
|
page read and write
|
||
279003558000
|
trusted library allocation
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
73E800280000
|
direct allocation
|
page read and write
|
||
73E800250000
|
direct allocation
|
page read and write
|
||
472E3FE000
|
stack
|
page read and write
|
||
279003B24000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
CC402534000
|
trusted library allocation
|
page read and write
|
||
279003626000
|
trusted library allocation
|
page read and write
|
||
4729BFE000
|
unkown
|
page readonly
|
||
CC40241C000
|
trusted library allocation
|
page read and write
|
||
2790033A0000
|
trusted library allocation
|
page read and write
|
||
279004065000
|
trusted library allocation
|
page read and write
|
||
279002D4D000
|
trusted library allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
CC402414000
|
trusted library allocation
|
page read and write
|
||
473B3FE000
|
stack
|
page read and write
|
||
3AA000310000
|
trusted library allocation
|
page read and write
|
||
179E2785000
|
heap
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
27900320C000
|
trusted library allocation
|
page read and write
|
||
279003EC0000
|
trusted library allocation
|
page read and write
|
||
1A4B6D00000
|
heap
|
page read and write
|
||
2790035A9000
|
trusted library allocation
|
page read and write
|
||
279002918000
|
trusted library allocation
|
page read and write
|
||
12C400274000
|
direct allocation
|
page read and write
|
||
1A4B6D21000
|
heap
|
page read and write
|
||
49B0002B0000
|
trusted library allocation
|
page read and write
|
||
3A6C006E8000
|
trusted library allocation
|
page read and write
|
||
279002B77000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
2790031DC000
|
trusted library allocation
|
page read and write
|
||
1CD4F000
|
stack
|
page read and write
|
||
2790039CC000
|
trusted library allocation
|
page read and write
|
||
279004067000
|
trusted library allocation
|
page read and write
|
||
279002BC9000
|
trusted library allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
CC402540000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
45137FD000
|
stack
|
page read and write
|
||
3A6C00288000
|
trusted library allocation
|
page read and write
|
||
2790025C0000
|
trusted library allocation
|
page read and write
|
||
279003629000
|
trusted library allocation
|
page read and write
|
||
47483FE000
|
stack
|
page read and write
|
||
CC400E01000
|
trusted library allocation
|
page read and write
|
||
279002EB8000
|
trusted library allocation
|
page read and write
|
||
279003338000
|
trusted library allocation
|
page read and write
|
||
279000001000
|
trusted library allocation
|
page read and write
|
||
27900272C000
|
trusted library allocation
|
page read and write
|
||
4A73000
|
heap
|
page read and write
|
||
1A4B6DB3000
|
heap
|
page read and write
|
||
179E21C8000
|
heap
|
page read and write
|
||
279003568000
|
trusted library allocation
|
page read and write
|
||
472FBFE000
|
unkown
|
page readonly
|
||
3AA000408000
|
trusted library allocation
|
page read and write
|
||
279002B1D000
|
trusted library allocation
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
CC4022AD000
|
trusted library allocation
|
page read and write
|
||
2790030C0000
|
trusted library allocation
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
279003128000
|
trusted library allocation
|
page read and write
|
||
279002E58000
|
trusted library allocation
|
page read and write
|
||
457D5FC000
|
stack
|
page read and write
|
||
2790030CD000
|
trusted library allocation
|
page read and write
|
||
2790041E0000
|
trusted library allocation
|
page read and write
|
||
1A4B4EBB000
|
heap
|
page read and write
|
||
12C4002AC000
|
direct allocation
|
page read and write
|
||
2790022E4000
|
trusted library allocation
|
page read and write
|
||
2790035B5000
|
trusted library allocation
|
page read and write
|
||
CC402524000
|
trusted library allocation
|
page read and write
|
||
3A6C00250000
|
trusted library allocation
|
page read and write
|
||
27900224C000
|
trusted library allocation
|
page read and write
|
||
179E9150000
|
trusted library section
|
page read and write
|
||
1F6C00210000
|
trusted library allocation
|
page read and write
|
||
179E21CB000
|
heap
|
page read and write
|
||
279003C24000
|
trusted library allocation
|
page read and write
|
||
2790027C8000
|
trusted library allocation
|
page read and write
|
||
3A6C0091C000
|
trusted library allocation
|
page read and write
|
||
CC4022FC000
|
trusted library allocation
|
page read and write
|
||
279003F4C000
|
trusted library allocation
|
page read and write
|
||
27900307C000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
279003EBC000
|
trusted library allocation
|
page read and write
|
||
CC402308000
|
trusted library allocation
|
page read and write
|
||
4566DFE000
|
unkown
|
page readonly
|
||
2790037D9000
|
trusted library allocation
|
page read and write
|
||
27900409C000
|
trusted library allocation
|
page read and write
|
||
456D5FB000
|
stack
|
page read and write
|
||
3A6C0025C000
|
trusted library allocation
|
page read and write
|
||
1F6C00294000
|
trusted library allocation
|
page read and write
|
||
CC402410000
|
trusted library allocation
|
page read and write
|
||
2355D000
|
heap
|
page read and write
|
||
279003934000
|
trusted library allocation
|
page read and write
|
||
CC40235C000
|
trusted library allocation
|
page read and write
|
||
179E7650000
|
trusted library section
|
page read and write
|
||
279003134000
|
trusted library allocation
|
page read and write
|
||
279003A68000
|
trusted library allocation
|
page read and write
|
||
2790032E0000
|
trusted library allocation
|
page read and write
|
||
179E21D1000
|
heap
|
page read and write
|
||
3A6C006E0000
|
trusted library allocation
|
page read and write
|
||
179E7850000
|
trusted library section
|
page read and write
|
||
279003230000
|
trusted library allocation
|
page read and write
|
||
2790035C0000
|
trusted library allocation
|
page read and write
|
||
1F6C002C8000
|
trusted library allocation
|
