Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0HUxKfIvSV.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0HUxKfIvSV.exe_20efba58e27eb82cc3aa7c4a35eaa55b9aaa49f2_5d26a63a_be2bf83d-60d4-4b52-86b0-49811e1707df\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1904.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Oct 29 23:30:33 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A9B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D5B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vaHFhUMFeORvODihvYyD.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\0HUxKfIvSV.exe
|
"C:\Users\user\Desktop\0HUxKfIvSV.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2444 --field-trial-handle=2224,i,14967276885741329325,4792044077249876975,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6904 -s 1704
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://thirtjo13vt.top/v1/upload.php
|
46.173.214.92
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/6755U
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://anglebug.com/5750)
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://www.google.com/Char:i3
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://duckduckgo.com/chrome_newtab&
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
http://anglebug.com/3498:
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://anglebug.com/4551F
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://thirtjo13vt.top/v1/uploaE_
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/29708
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
thirtjo13vt.top
|
46.173.214.92
|
||
home.thirtjo13vt.top
|
46.173.214.92
|
||
www.google.com
|
142.250.186.132
|
||
241.42.69.40.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.173.214.92
|
thirtjo13vt.top
|
Russian Federation
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.186.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
ProgramId
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
FileId
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
LongPathHash
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Name
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
OriginalFileName
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Publisher
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Version
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
BinFileVersion
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
BinaryType
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
ProductName
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
ProductVersion
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
LinkDate
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
BinProductVersion
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
AppxPackageFullName
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Size
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Language
|
||
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
275802750000
|
trusted library allocation
|
page read and write
|
||
27580314C000
|
trusted library allocation
|
page read and write
|
||
36D000
|
stack
|
page read and write
|
||
275802A58000
|
trusted library allocation
|
page read and write
|
||
1DC3000
|
heap
|
page read and write
|
||
5D30007B4000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802EBC000
|
trusted library allocation
|
page read and write
|
||
41C9000
|
heap
|
page read and write
|
||
5D30003EC000
|
trusted library allocation
|
page read and write
|
||
4241000
|
heap
|
page read and write
|
||
84645FB000
|
stack
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
845BDFE000
|
unkown
|
page readonly
|
||
2758028E4000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
275802A0C000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
8459DFE000
|
unkown
|
page readonly
|
||
275803034000
|
trusted library allocation
|
page read and write
|
||
8460DFE000
|
unkown
|
page readonly
|
||
16E4002C0000
|
trusted library allocation
|
page read and write
|
||
2A2C00303000
|
direct allocation
|
page read and write
|
||
4202000
|
heap
|
page read and write
|
||
237CD691000
|
heap
|
page read and write
|
||
1DC3000
|
heap
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
237D37D7000
|
unclassified section
|
page read and write
|
||
2758028FB000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
2758028BC000
|
trusted library allocation
|
page read and write
|
||
275802D70000
|
trusted library allocation
|
page read and write
|
||
2758023EC000
|
trusted library allocation
|
page read and write
|
||
8453DFE000
|
unkown
|
page readonly
|
||
275802E88000
|
trusted library allocation
|
page read and write
|
||
5D300033C000
|
trusted library allocation
|
page read and write
|
||
275802960000
|
trusted library allocation
|
page read and write
|
||
275803070000
|
trusted library allocation
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
5D300039C000
|
trusted library allocation
|
page read and write
|
||
237CDCAC000
|
heap
|
page read and write
|
||
275802394000
|
trusted library allocation
|
page read and write
|
||
275802C7C000
|
trusted library allocation
|
page read and write
|
||
237CDE30000
|
trusted library section
|
page read and write
|
||
4171000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
EF25000
|
heap
|
page read and write
|
||
275802E9C000
|
trusted library allocation
|
page read and write
|
||
2758023C8000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275802AC0000
|
trusted library allocation
|
page read and write
|
||
16E4002E4000
|
trusted library allocation
|
page read and write
|
||
237CBED3000
|
heap
|
page read and write
|
||
5D30007D0000
|
trusted library allocation
|
page read and write
|
||
5D3000698000
|
trusted library allocation
|
page read and write
|
||
275802538000
|
trusted library allocation
|
page read and write
|
||
237CA228000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
16E4002A0000
|
trusted library allocation
|
page read and write
|
||
275802618000
|
trusted library allocation
|
page read and write
|
||
275802560000
|
trusted library allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
2758028AC000
|
trusted library allocation
|
page read and write
|
||
275802540000
|
trusted library allocation
|
page read and write
|
||
5D3000700000
|
trusted library allocation
|
page read and write
|
||
2758031B4000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
2A2C002E4000
|
direct allocation
|
page read and write
|
||
41AB000
|
heap
|
page read and write
|
||
275802801000
|
trusted library allocation
|
page read and write
|
||
275802280000
|
trusted library allocation
|
page read and write
|
||
275802494000
|
trusted library allocation
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275802500000