page read and write
|
||
3A6C00828000
|
trusted library allocation
|
page read and write
|
||
179E8F5E000
|
trusted library section
|
page read and write
|
||
27900220C000
|
trusted library allocation
|
page read and write
|
||
27900240C000
|
trusted library allocation
|
page read and write
|
||
279003F44000
|
trusted library allocation
|
page read and write
|
||
CC402450000
|
trusted library allocation
|
page read and write
|
||
279004118000
|
trusted library allocation
|
page read and write
|
||
4735BFE000
|
unkown
|
page readonly
|
||
2790039A0000
|
trusted library allocation
|
page read and write
|
||
279002EDC000
|
trusted library allocation
|
page read and write
|
||
279003F28000
|
trusted library allocation
|
page read and write
|
||
279002601000
|
trusted library allocation
|
page read and write
|
||
3AA000424000
|
trusted library allocation
|
page read and write
|
||
279003A01000
|
trusted library allocation
|
page read and write
|
||
279004090000
|
trusted library allocation
|
page read and write
|
||
73E800215000
|
direct allocation
|
page read and write
|
||
3AA000338000
|
trusted library allocation
|
page read and write
|
||
279003678000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
27900248C000
|
trusted library allocation
|
page read and write
|
||
279003558000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
279003A6C000
|
trusted library allocation
|
page read and write
|
||
4512FFE000
|
unkown
|
page readonly
|
||
4577DFE000
|
unkown
|
page readonly
|
||
3AA000230000
|
trusted library allocation
|
page read and write
|
||
179E6A30000
|
heap
|
page read and write
|
||
279003684000
|
trusted library allocation
|
page read and write
|
||
1D3A0000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
CC4025D0000
|
trusted library allocation
|
page read and write
|
||
279004B6C000
|
trusted library allocation
|
page read and write
|
||
279003294000
|
trusted library allocation
|
page read and write
|
||
279002E3C000
|
trusted library allocation
|
page read and write
|
||
49B0002A0000
|
trusted library allocation
|
page read and write
|
||
27900437C000
|
trusted library allocation
|
page read and write
|
||
2354D000
|
heap
|
page read and write
|
||
4500FFE000
|
unkown
|
page readonly
|
||
3A6C006C8000
|
trusted library allocation
|
page read and write
|
||
3AA0003AC000
|
trusted library allocation
|
page read and write
|
||
279002CE5000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
unkown
|
page execute and read and write
|
||
57B000
|
unkown
|
page execute and read and write
|
||
2790043F3000
|
trusted library allocation
|
page read and write
|
||
CC4024C0000
|
trusted library allocation
|
page read and write
|
||
179E21C8000
|
heap
|
page read and write
|
||
CC4025B0000
|
trusted library allocation
|
page read and write
|
||
279003918000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
279002424000
|
trusted library allocation
|
page read and write
|
||
279003C0C000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
3AA00032C000
|
trusted library allocation
|
page read and write
|
||
2790035E0000
|
trusted library allocation
|
page read and write
|
||
2790024AC000
|
trusted library allocation
|
page read and write
|
||
279003948000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
73E80021C000
|
direct allocation
|
page read and write
|
||
473C3FE000
|
stack
|
page read and write
|
||
45745FE000
|
stack
|
page read and write
|
||
456CDFE000
|
unkown
|
page readonly
|
||
179E21D2000
|
heap
|
page read and write
|
||
2790042C7000
|
trusted library allocation
|
page read and write
|
||
450AFFE000
|
unkown
|
page readonly
|
||
279003AD4000
|
trusted library allocation
|
page read and write
|
||
279002FA1000
|
trusted library allocation
|
page read and write
|
||
2790023B8000
|
trusted library allocation
|
page read and write
|
||
279004B34000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
279003AA0000
|
trusted library allocation
|
page read and write
|
||
12C400210000
|
direct allocation
|
page read and write
|
||
457F5FD000
|
stack
|
page read and write
|
||
1A4BDC80000
|
trusted library allocation
|
page read and write
|
||
450F7FC000
|
stack
|
page read and write
|
||
279003B1C000
|
trusted library allocation
|
page read and write
|
||
3A6C00404000
|
trusted library allocation
|
page read and write
|
||
73E80031C000
|
direct allocation
|
page read and write
|
||
5A7000
|
unkown
|
page execute and read and write
|
||
279004C28000
|
trusted library allocation
|
page read and write
|
||
1F6C00230000
|
trusted library allocation
|
page read and write
|
||
179E7410000
|
trusted library section
|
page read and write
|
||
179E92F0000
|
trusted library section
|
page read and write
|
||
2790041CC000
|
trusted library allocation
|
page read and write
|
||
3AA000210000
|
trusted library allocation
|
page read and write
|
||
279002354000
|
trusted library allocation
|
page read and write
|
||
CC4023B8000
|
trusted library allocation
|
page read and write
|
||
3A6C008C8000
|
trusted library allocation
|
page read and write
|
||
CC40229E000
|
trusted library allocation
|
page read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
3AA000284000
|
trusted library allocation
|
page read and write
|
||
2790041C4000
|
trusted library allocation
|
page read and write
|
||
279004228000
|
trusted library allocation
|
page read and write
|
||
1A4BF000000
|
heap
|
page read and write
|
||
1A4B6D75000
|
heap
|
page read and write
|
||
279003AC0000
|
trusted library allocation
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
CC402680000
|
trusted library allocation
|
page read and write
|
||
279002860000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
279003494000
|
trusted library allocation
|
page read and write
|
||
CC4024CC000
|
trusted library allocation
|
page read and write
|
||
279003C10000
|
trusted library allocation
|
page read and write
|
||
279004C64000
|
trusted library allocation
|
page read and write
|
||
279000801000
|
trusted library allocation
|
page read and write
|
||
279002F58000
|
trusted library allocation