|
trusted library allocation
|
page read and write
|
||
87F000
|
unkown
|
page read and write
|
||
4367000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
2A2C00274000
|
direct allocation
|
page read and write
|
||
237D3D40000
|
trusted library section
|
page read and write
|
||
275802590000
|
trusted library allocation
|
page read and write
|
||
237D4540000
|
trusted library section
|
page read and write
|
||
5D30002F4000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237D4410000
|
trusted library section
|
page read and write
|
||
84625FE000
|
stack
|
page read and write
|
||
43DC000
|
heap
|
page read and write
|
||
275803064000
|
trusted library allocation
|
page read and write
|
||
16E400235000
|
trusted library allocation
|
page read and write
|
||
5D300035C000
|
trusted library allocation
|
page read and write
|
||
5D30002FC000
|
trusted library allocation
|
page read and write
|
||
237CD696000
|
heap
|
page read and write
|
||
237CA230000
|
trusted library allocation
|
page read and write
|
||
6C31F000
|
unkown
|
page readonly
|
||
2A2C00294000
|
direct allocation
|
page read and write
|
||
275802E40000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
27580235C000
|
trusted library allocation
|
page read and write
|
||
84435FE000
|
stack
|
page read and write
|
||
2A2C00217000
|
direct allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
41F2000
|
heap
|
page read and write
|
||
5D3000364000
|
trusted library allocation
|
page read and write
|
||
4203000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
2758023F0000
|
trusted library allocation
|
page read and write
|
||
8444DFE000
|
unkown
|
page readonly
|
||
275802FD4000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page read and write
|
||
5D300075C000
|
trusted library allocation
|
page read and write
|
||
237CDC87000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
5D3000210000
|
trusted library allocation
|
page read and write
|
||
8462DFE000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CDC45000
|
heap
|
page read and write
|
||
275802334000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
237D4443000
|
trusted library section
|
page read and write
|
||
41C2000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CA315000
|
heap
|
page read and write
|
||
843DDFE000
|
unkown
|
page readonly
|
||
5D3000354000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
237CD677000
|
heap
|
page read and write
|
||
275800F56000
|
trusted library allocation
|
page read and write
|
||
237CDC9B000
|
heap
|
page read and write
|
||
5D30006C4000
|
trusted library allocation
|
page read and write
|
||
27580220C000
|
trusted library allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
8448DFE000
|
unkown
|
page readonly
|
||
237CA240000
|
trusted library allocation
|
page read and write
|
||
1D56000
|
heap
|
page read and write
|
||
275802EEC000
|
trusted library allocation
|
page read and write
|
||
27580294A000
|
trusted library allocation
|
page read and write
|
||
275802FB8000
|
trusted library allocation
|
page read and write
|
||
843C5FE000
|
stack
|
page read and write
|
||
16E400278000
|
trusted library allocation
|
page read and write
|
||
2758030E0000
|
trusted library allocation
|
page read and write
|
||
4315000
|
heap
|
page read and write
|
||
237D37E0000
|
heap
|
page read and write
|
||
275802B0C000
|
trusted library allocation
|
page read and write
|
||
84425FB000
|
stack
|
page read and write
|
||
27580257C000
|
trusted library allocation
|
page read and write
|
||
237CD660000
|
heap
|
page read and write
|
||
1477000
|
unkown
|
page readonly
|
||
4346000
|
heap
|
page read and write
|
||
237CD695000
|
heap
|
page read and write
|
||
2758029D8000
|
trusted library allocation
|
page read and write
|
||
8461DFE000
|
unkown
|
page readonly
|
||
40AF000
|
heap
|
page read and write
|
||
5D3000601000
|
trusted library allocation
|
page read and write
|
||
27580229E000
|
trusted library allocation
|
page read and write
|
||
275802E64000
|
trusted library allocation
|
page read and write
|
||
275802594000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802830000
|
trusted library allocation
|
page read and write
|
||
275802E3C000
|
trusted library allocation
|
page read and write
|
||
5D3000694000
|
trusted library allocation
|
page read and write
|
||
84595FE000
|
stack
|
page read and write
|
||
425F000
|
heap
|
page read and write
|
||
4185000
|
heap
|
page read and write
|
||
16E400264000
|
trusted library allocation
|
page read and write
|
||
843B5FE000
|
unkown
|
page read and write
|
||
2758030E4000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
4243000
|
heap
|
page read and write
|
||
275803020000
|
trusted library allocation
|
page read and write
|
||
84525FC000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
413B000
|
heap
|
page read and write
|
||
1DC3000
|
heap
|
page read and write
|
||
2758028C4000
|
trusted library allocation
|
page read and write
|
||
237CD6AB000
|
heap
|
page read and write
|
||
5D3000704000
|
trusted library allocation
|
page read and write
|
||
275802621000
|
trusted library allocation
|
page read and write
|
||
275802318000
|
trusted library allocation
|
page read and write
|
||
4253000
|
heap
|
page read and write
|
||
2758028D4000
|
trusted library allocation
|
page read and write
|
||
275803058000
|
trusted library allocation
|
page read and write
|
||
275802F1C000
|
trusted library allocation
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
5D3000368000
|
trusted library allocation
|
page read and write
|
||
148C000
|
unkown
|
page write copy
|
||
237CD6BC000
|
heap
|
page read and write
|
||
237CA20A000
|
heap
|
page read and write
|
||
275802B48000
|
trusted library allocation
|
page read and write
|
||
4151000
|
heap
|
page read and write
|
||
2758023E4000
|
trusted library allocation
|
page read and write
|
||
237CD6AB000
|
heap
|
page read and write
|
||
2758022A3000
|
trusted library allocation
|
page read and write
|
||
27580315C000
|
trusted library allocation
|
page read and write
|
||
415E000
|
heap
|
page read and write
|
||
40AF000
|
heap
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
43EA000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
275802978000
|
trusted library allocation
|
page read and write
|
||
2758024F3000
|
trusted library allocation
|
page read and write
|
||
845E5FE000
|
stack
|
page read and write
|
||
2A2C0020C000
|
direct allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
8445DFE000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802E6C000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D3000750000
|
trusted library allocation
|
page read and write
|
||
237D43D2000
|
trusted library section
|
page read and write
|
||
133E000
|
unkown
|
page readonly
|
||
275802F64000
|
trusted library allocation
|
page read and write
|
||
421C000
|
heap
|
page read and write
|
||
2758024A8000
|
trusted library allocation
|
page read and write
|
||
237CF8C4000
|
trusted library allocation
|
page read and write
|
||
16E400260000
|
trusted library allocation
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
275802434000
|
trusted library allocation
|
page read and write
|
||
27580237C000
|
trusted library allocation
|
page read and write
|
||
275802494000
|
trusted library allocation
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
419A000
|
heap
|
page read and write
|
||
2A2C00290000
|
direct allocation
|
page read and write
|
||
844A5FE000
|
stack
|
page read and write
|
||
8458DFE000
|
unkown
|
page readonly
|
||
2758027AC000
|
trusted library allocation
|
page read and write
|
||
275802414000
|
trusted library allocation
|
page read and write
|
||
2758030B0000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
84565FC000
|
stack
|
page read and write
|
||
1D9D000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD6B7000
|
heap
|
page read and write
|
||
5D3000758000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275800401000
|
trusted library allocation
|
page read and write
|
||
2758022DC000
|
trusted library allocation
|
page read and write
|
||
5D3000718000
|
trusted library allocation
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
40A6000
|
heap
|
page read and write
|
||
275803104000
|
trusted library allocation
|
page read and write
|
||
5D30006D4000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
5D30006B8000
|
trusted library allocation
|
page read and write
|
||
1D41000
|
heap
|
page read and write
|
||
275802D30000
|
trusted library allocation
|
page read and write
|
||
275802A48000
|
trusted library allocation
|
page read and write
|
||
27580250C000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
237CD6BF000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
4236000
|
heap
|
page read and write
|
||
2758023B4000
|
trusted library allocation
|
page read and write
|
||
2758028E4000
|
trusted library allocation
|
page read and write
|
||
275801001000
|
trusted library allocation
|
page read and write
|
||
2A2C002DC000
|
direct allocation
|
page read and write
|
||
27580302C000
|
trusted library allocation
|
page read and write
|
||
237CD695000
|
heap
|
page read and write
|
||
1491000
|
unkown
|
page readonly
|
||
275802518000
|
trusted library allocation
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
237CA0E0000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
84495FE000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275802518000
|
trusted library allocation
|
page read and write
|
||
237CD6A4000
|
heap
|
page read and write
|
||
237CA225000
|
heap
|
page read and write
|
||
275802628000
|
trusted library allocation
|
page read and write
|
||
2758029A5000
|
trusted library allocation
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
422A000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
16E4002B0000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
5D3000760000
|
trusted library allocation
|
page read and write
|
||
4170000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
40A0000
|
heap
|
page read and write
|
||
237CD691000
|
heap
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
5D3000640000
|
trusted library allocation
|
page read and write
|
||
845D5FE000
|
stack
|
page read and write
|
||
40AC000
|
heap
|
page read and write
|
||
2758023B4000
|
trusted library allocation
|
page read and write
|
||
E64A000
|
heap
|
page read and write
|
||
5D3000230000
|
trusted library allocation
|
page read and write
|
||
237CDEB7000
|
unclassified section
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802274000
|
trusted library allocation
|
page read and write
|
||
275802500000
|
trusted library allocation
|
page read and write
|
||
16E400288000
|
trusted library allocation
|
page read and write
|
||
275802C58000
|
trusted library allocation
|
page read and write
|
||
275802BAC000
|
trusted library allocation
|
page read and write
|
||
8468DFE000
|
unkown
|
page readonly
|
||
16E400238000
|
trusted library allocation
|
page read and write
|
||
2758023A0000
|
trusted library allocation
|
page read and write
|
||
6C36C000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
1D4B000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
275802DC0000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275802E34000
|
trusted library allocation
|
page read and write
|
||
275802B68000
|
trusted library allocation
|
page read and write
|
||
1D99000
|
heap
|
page read and write
|
||
40A2000
|
heap
|
page read and write
|
||
275802F8C000
|
trusted library allocation
|
page read and write
|
||
237D37E3000
|
heap
|
page read and write
|
||
5D30007C8000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CD68D000
|
heap
|
page read and write
|
||
237CDC28000
|
heap
|
page read and write
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
845CDFE000
|
unkown
|
page readonly
|
||
237CD679000
|
heap
|
page read and write
|
||
237C9FF0000
|
heap
|
page read and write
|
||
237CA21D000
|
heap
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
275802F7C000
|
trusted library allocation
|
page read and write
|
||
275802D1C000
|
trusted library allocation
|
page read and write
|
||
2A2C002A8000
|
direct allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
275802E40000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
275802FAC000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
275803144000
|
trusted library allocation
|
page read and write
|
||
5D3000330000
|
trusted library allocation
|
page read and write
|
||
27580301F000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275800450000
|
trusted library allocation
|
page read and write
|
||
556F000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D3000424000
|
trusted library allocation
|
page read and write
|
||
84685FE000
|
stack
|
page read and write
|
||
2758023E8000
|
trusted library allocation
|
page read and write
|
||
844CDFE000
|
unkown
|
page readonly
|
||
1DC3000
|
heap
|
page read and write
|
||
5D3000248000
|
trusted library allocation
|
page read and write
|
||
4195000
|
heap
|
page read and write
|
||
5D3000310000
|
trusted library allocation
|
page read and write
|
||
2758024FB000
|
trusted library allocation
|
page read and write
|
||
16E4002B0000
|
trusted library allocation
|
page read and write
|
||
5D3000354000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page read and write
|
||
2A2C00284000
|
direct allocation
|
page read and write
|
||