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
279002E4C000
|
trusted library allocation
|
page read and write
|
||
279003AF4000
|
trusted library allocation
|
page read and write
|
||
279003678000
|
trusted library allocation
|
page read and write
|
||
279002720000
|
trusted library allocation
|
page read and write
|
||
279003550000
|
trusted library allocation
|
page read and write
|
||
73E800201000
|
direct allocation
|
page read and write
|
||
450EFFE000
|
unkown
|
page readonly
|
||
2790024A8000
|
trusted library allocation
|
page read and write
|
||
179DEC98000
|
heap
|
page read and write
|
||
CC4024D8000
|
trusted library allocation
|
page read and write
|
||
488000
|
unkown
|
page readonly
|
||
CC402568000
|
trusted library allocation
|
page read and write
|
||
2790032BC000
|
trusted library allocation
|
page read and write
|
||
1A4B6D39000
|
heap
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
279003CC0000
|
trusted library allocation
|
page read and write
|
||
279003930000
|
trusted library allocation
|
page read and write
|
||
279003328000
|
trusted library allocation
|
page read and write
|
||
279004D54000
|
trusted library allocation
|
page read and write
|
||
23440000
|
trusted library allocation
|
page read and write
|
||
2790032C8000
|
trusted library allocation
|
page read and write
|
||
2790040B8000
|
trusted library allocation
|
page read and write
|
||
179DEE00000
|
heap
|
page read and write
|
||
1A4B6D8E000
|
heap
|
page read and write
|
||
279004344000
|
trusted library allocation
|
page read and write
|
||
179E73B7000
|
unclassified section
|
page read and write
|
||
179E9182000
|
trusted library section
|
page read and write
|
||
279002B28000
|
trusted library allocation
|
page read and write
|
||
179E21C5000
|
heap
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
279004140000
|
trusted library allocation
|
page read and write
|
||
1A4B6C13000
|
heap
|
page read and write
|
||
2790026D4000
|
trusted library allocation
|
page read and write
|
||
3AA000358000
|
trusted library allocation
|
page read and write
|
||
450E7FA000
|
stack
|
page read and write
|
||
2790022B8000
|
trusted library allocation
|
page read and write
|
||
73E8002D8000
|
direct allocation
|
page read and write
|
||
179E72E3000
|
trusted library section
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
2790039D0000
|
trusted library allocation
|
page read and write
|
||
3AA0002D8000
|
trusted library allocation
|
page read and write
|
||
279002500000
|
trusted library allocation
|
page read and write
|
||
45705FB000
|
stack
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
279003588000
|
trusted library allocation
|
page read and write
|
||
1A4B4D20000
|
heap
|
page read and write
|
||
279003288000
|
trusted library allocation
|
page read and write
|
||
CC400001000
|
trusted library allocation
|
page read and write
|
||
456DDFE000
|
unkown
|
page readonly
|
||
279003B74000
|
trusted library allocation
|
page read and write
|
||
27900308C000
|
trusted library allocation
|
page read and write
|
||
3A6C00201000
|
trusted library allocation
|
page read and write
|
||
49B0002D8000
|
trusted library allocation
|
page read and write
|
||
6C8A0000
|
unkown
|
page readonly
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
47463FE000
|
stack
|
page read and write
|
||
2790039B8000
|
trusted library allocation
|
page read and write
|
||
279003679000
|
trusted library allocation
|
page read and write
|
||
CC4023E8000
|
trusted library allocation
|
page read and write
|
||
279003201000
|
trusted library allocation
|
page read and write
|
||
279002ED4000
|
trusted library allocation
|
page read and write
|
||
23459000
|
heap
|
page read and write
|
||
1D24E000
|
stack
|
page read and write
|
||
27900394C000
|
trusted library allocation
|
page read and write
|
||
279003F00000
|
trusted library allocation
|
page read and write
|
||
2B91000
|
unkown
|
page readonly
|
||
CC4022D8000
|
trusted library allocation
|
page read and write
|
||
3A6C008D8000
|
trusted library allocation
|
page read and write
|
||
1A4B4F02000
|
heap
|
page read and write
|
||
279003601000
|
trusted library allocation
|
page read and write
|
||
27900315C000
|
trusted library allocation
|
page read and write
|
||
27900408C000
|
trusted library allocation
|
page read and write
|
||
1A4B4D90000
|
heap
|
page read and write
|
||
CC4024E4000
|
trusted library allocation
|
page read and write
|
||
47323FE000
|
stack
|
page read and write
|
||
279003F44000
|
trusted library allocation
|
page read and write
|
||
279003F30000
|
trusted library allocation
|
page read and write
|
||
45117FE000
|
stack
|
page read and write
|
||
279003354000
|
trusted library allocation
|
page read and write
|
||
1A4B6D71000
|
heap
|
page read and write
|
||
279003150000
|
trusted library allocation
|
page read and write
|
||
279003F90000
|
trusted library allocation
|
page read and write
|
||
27900242C000
|
trusted library allocation
|
page read and write
|
||
450BFFE000
|
unkown
|
page readonly
|
||
279003F68000
|
trusted library allocation
|
page read and write
|
||
3AA000374000
|
trusted library allocation
|
page read and write
|
||
279003FBC000
|
trusted library allocation
|
page read and write
|
||
279002401000
|
trusted library allocation
|
page read and write
|
||
27900258C000
|
trusted library allocation
|
page read and write
|
||
1A4B4D50000
|
heap
|
page readonly
|
||
279002F48000
|
trusted library allocation
|
page read and write
|
||
2790029C4000
|
trusted library allocation
|
page read and write
|
||
12C400201000
|
direct allocation
|
page read and write
|
||
3AA0003A8000
|
trusted library allocation
|
page read and write
|
||
279003BDC000
|
trusted library allocation
|
page read and write
|
||
279002900000
|
trusted library allocation
|
page read and write
|
||
179DED8A000
|
heap
|
page read and write
|
||
279004B59000
|
trusted library allocation
|
page read and write
|
||
473A3FD000
|
stack
|
page read and write
|
||
279004090000
|
trusted library allocation
|
page read and write
|
||
1F6C002A0000
|
trusted library allocation
|