5D30002E4000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
275802E0C000
|
trusted library allocation
|
page read and write
|
||
5D3000664000
|
trusted library allocation
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
237D1E00000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page write copy
|
||
1DA3000
|
heap
|
page read and write
|
||
237CD692000
|
heap
|
page read and write
|
||
2758030AC000
|
trusted library allocation
|
page read and write
|
||
844F5FD000
|
stack
|
page read and write
|
||
2758028CF000
|
trusted library allocation
|
page read and write
|
||
237CDC9F000
|
heap
|
page read and write
|
||
844C5FA000
|
stack
|
page read and write
|
||
40AD000
|
heap
|
page read and write
|
||
16E4002C0000
|
trusted library allocation
|
page read and write
|
||
275803114000
|
trusted library allocation
|
page read and write
|
||
41BC000
|
heap
|
page read and write
|
||
5D3000330000
|
trusted library allocation
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
275802688000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
5D3000620000
|
trusted library allocation
|
page read and write
|
||
2758024B4000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
16E400294000
|
trusted library allocation
|
page read and write
|
||
5D30007CC000
|
trusted library allocation
|
page read and write
|
||
2758030FC000
|
trusted library allocation
|
page read and write
|
||
84555FB000
|
stack
|
page read and write
|
||
1DC1000
|
heap
|
page read and write
|
||
164E000
|
heap
|
page read and write
|
||
16E4002A0000
|
trusted library allocation
|
page read and write
|
||
237CDC9D000
|
heap
|
page read and write
|
||
275802EE4000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
275802F48000
|
trusted library allocation
|
page read and write
|
||
40AB000
|
heap
|
page read and write
|
||
5D300069C000
|
trusted library allocation
|
page read and write
|
||
42ED000
|
heap
|
page read and write
|
||
2758025B4000
|
trusted library allocation
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
6C31D000
|
unkown
|
page read and write
|
||
5D3000658000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
27580234C000
|
trusted library allocation
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
84535FC000
|
stack
|
page read and write
|
||
2758022EC000
|
trusted library allocation
|
page read and write
|
||
275800001000
|
trusted library allocation
|
page read and write
|
||
5D30006F0000
|
trusted library allocation
|
page read and write
|
||
275802F40000
|
trusted library allocation
|
page read and write
|
||
27580285C000
|
trusted library allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
275802BC4000
|
trusted library allocation
|
page read and write
|
||
5D3000668000
|
trusted library allocation
|
page read and write
|
||
275802DB0000
|
trusted library allocation
|
page read and write
|
||
2758024F0000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
84485FE000
|
stack
|
page read and write
|
||
2758028F0000
|
trusted library allocation
|
page read and write
|
||
275802955000
|
trusted library allocation
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
5D3000724000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
275802F98000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
845C5FE000
|
stack
|
page read and write
|
||
1D61000
|
heap
|
page read and write
|
||
8456DFE000
|
unkown
|
page readonly
|
||
16E40020D000
|
trusted library allocation
|
page read and write
|
||
41F5000
|
heap
|
page read and write
|
||
275802EE4000
|
trusted library allocation
|
page read and write
|
||
27580254C000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CDBEF000
|
heap
|
page read and write
|
||
275802B2C000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802AE4000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
3AA000
|
stack
|
page read and write
|
||
5D3000320000
|
trusted library allocation
|
page read and write
|
||
237CDC6F000
|
heap
|
page read and write
|
||
1D51000
|
heap
|
page read and write
|
||
237CD695000
|
heap
|
page read and write
|
||
8440DFE000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CA204000
|
heap
|
page read and write
|
||
4211000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
413B000
|
heap
|
page read and write
|
||
275802EFC000
|
trusted library allocation
|
page read and write
|
||
237D4590000
|
trusted library section
|
page read and write
|
||
2758023B4000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
2A2C002EC000
|
direct allocation
|
page read and write
|
||
27580280C000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
275802968000
|
trusted library allocation
|
page read and write
|
||
2A2C00260000
|
direct allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
40A6000
|
heap
|
page read and write
|
||
4257000
|
heap
|
page read and write
|
||
275802201000
|
trusted library allocation
|
page read and write
|
||
5D3000418000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802498000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
84615FE000
|
stack
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
16E4002C0000
|
trusted library allocation
|
page read and write
|
||
5D3000320000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
4170000
|
heap
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
5D3000201000
|
trusted library allocation
|
page read and write
|
||
275802A34000
|
trusted library allocation
|
page read and write
|
||
275802F6C000
|
trusted library allocation
|
page read and write
|
||
237CD68C000
|
heap
|
page read and write
|
||
843A5EF000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
16E4002B0000
|
trusted library allocation
|
page read and write
|
||
275802EAC000
|
trusted library allocation
|
page read and write
|
||
237CA21E000
|
heap
|
page read and write
|
||
237CDB20000
|
trusted library section
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
237D479E000
|
trusted library section
|
page read and write
|
||
84405FD000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
843EDFE000
|
unkown
|
page readonly
|
||
8465DFE000
|
unkown
|
page readonly
|
||
237CD68A000
|
heap
|
page read and write
|
||
845FDFE000
|
unkown
|
page readonly
|
||
275802BF0000
|
trusted library allocation
|
page read and write
|
||
5D300020C000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD68F000
|
heap
|
page read and write
|
||
27580250C000
|
trusted library allocation
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
275802C90000
|
trusted library allocation
|
page read and write
|
||
2A2C0024C000
|
direct allocation
|
page read and write
|
||
4212000
|
heap
|
page read and write
|
||
16E400248000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
heap
|
page read and write
|
||
8467DFE000
|
unkown
|