page read and write
|
||
CC4025E3000
|
trusted library allocation
|
page read and write
|
||
3A6C002ED000
|
trusted library allocation
|
page read and write
|
||
1A4B4E9E000
|
heap
|
page read and write
|
||
279002304000
|
trusted library allocation
|
page read and write
|
||
47363FC000
|
stack
|
page read and write
|
||
474E3FE000
|
stack
|
page read and write
|
||
1A4BEEF0000
|
trusted library allocation
|
page read and write
|
||
279002F64000
|
trusted library allocation
|
page read and write
|
||
3A6C006F4000
|
trusted library allocation
|
page read and write
|
||
279003288000
|
trusted library allocation
|
page read and write
|
||
179E2774000
|
heap
|
page read and write
|
||
2790041D4000
|
trusted library allocation
|
page read and write
|
||
279004AF8000
|
trusted library allocation
|
page read and write
|
||
279003B90000
|
trusted library allocation
|
page read and write
|
||
2790039E0000
|
trusted library allocation
|
page read and write
|
||
3A6C00238000
|
trusted library allocation
|
page read and write
|
||
45725FE000
|
stack
|
page read and write
|
||
CC4023F0000
|
trusted library allocation
|
page read and write
|
||
2790023C4000
|
trusted library allocation
|
page read and write
|
||
27900309C000
|
trusted library allocation
|
page read and write
|
||
279003C5C000
|
trusted library allocation
|
page read and write
|
||
3AA000350000
|
trusted library allocation
|
page read and write
|
||
45665FE000
|
stack
|
page read and write
|
||
279002BC8000
|
trusted library allocation
|
page read and write
|
||
279004118000
|
trusted library allocation
|
page read and write
|
||
1F6C002B8000
|
trusted library allocation
|
page read and write
|
||
279003C80000
|
trusted library allocation
|
page read and write
|
||
2790023D4000
|
trusted library allocation
|
page read and write
|
||
2790029EC000
|
trusted library allocation
|
page read and write
|
||
279003670000
|
trusted library allocation
|
page read and write
|
||
279002DA0000
|
trusted library allocation
|
page read and write
|
||
CC400C01000
|
trusted library allocation
|
page read and write
|
||
3A6C0039C000
|
trusted library allocation
|
page read and write
|
||
279003C48000
|
trusted library allocation
|
page read and write
|
||
1A4B6D37000
|
heap
|
page read and write
|
||
2790037E0000
|
trusted library allocation
|
page read and write
|
||
3A6C00700000
|
trusted library allocation
|
page read and write
|
||
3A6C0040C000
|
trusted library allocation
|
page read and write
|
||
234B4000
|
heap
|
page read and write
|
||
2790039B8000
|
trusted library allocation
|
page read and write
|
||
279004AB6000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
3AA000380000
|
trusted library allocation
|
page read and write
|
||
3A6C00818000
|
trusted library allocation
|
page read and write
|
||
1A4B6DD4000
|
heap
|
page read and write
|
||
2790043D7000
|
trusted library allocation
|
page read and write
|
||
279003B58000
|
trusted library allocation
|
page read and write
|
||
12C400270000
|
direct allocation
|
page read and write
|
||
CC402458000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
45067FD000
|
stack
|
page read and write
|
||
3A6C0095C000
|
trusted library allocation
|
page read and write
|
||
3A6C00248000
|
trusted library allocation
|
page read and write
|
||
279004001000
|
trusted library allocation
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
4571DFE000
|
unkown
|
page readonly
|
||
CC40243C000
|
trusted library allocation
|
page read and write
|
||
279003F08000
|
trusted library allocation
|
page read and write
|
||
279003918000
|
trusted library allocation
|
page read and write
|
||
1A4B79C0000
|
unkown
|
page read and write
|
||
3A6C007BC000
|
trusted library allocation
|
page read and write
|
||
CC402484000
|
trusted library allocation
|
page read and write
|
||
2790039CE000
|
trusted library allocation
|
page read and write
|
||
3A6C00728000
|
trusted library allocation
|
page read and write
|
||
179E2789000
|
heap
|
page read and write
|
||
CC402340000
|
trusted library allocation
|
page read and write
|
||
474EBFE000
|
unkown
|
page readonly
|
||
27900280C000
|
trusted library allocation
|
page read and write
|
||
279002E01000
|
trusted library allocation
|
page read and write
|
||
27900257C000
|
trusted library allocation
|
page read and write
|
||
3A6C00964000
|
trusted library allocation
|
page read and write
|
||
3AA000344000
|
trusted library allocation
|
page read and write
|
||
179DED7D000
|
heap
|
page read and write
|
||
2790024F0000
|
trusted library allocation
|
page read and write
|
||
279002EEC000
|
trusted library allocation
|
page read and write
|
||
3A6C00408000
|
trusted library allocation
|
page read and write
|
||
279002FE4000
|
trusted library allocation
|
page read and write
|
||
27900399C000
|
trusted library allocation
|
page read and write
|
||
179E69EA000
|
heap
|
page read and write
|
||
2790026B0000
|
trusted library allocation
|
page read and write
|
||
279002410000
|
trusted library allocation
|
page read and write
|
||
2790035A8000
|
trusted library allocation
|
page read and write
|
||
279003BF0000
|
trusted library allocation
|
page read and write
|
||
1A4B4F2A000
|
heap
|
page read and write
|
||
27900362E000
|
trusted library allocation
|
page read and write
|
||
179DED66000
|
heap
|
page read and write
|
||
CC402534000
|
trusted library allocation
|
page read and write
|
||
1F6C00264000
|
trusted library allocation
|
page read and write
|
||
4503FFE000
|
unkown
|
page readonly
|
||
279002D48000
|
trusted library allocation
|
page read and write
|
||
279002B7B000
|
trusted library allocation
|
page read and write
|
||
279002ED4000
|
trusted library allocation
|
page read and write
|
||
179DEE05000
|
heap
|
page read and write
|
||
2790023A4000
|
trusted library allocation
|
page read and write
|
||
179E21D5000
|
heap
|
page read and write
|
||
2790037D4000
|
trusted library allocation
|
page read and write
|
||
279003E48000
|
trusted library allocation
|
page read and write
|
||
279002DD0000
|
trusted library allocation
|
page read and write
|
||
3AA000308000