page readonly
|
||
4157000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
84445FA000
|
stack
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275802694000
|
trusted library allocation
|
page read and write
|
||
2758027C0000
|
trusted library allocation
|
page read and write
|
||
275802C34000
|
trusted library allocation
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
2758023F8000
|
trusted library allocation
|
page read and write
|
||
237CD679000
|
heap
|
page read and write
|
||
237CA0D0000
|
heap
|
page readonly
|
||
237CD688000
|
heap
|
page read and write
|
||
84475FE000
|
stack
|
page read and write
|
||
5D30006EC000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
27580236C000
|
trusted library allocation
|
page read and write
|
||
2758026E0000
|
trusted library allocation
|
page read and write
|
||
237CD67C000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
27580307C000
|
trusted library allocation
|
page read and write
|
||
275802CC8000
|
trusted library allocation
|
page read and write
|
||
8449DFE000
|
unkown
|
page readonly
|
||
630000
|
heap
|
page read and write
|
||
275802D10000
|
trusted library allocation
|
page read and write
|
||
41F4000
|
heap
|
page read and write
|
||
5D30002B8000
|
trusted library allocation
|
page read and write
|
||
237CD650000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
237CD679000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
237CA130000
|
heap
|
page read and write
|
||
5D300085C000
|
trusted library allocation
|
page read and write
|
||
40A4000
|
heap
|
page read and write
|
||
5D3000404000
|
trusted library allocation
|
page read and write
|
||
16E400274000
|
trusted library allocation
|
page read and write
|
||
275802A9C000
|
trusted library allocation
|
page read and write
|
||
237CA225000
|
heap
|
page read and write
|
||
40AC000
|
heap
|
page read and write
|
||
5D3000744000
|
trusted library allocation
|
page read and write
|
||
237CD697000
|
heap
|
page read and write
|
||
237D450D000
|
trusted library section
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275802E01000
|
trusted library allocation
|
page read and write
|
||
422D000
|
heap
|
page read and write
|
||
275802F30000
|
trusted library allocation
|
page read and write
|
||
843F5FE000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
6C368000
|
unkown
|
page readonly
|
||
237D43B1000
|
trusted library section
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
5D3000614000
|
trusted library allocation
|
page read and write
|
||
237CA310000
|
heap
|
page read and write
|
||
1DA5000
|
heap
|
page read and write
|
||
275802DA8000
|
trusted library allocation
|
page read and write
|
||
84605FE000
|
stack
|
page read and write
|
||
4133000
|
heap
|
page read and write
|
||
275802FC0000
|
trusted library allocation
|
page read and write
|
||
237CBED0000
|
heap
|
page read and write
|
||
5D30002B0000
|
trusted library allocation
|
page read and write
|
||
2758031A4000
|
trusted library allocation
|
page read and write
|
||
2758030A0000
|
trusted library allocation
|
page read and write
|
||
237D2220000
|
trusted library allocation
|
page read and write
|
||
844E5FA000
|
stack
|
page read and write
|
||
16E4002C0000
|
trusted library allocation
|
page read and write
|
||
275803134000
|
trusted library allocation
|
page read and write
|
||
417E000
|
heap
|
page read and write
|
||
5D30006E8000
|
trusted library allocation
|
page read and write
|
||
2758023DC000
|
trusted library allocation
|
page read and write
|
||
84545FC000
|
stack
|
page read and write
|
||
5D30002D4000
|
trusted library allocation
|
page read and write
|
||
275802A6C000
|
trusted library allocation
|
page read and write
|
||
275802710000
|
trusted library allocation
|
page read and write
|
||
42D8000
|
heap
|
page read and write
|
||
8451DFE000
|
unkown
|
page readonly
|
||
275802D9C000
|
trusted library allocation
|
page read and write
|
||
5D300035C000
|
trusted library allocation
|
page read and write
|
||
237CD691000
|
heap
|
page read and write
|
||
5D300033C000
|
trusted library allocation
|
page read and write
|
||
237CA1D1000
|
heap
|
page read and write
|
||
275802778000
|
trusted library allocation
|
page read and write
|
||
40A0000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
5D3000408000
|
trusted library allocation
|
page read and write
|
||
8446DFE000
|
unkown
|
page readonly
|
||
275802F50000
|
trusted library allocation
|
page read and write
|
||
40A8000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
43F2000
|
heap
|
page read and write
|
||
8450DFE000
|
unkown
|
page readonly
|
||
275802558000
|
trusted library allocation
|
page read and write
|
||
2758024C0000
|
trusted library allocation
|
page read and write
|
||
5D3000788000
|
trusted library allocation
|
page read and write
|
||
4157000
|
heap
|
page read and write
|
||
27580300C000
|
trusted library allocation
|
page read and write
|
||
5D30006FC000
|
trusted library allocation
|
page read and write
|
||
1DAF000
|
heap
|
page read and write
|
||
275802498000
|
trusted library allocation
|
page read and write
|
||
237CF8E2000
|
trusted library allocation
|
page read and write
|
||
237CD692000
|
heap
|
page read and write
|
||
237CDC79000
|
heap
|
page read and write
|
||
84455FB000
|
stack
|
page read and write
|
||
84695FE000
|
stack
|
page read and write
|
||
16E4002F0000
|
trusted library allocation
|
page read and write
|
||
16E400201000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
1D56000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
40A5000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CDBC0000
|
heap
|
page read and write
|
||
5D30006B0000
|
trusted library allocation
|
page read and write
|
||
5D3000734000
|
trusted library allocation
|
page read and write
|
||
237CC920000
|
unkown
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
16E4002C0000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
84665FE000
|
stack
|
page read and write
|
||
275802538000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
2758024A4000
|
trusted library allocation
|
page read and write
|
||
5D3000374000
|
trusted library allocation
|
page read and write
|
||
8454DFE000
|
unkown
|
page readonly
|
||
40A3000
|
heap
|
page read and write
|
||
5D3000430000
|
trusted library allocation
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
275803001000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
5D3000770000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
275802490000
|
trusted library allocation
|
page read and write
|
||
275802CF0000
|
trusted library allocation
|
page read and write
|
||
237CDC97000
|
heap
|
page read and write
|
||
3CCC000
|
heap
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
3C61000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275800201000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
5D3000630000
|
trusted library allocation
|
page read and write
|
||
237CA202000
|
heap
|
page read and write
|
||
5D30006B4000
|
trusted library allocation
|
page read and write
|
||
275802F0C000
|
trusted library allocation
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
2A2C00230000
|
direct allocation
|
page read and write
|
||
16E4002C8000
|
trusted library allocation
|
page read and write
|
||
237CDC95000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
27580242C000
|
trusted library allocation
|
page read and write
|
||
843D5FE000
|
stack
|
page read and write
|
||
8464DFE000
|
unkown
|
page readonly
|
||
237CDC49000
|
heap
|
page read and write
|
||
5D3000330000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D30006CC000
|
trusted library allocation
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
8443DFE000
|
unkown
|
page readonly
|
||
423E000
|
heap
|
page read and write
|
||
84465FC000
|
stack
|
page read and write
|
||
275802FF8000
|
trusted library allocation
|
page read and write
|
||
27580294F000
|
trusted library allocation
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
2A2C00201000
|
direct allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
275802CFC000
|
trusted library allocation
|
page read and write
|
||
2A2C00210000
|
direct allocation
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
844ADFE000
|
unkown
|
page readonly
|
||
27580249A000
|
trusted library allocation
|
page read and write
|
||
5D30006AC000
|
trusted library allocation
|
page read and write
|
||
27580256C000
|
trusted library allocation
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
275802498000
|
trusted library allocation
|
page read and write
|
||
2758026BC000
|
trusted library allocation
|
page read and write
|
||
27580304C000
|
trusted library allocation
|
page read and write
|
||
27580246C000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
2758028F5000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
237CD690000
|
heap
|
page read and write
|
||
2758024B4000
|
trusted library allocation
|
page read and write
|
||
5D3000220000
|
trusted library allocation
|
page read and write
|
||
237CD6A3000
|
heap
|
page read and write
|
||
16E4002A0000
|
trusted library allocation
|
page read and write
|
||
41BA000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237D43A0000
|
trusted library section
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
84575FD000
|
stack
|
page read and write
|
||
41C7000
|
heap
|
page read and write
|
||
275803124000
|
trusted library allocation
|
page read and write
|
||
2758029B0000
|
trusted library allocation
|
page read and write
|
||
237CD6AB000
|
heap
|
page read and write
|
||
275802494000
|
trusted library allocation
|
page read and write
|
||
27580241C000
|
trusted library allocation
|
page read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
2758026EC000
|
trusted library allocation
|
page read and write
|
||
237CBEB0000
|
heap
|
page read and write
|
||
40A4000
|
heap
|
page read and write
|
||
275802C0C000
|
trusted library allocation
|
page read and write
|
||
237CA212000
|
heap
|
page read and write
|
||
275803041000
|
trusted library allocation
|
page read and write
|
||
2758023D4000
|
trusted library allocation
|
page read and write
|
||
237CDBB0000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
42B7000
|
heap
|
page read and write
|
||
275802698000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CDAD0000
|
trusted library section
|
page read and write
|
||
237CD684000
|
heap
|
page read and write
|
||
275802C24000
|
trusted library allocation
|
page read and write
|
||
275802ED4000
|
trusted library allocation
|
page read and write
|
||
275802410000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
5D3000348000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275800A01000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
8455DFE000
|
unkown
|
page readonly
|
||
275803168000
|
trusted library allocation
|
page read and write
|
||
5D3000238000
|
trusted library allocation
|
page read and write
|
||
237CD686000
|
heap
|
page read and write
|
||
8463DFE000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D3000610000
|
trusted library allocation
|
page read and write
|
||
275802538000
|
trusted library allocation
|
page read and write
|
||
84675FE000
|
stack
|
page read and write
|
||
16E400220000
|
trusted library allocation
|
page read and write
|
||
1DA6000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237D43DE000
|
trusted library section
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D30006E0000
|
trusted library allocation
|
page read and write
|
||
275803024000
|
trusted library allocation
|
page read and write
|
||
27580257C000
|
trusted library allocation
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
6A8000
|
heap
|
page read and write
|
||
275802524000
|
trusted library allocation
|
page read and write
|
||
5D3000684000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
1335000
|
unkown
|
page write copy
|
||
275802601000
|
trusted library allocation
|
page read and write
|
||
2758029A1000
|
trusted library allocation
|
page read and write
|
||
275802A01000
|
trusted library allocation
|
page read and write
|
||
2758030F4000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
5D3000784000
|
trusted library allocation
|
page read and write
|
||
275803170000
|
trusted library allocation
|
page read and write
|
||
5D3000678000
|
trusted library allocation
|
page read and write
|
||
275802C18000
|
trusted library allocation
|
page read and write
|
||
237CD677000
|
heap
|
page read and write
|
||
275802328000
|
trusted library allocation
|
page read and write
|
||
2758030CC000
|
trusted library allocation
|
page read and write
|
||
845ADFE000
|
unkown
|
page readonly
|
||
275802240000
|
trusted library allocation
|
page read and write
|
||
237CDC99000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
844B5FD000
|
stack
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD677000
|
heap
|
page read and write
|
||
1D49000
|
heap
|
page read and write
|
||
237CDC3C000
|
heap
|
page read and write
|
||
275802E2C000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237D3870000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
8457DFE000
|
unkown
|
page readonly
|
||
660000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802424000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237D4431000
|
trusted library section
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
275802884000
|
trusted library allocation
|
page read and write
|
||