|
trusted library allocation
|
page read and write
|
||
2790022D4000
|
trusted library allocation
|
page read and write
|
||
2790028F0000
|
trusted library allocation
|
page read and write
|
||
2C3A000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
CC4022B0000
|
trusted library allocation
|
page read and write
|
||
279003F78000
|
trusted library allocation
|
page read and write
|
||
279003598000
|
trusted library allocation
|
page read and write
|
||
27900307C000
|
trusted library allocation
|
page read and write
|
||
1D3A0000
|
heap
|
page read and write
|
||
473ABFE000
|
unkown
|
page readonly
|
||
279004C50000
|
trusted library allocation
|
page read and write
|
||
1CB4F000
|
stack
|
page read and write
|
||
2790033E4000
|
trusted library allocation
|
page read and write
|
||
CC402314000
|
trusted library allocation
|
page read and write
|
||
45635EF000
|
stack
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
1F6C00294000
|
trusted library allocation
|
page read and write
|
||
3A6C006E8000
|
trusted library allocation
|
page read and write
|
||
CC4024A4000
|
trusted library allocation
|
page read and write
|
||
CC4022C0000
|
trusted library allocation
|
page read and write
|
||
27900392C000
|
trusted library allocation
|
page read and write
|
||
1A4B6DBB000
|
heap
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
279003C54000
|
trusted library allocation
|
page read and write
|
||
279003338000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
279003F58000
|
trusted library allocation
|
page read and write
|
||
CC402424000
|
trusted library allocation
|
page read and write
|
||
179DEB50000
|
heap
|
page read and write
|
||
73E800290000
|
direct allocation
|
page read and write
|
||
4508FFE000
|
unkown
|
page readonly
|
||
279003822000
|
trusted library allocation
|
page read and write
|
||
279002CBB000
|
trusted library allocation
|
page read and write
|
||
279004388000
|
trusted library allocation
|
page read and write
|
||
CC4024F0000
|
trusted library allocation
|
page read and write
|
||
179E2400000
|
heap
|
page read and write
|
||
27900252C000
|
trusted library allocation
|
page read and write
|
||
179E8F50000
|
trusted library section
|
page read and write
|
||
179DED7A000
|
heap
|
page read and write
|
||
1F6C00210000
|
trusted library allocation
|
page read and write
|
||
1A4B4E99000
|
heap
|
page read and write
|
||
279003401000
|
trusted library allocation
|
page read and write
|
||
4E6000
|
unkown
|
page execute and read and write
|
||
73E8002C0000
|
direct allocation
|
page read and write
|
||
279004A01000
|
trusted library allocation
|
page read and write
|
||
279004604000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279003428000
|
trusted library allocation
|
page read and write
|
||
279000458000
|
trusted library allocation
|
page read and write
|
||
1A4B6D42000
|
heap
|
page read and write
|
||
CC40238C000
|
trusted library allocation
|
page read and write
|
||
279002EFC000
|
trusted library allocation
|
page read and write
|
||
279002BBE000
|
trusted library allocation
|
page read and write
|
||
CC402514000
|
trusted library allocation
|
page read and write
|
||
279003B00000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
1F6C00201000
|
trusted library allocation
|
page read and write
|
||
457FDFE000
|
unkown
|
page readonly
|
||
179E91D0000
|
trusted library section
|
page read and write
|
||
179E2734000
|
heap
|
page read and write
|
||
1A4B6D39000
|
heap
|
page read and write
|
||
3A6C0020C000
|
trusted library allocation
|
page read and write
|
||
279003F10000
|
trusted library allocation
|
page read and write
|
||
3A6C00874000
|
trusted library allocation
|
page read and write
|
||
279003001000
|
trusted library allocation
|
page read and write
|
||
3A6C00880000
|
trusted library allocation
|
page read and write
|
||
179E2758000
|
heap
|
page read and write
|
||
23303000
|
heap
|
page read and write
|
||
279003AA8000
|
trusted library allocation
|
page read and write
|
||
279002BF0000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
179E21A0000
|
heap
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
279003690000
|
trusted library allocation
|
page read and write
|
||
1A4BF002000
|
heap
|
page read and write
|
||
2790031C4000
|
trusted library allocation
|
page read and write
|
||
1F6C00294000
|
trusted library allocation
|
page read and write
|
||
73E800311000
|
direct allocation
|
page read and write
|
||
279002B0C000
|
trusted library allocation
|
page read and write
|
||
279002CBE000
|
trusted library allocation
|
page read and write
|
||
3A6C0071C000
|
trusted library allocation
|
page read and write
|
||
279002BD4000
|
trusted library allocation
|
page read and write
|
||
2790033D8000
|
trusted library allocation
|
page read and write
|
||
179E2990000
|
trusted library section
|
page read and write
|
||
279003DD0000
|
trusted library allocation
|
page read and write
|
||
279002EA8000
|
trusted library allocation
|
page read and write
|
||
1A4B6D26000
|
heap
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
4568DFE000
|
unkown
|
page readonly
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279003F74000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
2790041F4000
|
trusted library allocation
|
page read and write
|
||
2790026BC000
|
trusted library allocation
|
page read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
279003679000
|
trusted library allocation
|
page read and write
|
||
279003CA0000
|
trusted library allocation
|
page read and write
|
||
3A6C00844000
|
trusted library allocation
|
page read and write
|
||
CC402440000
|
trusted library allocation
|
page read and write
|
||
279003A38000
|
trusted library allocation
|
page read and write
|
||
279004090000
|
trusted library allocation
|
page read and write
|
||
279000A01000
|
trusted library allocation
|
page read and write
|
||
2790041C4000
|
trusted library allocation
|
page read and write
|
||
73E800212000
|
direct allocation
|
page read and write
|
||
1F6C00294000
|
trusted library allocation
|
page read and write
|
||