844D5FE000
|
stack
|
page read and write
|
||
275802430000
|
trusted library allocation
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
84515FD000
|
stack
|
page read and write
|
||
8469DFE000
|
unkown
|
page readonly
|
||
275803088000
|
trusted library allocation
|
page read and write
|
||
40A4000
|
heap
|
page read and write
|
||
40A2000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CD68D000
|
heap
|
page read and write
|
||
6C241000
|
unkown
|
page execute read
|
||
42DA000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
844EDFE000
|
unkown
|
page readonly
|
||
275802900000
|
trusted library allocation
|
page read and write
|
||
237CDC6C000
|
heap
|
page read and write
|
||
2758031D8000
|
trusted library allocation
|
page read and write
|
||
16E4002F8000
|
trusted library allocation
|
page read and write
|
||
2A2C00270000
|
direct allocation
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
5D3000310000
|
trusted library allocation
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
16E400230000
|
trusted library allocation
|
page read and write
|
||
5D3000248000
|
trusted library allocation
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
5D3000654000
|
trusted library allocation
|
page read and write
|
||
5D300080C000
|
trusted library allocation
|
page read and write
|
||
2758030D0000
|
trusted library allocation
|
page read and write
|
||
237CD694000
|
heap
|
page read and write
|
||
2758026F8000
|
trusted library allocation
|
page read and write
|
||
2758024A8000
|
trusted library allocation
|
page read and write
|
||
27580281C000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
40A0000
|
heap
|
page read and write
|
||
275802FE8000
|
trusted library allocation
|
page read and write
|
||
275802428000
|
trusted library allocation
|
page read and write
|
||
845DDFE000
|
unkown
|
page readonly
|
||
237D3F90000
|
trusted library section
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802798000
|
trusted library allocation
|
page read and write
|
||
2758023D8000
|
trusted library allocation
|
page read and write
|
||
275803024000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
237CDC8F000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CA138000
|
heap
|
page read and write
|
||
844BDFE000
|
unkown
|
page readonly
|
||
275800E01000
|
trusted library allocation
|
page read and write
|
||
5D3000730000
|
trusted library allocation
|
page read and write
|
||
5D3000320000
|
trusted library allocation
|
page read and write
|
||
275802E7D000
|
trusted library allocation
|
page read and write
|
||
275802420000
|
trusted library allocation
|
page read and write
|
||
237CA110000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
2758025A4000
|
trusted library allocation
|
page read and write
|
||
2758023E0000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
40A8000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
2A2C00280000
|
direct allocation
|
page read and write
|
||
843BDFE000
|
unkown
|
page readonly
|
||
27580294C000
|
trusted library allocation
|
page read and write
|
||
275802268000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
275802AF8000
|
trusted library allocation
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
2758030C8000
|
trusted library allocation
|
page read and write
|
||
1DC3000
|
heap
|
page read and write
|
||
275802FE0000
|
trusted library allocation
|
page read and write
|
||
5D3000320000
|
trusted library allocation
|
page read and write
|
||
845F5FD000
|
stack
|
page read and write
|
||
237CA1CD000
|
heap
|
page read and write
|
||
1D44000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page read and write
|
||
5D30006D0000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
5D30006E4000
|
trusted library allocation
|
page read and write
|
||
661000
|
unkown
|
page execute read
|
||
237D42C7000
|
unclassified section
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
43B6000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275803198000
|
trusted library allocation
|
page read and write
|
||
275802A84000
|
trusted library allocation
|
page read and write
|
||
2758023AC000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
84505FB000
|
stack
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237D4502000
|
trusted library section
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
275802540000
|
trusted library allocation
|
page read and write
|
||
40AA000
|
heap
|
page read and write
|
||
237CD692000
|
heap
|
page read and write
|
||
275802788000
|
trusted library allocation
|
page read and write
|
||
2758029C0000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page write copy
|
||
275803094000
|
trusted library allocation
|
page read and write
|
||
2A2C0023C000
|
direct allocation
|
page read and write
|
||
5D3000390000
|
trusted library allocation
|
page read and write
|
||
5D3000380000
|
trusted library allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
5D3000714000
|
trusted library allocation
|
page read and write
|
||
5D30002CC000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
16E400270000
|
trusted library allocation
|
page read and write
|
||
237D43C0000
|
trusted library section
|
page read and write
|
||
5D300040C000
|
trusted library allocation
|
page read and write
|
||
2A2C002AC000
|
direct allocation
|
page read and write
|
||
84415FB000
|
stack
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
40A5000
|
heap
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
237D37A7000
|
unclassified section
|
page read and write
|
||
275802401000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
4136000
|
heap
|
page read and write
|
||
275802E1C000
|
trusted library allocation
|
page read and write
|
||
843E5FE000
|
stack
|
page read and write
|
||
237CD67C000
|
heap
|
page read and write
|
||
2758024B4000
|
trusted library allocation
|
page read and write
|
||
237D459E000
|
trusted library section
|
page read and write
|
||
8447DFE000
|
unkown
|
page readonly
|
||
66A000
|
unkown
|
page readonly
|
||
275802709000
|
trusted library allocation
|
page read and write
|
||
414B000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
27580252C000
|
trusted library allocation
|
page read and write
|
||
2758023C4000
|
trusted library allocation
|
page read and write
|
||
8441DFE000
|
unkown
|
page readonly
|
||
720000
|
heap
|
page read and write
|
||
5D3000250000
|
trusted library allocation
|
page read and write
|
||
237CA2D0000
|
trusted library section
|
page readonly
|
||
843FDFE000
|
unkown
|
page readonly
|
||
8442DFE000
|
unkown
|
page readonly
|
||
275800601000
|
trusted library allocation
|
page read and write
|
||
27580283C000
|
trusted library allocation
|
page read and write
|
||
845A5FE000