179DED90000
|
trusted library allocation
|
page read and write
|
||
27900427D000
|
trusted library allocation
|
page read and write
|
||
2790025B0000
|
trusted library allocation
|
page read and write
|
||
179E21BF000
|
heap
|
page read and write
|
||
2790024CC000
|
trusted library allocation
|
page read and write
|
||
279003A20000
|
trusted library allocation
|
page read and write
|
||
279002D38000
|
trusted library allocation
|
page read and write
|
||
1F6C00248000
|
trusted library allocation
|
page read and write
|
||
179E26FF000
|
heap
|
page read and write
|
||
3AA0003BC000
|
trusted library allocation
|
page read and write
|
||
279002540000
|
trusted library allocation
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
279003B20000
|
trusted library allocation
|
page read and write
|
||
47403FE000
|
stack
|
page read and write
|
||
279002FC0000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
179E21D3000
|
heap
|
page read and write
|
||
279003DAC000
|
trusted library allocation
|
page read and write
|
||
73E8002D0000
|
direct allocation
|
page read and write
|
||
279004118000
|
trusted library allocation
|
page read and write
|
||
179E21C3000
|
heap
|
page read and write
|
||
2790041F0000
|
trusted library allocation
|
page read and write
|
||
2790043DA000
|
trusted library allocation
|
page read and write
|
||
49B0002F8000
|
trusted library allocation
|
page read and write
|
||
279003C6C000
|
trusted library allocation
|
page read and write
|
||
279003C7C000
|
trusted library allocation
|
page read and write
|
||
279003624000
|
trusted library allocation
|
page read and write
|
||
279004C01000
|
trusted library allocation
|
page read and write
|
||
45097FD000
|
stack
|
page read and write
|
||
279002CC4000
|
trusted library allocation
|
page read and write
|
||
279003678000
|
trusted library allocation
|
page read and write
|
||
1D290000
|
heap
|
page read and write
|
||
3A6C002F4000
|
trusted library allocation
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
279002610000
|
trusted library allocation
|
page read and write
|
||
279002E84000
|
trusted library allocation
|
page read and write
|
||
3AA00039C000
|
trusted library allocation
|
page read and write
|
||
450DFFE000
|
unkown
|
page readonly
|
||
2790032FE000
|
trusted library allocation
|
page read and write
|
||
CC402290000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
179E4800000
|
trusted library allocation
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
474B3FD000
|
stack
|
page read and write
|
||
27900235C000
|
trusted library allocation
|
page read and write
|
||
73E800308000
|
direct allocation
|
page read and write
|
||
3AA0003C0000
|
trusted library allocation
|
page read and write
|
||
279002EC4000
|
trusted library allocation
|
page read and write
|
||
27900371D000
|
trusted library allocation
|
page read and write
|
||
CC402510000
|
trusted library allocation
|
page read and write
|
||
27900311D000
|
trusted library allocation
|
page read and write
|
||
4749BFE000
|
unkown
|
page readonly
|
||
279003A1C000
|
trusted library allocation
|
page read and write
|
||
73E8002A8000
|
direct allocation
|
page read and write
|
||
27900360D000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279003FDC000
|
trusted library allocation
|
page read and write
|
||
1F6C002B4000
|
trusted library allocation
|
page read and write
|
||
179E21C7000
|
heap
|
page read and write
|
||
279002654000
|
trusted library allocation
|
page read and write
|
||
279003C38000
|
trusted library allocation
|
page read and write
|
||
1A4B4EFF000
|
heap
|
page read and write
|
||
3AA0002C4000
|
trusted library allocation
|
page read and write
|
||
668000
|
unkown
|
page execute and read and write
|
||
12C400250000
|
direct allocation
|
page read and write
|
||
4732BFE000
|
unkown
|
page readonly
|
||
3A6C009C4000
|
trusted library allocation
|
page read and write
|
||
1F6C002A8000
|
trusted library allocation
|
page read and write
|
||
279003F2C000
|
trusted library allocation
|
page read and write
|
||
48B000
|
unkown
|
page write copy
|
||
2790036BC000
|
trusted library allocation
|
page read and write
|
||
279002518000
|
trusted library allocation
|
page read and write
|
||
279003B70000
|
trusted library allocation
|
page read and write
|
||
CC4024D8000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
179E0AD3000
|
heap
|
page read and write
|
||
3AA00040C000
|
trusted library allocation
|
page read and write
|
||
3AA000360000
|
trusted library allocation
|
page read and write
|
||
279003308000
|
trusted library allocation
|
page read and write
|
||
474ABFE000
|
unkown
|
page readonly
|
||
3A6C006C8000
|
trusted library allocation
|
page read and write
|
||
179E6E92000
|
trusted library allocation
|
page read and write
|
||
2790040F4000
|
trusted library allocation
|
page read and write
|
||
457BDFE000
|
unkown
|
page readonly
|
||
514000
|
unkown
|
page execute and read and write
|
||
2790032D4000
|
trusted library allocation
|
page read and write
|
||
472B3FE000
|
stack
|
page read and write
|
||
CC40236C000
|
trusted library allocation
|
page read and write
|
||
279002538000
|
trusted library allocation
|
page read and write
|
||
279003658000
|
trusted library allocation
|
page read and write
|
||
CC40257C000
|
trusted library allocation
|
page read and write
|
||
279004238000
|
trusted library allocation
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
49B000220000
|
trusted library allocation
|
page read and write
|
||
1D2A0000
|
heap
|
page read and write
|
||
279003BAC000
|
trusted library allocation
|
page read and write
|
||
3AA000288000
|
trusted library allocation
|
page read and write
|
||
2CF6000
|
heap
|
page read and write
|
||
49B000294000
|
trusted library allocation
|
page read and write
|
||
456EDFE000
|
unkown
|
page readonly
|
||
279002D08000
|
trusted library allocation
|
page read and write
|
||
2790024B4000
|
trusted library allocation
|
page read and write
|
||
1A4B4F13000
|
heap
|
page read and write
|
||
279003180000
|
trusted library allocation
|
page read and write
|
||
3A6C00878000
|
trusted library allocation
|
page read and write
|
||
47293FE000
|
unkown
|
page read and write
|
||
279004274000
|
trusted library allocation
|
page read and write
|
||
59B000
|
unkown
|
page execute and read and write
|
||
279002E88000
|
trusted library allocation
|
page read and write
|
||
2790023D8000
|
trusted library allocation
|
page read and write
|
||
49B0002E4000
|
trusted library allocation
|
page read and write
|
||
1D2A1000
|
heap
|
page read and write
|
||
279002E0C000
|
trusted library allocation
|
page read and write
|
||
179DED4B000
|
heap
|
page read and write
|
||
279002CD4000
|
trusted library allocation
|
page read and write
|
||
3A6C00790000
|
trusted library allocation
|
page read and write
|
||
279002CF8000
|
trusted library allocation
|
page read and write
|
||
279002F30000
|
trusted library allocation
|
page read and write
|
||
279003638000
|
trusted library allocation
|
page read and write
|
||
279002F9C000
|
trusted library allocation
|
page read and write
|
||
2790023E0000
|
trusted library allocation
|
page read and write
|
||
1A4B4E34000
|
heap
|
page read and write
|
||
279003F04000
|
trusted library allocation
|
page read and write
|
||
179E4657000
|
unclassified section
|
page read and write
|
||
2790022F4000
|
trusted library allocation
|
page read and write
|
||
1A4B4F2F000
|
heap
|
page read and write
|
||
279000401000
|
trusted library allocation
|
page read and write
|
||
279002B18000
|
trusted library allocation
|
page read and write
|
||
49B0002C8000
|
trusted library allocation
|
page read and write
|
||
3A6C008E4000
|
trusted library allocation
|
page read and write
|
||
279002D44000
|
trusted library allocation
|
page read and write
|
||
2790031A4000
|
trusted library allocation
|
page read and write
|
||
279003BF4000
|
trusted library allocation
|
page read and write
|
||
2790024A4000
|
trusted library allocation
|
page read and write
|
||
2790025C5000
|
trusted library allocation
|
page read and write
|
||
3A6C00848000
|
trusted library allocation
|
page read and write
|
||
27900316C000
|
trusted library allocation
|
page read and write
|
||
279004BC7000
|
trusted library allocation
|
page read and write
|
||
45685FE000
|
stack
|
page read and write
|
||
23452000
|
heap
|
page read and write
|
||
279003040000
|
trusted library allocation
|
page read and write
|
||
279003DD0000
|
trusted library allocation
|
page read and write
|
||
CC402418000
|
trusted library allocation
|
page read and write
|
||
279003524000
|
trusted library allocation
|
page read and write
|
||
279003B5C000
|
trusted library allocation
|
page read and write
|
||
279004084000
|
trusted library allocation
|
page read and write
|
||
279002801000
|
trusted library allocation
|
page read and write
|
||
1A4B6D91000
|
heap
|
page read and write
|
||
CC402390000
|
trusted library allocation
|
page read and write
|
||
49B000248000
|
trusted library allocation
|
page read and write
|
||
279003FC0000
|
trusted library allocation
|
page read and write
|
||
4564DFE000
|
unkown
|
page readonly
|
||
179E21C8000
|
heap
|
page read and write
|
||
3A6C00918000
|
trusted library allocation
|
page read and write
|
||
73E8002D8000
|
direct allocation
|
page read and write
|
||
279004BEE000
|
trusted library allocation
|
page read and write
|
||
279003BBC000
|
trusted library allocation
|
page read and write
|
||
179E918E000
|
trusted library section
|
page read and write
|
||
279004CA4000
|
trusted library allocation
|
page read and write
|
||
279003ED4000
|
trusted library allocation
|
page read and write
|
||
3AA0002F1000
|
trusted library allocation
|
page read and write
|
||
279003EA0000
|
trusted library allocation
|
page read and write
|
||
179E27D0000
|
trusted library section
|
page read and write
|
||
12C40024C000
|
direct allocation
|
page read and write
|
||
279003B4C000
|
trusted library allocation
|
page read and write
|
||
2790024A8000
|
trusted library allocation
|
page read and write
|
||
73E800328000
|
direct allocation
|
page read and write
|
||
27900320C000
|
trusted library allocation
|
page read and write
|
||
2790023EC000
|
trusted library allocation
|
page read and write
|
||
3A6C0082C000
|
trusted library allocation
|
page read and write
|
||
CC4025C0000
|
trusted library allocation
|
page read and write
|
||
2790041AC000
|
trusted library allocation
|
page read and write
|
||
4513FFE000
|
unkown
|
page readonly
|
||
6C901000
|
unkown
|
page readonly
|
||
45087FD000
|
stack
|
page read and write
|
||
279003AD0000
|
trusted library allocation
|
page read and write
|
||
CC402514000
|
trusted library allocation
|
page read and write
|
||
1A4B6DAC000
|
heap
|
page read and write
|
||
2790039B8000
|
trusted library allocation
|
page read and write
|
||
27900258C000
|
trusted library allocation
|
page read and write
|
||
CC402434000
|
trusted library allocation
|
page read and write
|
||
2790031A8000
|
trusted library allocation
|
page read and write
|
||
279004224000
|
trusted library allocation
|
page read and write
|
||
1A4B6D37000
|
heap
|
page read and write
|
||
49B00020C000
|
trusted library allocation
|
page read and write
|
||
279003288000
|
trusted library allocation
|
page read and write
|
||
3AA0003A0000
|
trusted library allocation
|
page read and write
|
||
279002DB4000
|
trusted library allocation
|
page read and write
|
||
279003494000
|
trusted library allocation
|
page read and write
|
||
2790022C8000
|
trusted library allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
1F6C00235000
|
trusted library allocation
|
page read and write
|
||
179E21CC000
|
heap
|
page read and write
|
||
1A4B6D4F000
|
heap
|
page read and write
|
||
472F3FE000
|
stack
|
page read and write
|
||
3A6C00960000
|
trusted library allocation
|
page read and write
|
||
179E6A2A000
|
heap
|
page read and write
|
||
CC4025F9000
|
trusted library allocation
|
page read and write
|
||
2B91000
|
unkown
|
page readonly
|
||
279002EDC000
|
trusted library allocation
|
page read and write
|
||
1CECE000
|
stack
|
page read and write
|
||
CC402401000
|
trusted library allocation
|
page read and write
|
||
47473FE000
|
stack
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
CC4024F0000
|
trusted library allocation
|
page read and write
|
||
179E26F1000
|
heap
|
page read and write
|
||
2790037D9000
|
trusted library allocation
|
page read and write
|
||
3A6C0085C000
|
trusted library allocation
|
page read and write
|
||
279002C01000
|
trusted library allocation
|
page read and write
|
||
49B0002F4000
|
trusted library allocation
|
page read and write
|
||
4578DFE000
|
unkown
|
page readonly
|
||
CC402458000
|
trusted library allocation
|
page read and write
|
||
279003B8C000
|
trusted library allocation
|
page read and write
|
||
279003E58000
|
trusted library allocation
|
page read and write
|
||
3AA000404000
|
trusted library allocation
|
page read and write
|
||
279002960000
|
trusted library allocation
|
page read and write
|
||
3AA000430000
|
trusted library allocation
|
page read and write
|
||
2790023F8000
|
trusted library allocation
|
page read and write
|
||
2355D000
|
heap
|
page read and write
|
||
12C400234000
|
direct allocation
|
page read and write
|
||
279003FBC000
|
trusted library allocation
|
page read and write
|
||
3A6C008E8000
|
trusted library allocation
|
page read and write
|
||
3A6C008AC000
|
trusted library allocation
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
23540000
|
trusted library allocation
|
page read and write
|
||
CC401001000
|
trusted library allocation
|
page read and write
|
||
1A4B4F2F000
|
heap
|
page read and write
|
||
179DEDA0000
|
trusted library allocation
|
page read and write
|
||
CC40267C000
|
trusted library allocation
|
page read and write
|
||
648000
|
unkown
|
page execute and read and write
|
||
2D30000
|
heap
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
1A4B6D3B000
|
heap
|
page read and write
|
||
279002D48000
|
trusted library allocation
|
page read and write
|
||
49B000250000
|
trusted library allocation
|
page read and write
|
||
279002ED4000
|
trusted library allocation
|
page read and write
|
||
CC400201000
|
trusted library allocation
|
page read and write
|
||
279004280000
|
trusted library allocation
|
page read and write
|
||
CC4023CC000
|
trusted library allocation
|
page read and write
|
||
1A4B4EB8000
|
heap
|
page read and write
|
||
279002C28000
|
trusted library allocation
|
page read and write
|
||
47493FE000
|
stack
|
page read and write
|
||
2790035E4000
|
trusted library allocation
|
page read and write
|
||
279002DD8000
|
trusted library allocation
|
page read and write
|
||
4748BFE000
|
unkown
|
page readonly
|
||
23559000
|
heap
|
page read and write
|
||
2790036A5000
|
trusted library allocation
|
page read and write
|
||
47373FE000
|
stack
|
page read and write
|
||
279002A78000
|
trusted library allocation
|
page read and write
|
||
279002ADC000
|
trusted library allocation
|
page read and write
|
||
27900254C000
|
trusted library allocation
|
page read and write
|
||
2790039E4000
|
trusted library allocation
|
page read and write
|
||
3A6C006AC000
|
trusted library allocation
|
page read and write
|
||
3A6C008F4000
|
trusted library allocation
|
page read and write
|
||
2790040F4000
|
trusted library allocation
|
page read and write
|
||
279003AB8000
|
trusted library allocation
|
page read and write
|
||
279002298000
|
trusted library allocation
|
page read and write
|
||
12C4002DC000
|
direct allocation
|
page read and write
|
||
1A4B4E9F000
|
heap
|
page read and write
|
||
279002AC8000
|
trusted library allocation
|
page read and write
|
||
279002A0C000
|
trusted library allocation
|
page read and write
|
||
279003EF0000
|
trusted library allocation
|
page read and write
|
||
CC4024C0000
|
trusted library allocation
|
page read and write
|
||
179E27A4000
|
heap
|
page read and write
|
||
2C3E000
|
heap
|
page read and write
|
||
279004090000
|
trusted library allocation
|
page read and write
|
||
457C5FA000
|
stack
|
page read and write
|
||
2790039E8000
|
trusted library allocation
|
page read and write
|
||
279002A90000
|
trusted library allocation
|
page read and write
|
||
2790036BC000
|
trusted library allocation
|
page read and write
|
||
279003A0C000
|
trusted library allocation
|
page read and write
|
||
279004A98000
|
trusted library allocation
|
page read and write
|
||
12C400260000
|
direct allocation
|
page read and write
|
||
49B000260000
|
trusted library allocation
|
page read and write
|
||
12C400217000
|
direct allocation
|
page read and write
|
||
279003938000
|
trusted library allocation
|
page read and write
|
||
27900257C000
|
trusted library allocation
|
page read and write
|
||
CC402230000
|
trusted library allocation
|
page read and write
|
||
279003ED0000
|
trusted library allocation
|
page read and write
|
||
27900378E000
|
trusted library allocation
|
page read and write
|
||
179E21CF000
|
heap
|
page read and write
|
||
49B0002C0000
|
trusted library allocation
|
page read and write
|
||
1A4B4DE0000
|
trusted library section
|
page readonly
|
||
279003B04000
|
trusted library allocation
|
page read and write
|
||
473BBFE000
|
unkown
|
page readonly
|
||
2345E000
|
heap
|
page read and write
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
195000
|
stack
|
page read and write
|
||
179E2734000
|
heap
|
page read and write
|
||
1A4B4EA6000
|
heap
|
page read and write
|
||
1A4B6D42000
|
heap
|
page read and write
|
||
1A4B6C02000
|
heap
|
page read and write
|
||
3A6C00248000
|
trusted library allocation
|
page read and write
|
||
179E21B9000
|
heap
|
page read and write
|
||
1A4B4EBD000
|
heap
|
page read and write
|
||
279003DAC000
|
trusted library allocation
|
page read and write
|
||
279003E3C000
|
trusted library allocation
|
page read and write
|
||
23564000
|
heap
|
page read and write
|
||
4579DFE000
|
unkown
|
page readonly
|
||
3A6C008C4000
|
trusted library allocation
|
page read and write
|
||
4575DFE000
|
unkown
|
page readonly
|
||
179E2795000
|
heap
|
page read and write
|
||
179E27C7000
|
heap
|
page read and write
|
There are 1836 hidden memdumps, click here to show them.