|
stack
|
page read and write
|
||
66E000
|
unkown
|
page write copy
|
||
1D4F000
|
heap
|
page read and write
|
||
5D3000688000
|
trusted library allocation
|
page read and write
|
||
237CDBE0000
|
heap
|
page read and write
|
||
11DC000
|
unkown
|
page write copy
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
275802938000
|
trusted library allocation
|
page read and write
|
||
275802D88000
|
trusted library allocation
|
page read and write
|
||
5D3000401000
|
trusted library allocation
|
page read and write
|
||
84585FB000
|
stack
|
page read and write
|
||
275802BDC000
|
trusted library allocation
|
page read and write
|
||
27580257C000
|
trusted library allocation
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
2758023AC000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
2758026A0000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
275802AEC000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
2A2C00220000
|
direct allocation
|
page read and write
|
||
275802218000
|
trusted library allocation
|
page read and write
|
||
1DC1000
|
heap
|
page read and write
|
||
5D300060C000
|
trusted library allocation
|
page read and write
|
||
275800C01000
|
trusted library allocation
|
page read and write
|
||
275802F28000
|
trusted library allocation
|
page read and write
|
||
275802D70000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
1DC1000
|
heap
|
page read and write
|
||
275802EA8000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
5F6F000
|
heap
|
page read and write
|
||
237D4790000
|
trusted library section
|
page read and write
|
||
4294000
|
heap
|
page read and write
|
||
16E4002A0000
|
trusted library allocation
|
page read and write
|
||
5D3000288000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
8452DFE000
|
unkown
|
page readonly
|
||
237CD692000
|
heap
|
page read and write
|
||
84635FE000
|
stack
|
page read and write
|
||
275802494000
|
trusted library allocation
|
page read and write
|
||
275802CB8000
|
trusted library allocation
|
page read and write
|
||
2758030BC000
|
trusted library allocation
|
page read and write
|
||
275802C01000
|
trusted library allocation
|
page read and write
|
||
5D300027C000
|
trusted library allocation
|
page read and write
|
||
2758028E4000
|
trusted library allocation
|
page read and write
|
||
5D3000754000
|
trusted library allocation
|
page read and write
|
||
237CD698000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
237CD690000
|
heap
|
page read and write
|
||
845EDFE000
|
unkown
|
page readonly
|
||
237CD69F000
|
heap
|
page read and write
|
||
27580260C000
|
trusted library allocation
|
page read and write
|
||
16E4002F4000
|
trusted library allocation
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
275802418000
|
trusted library allocation
|
page read and write
|
||
27580305D000
|
trusted library allocation
|
page read and write
|
||
275802EC8000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
40AD000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
41E6000
|
heap
|
page read and write
|
||
27580238C000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
6C369000
|
unkown
|
page read and write
|
||
275802890000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
237CD699000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
275802EAC000
|
trusted library allocation
|
page read and write
|
||
844DDFE000
|
unkown
|
page readonly
|
||
275802EEC000
|
trusted library allocation
|
page read and write
|
||
16E4002BC000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
2A2C00215000
|
direct allocation
|
page read and write
|
||
415A000
|
heap
|
page read and write
|
||
27580301C000
|
trusted library allocation
|
page read and write
|
||
2758022FC000
|
trusted library allocation
|
page read and write
|
||
275802ED4000
|
trusted library allocation
|
page read and write
|
||
275800801000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
2758023F4000
|
trusted library allocation
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
2758024E0000
|
trusted library allocation
|
page read and write
|
||
84655FC000
|
stack
|
page read and write
|
||
237CD69B000
|
heap
|
page read and write
|
||
41DE000
|
heap
|
page read and write
|
||
845B5FB000
|
stack
|
page read and write
|
||
237CDC3E000
|
heap
|
page read and write
|
||
275802705000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
F2C000
|
stack
|
page read and write
|
||
275802918000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
2A2C002D0000
|
direct allocation
|
page read and write
|
||
8466DFE000
|
unkown
|
page readonly
|
||
237CD679000
|
heap
|
page read and write
|
||
16E4002D8000
|
trusted library allocation
|
page read and write
|
||
237CD690000
|
heap
|
page read and write
|
||
2758023AC000
|
trusted library allocation
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
422A000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275802BD0000
|
trusted library allocation
|
page read and write
|
||
E437000
|
heap
|
page read and write
|
||
40A1000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
5D30006C8000
|
trusted library allocation
|
page read and write
|
||
237CD6BC000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page readonly
|
||
275803140000
|
trusted library allocation
|
page read and write
|
||
5D30002ED000
|
trusted library allocation
|
page read and write
|
||
1D51000
|
heap
|
page read and write
|
||
275802CE4000
|
trusted library allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
237D4420000
|
trusted library section
|
page read and write
|
||
2A2C00250000
|
direct allocation
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
2758022B4000
|
trusted library allocation
|
page read and write
|
||
2A2C00234000
|
direct allocation
|
page read and write
|
||
16E400250000
|
trusted library allocation
|
page read and write
|
||
275802ED4000
|
trusted library allocation
|
page read and write
|
||
2758029F8000
|
trusted library allocation
|
page read and write
|
||
275802F18000
|
trusted library allocation
|
page read and write
|
||
275802500000
|
trusted library allocation
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
237CD68A000
|
heap
|
page read and write
|
||
844FDFE000
|
unkown
|
page readonly
|
||
27580240C000
|
trusted library allocation
|
page read and write
|
||
40A4000
|
heap
|
page read and write
|
||
27580252C000
|
trusted library allocation
|
page read and write
|
||
237D44E6000
|
trusted library section
|
page read and write
|
||
5D3000644000
|
trusted library allocation
|
page read and write
|
||
237CD692000
|
heap
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
237CD69F000
|
heap
|
page read and write
|
||
5D3000624000
|
trusted library allocation
|
page read and write
|
||
5D300078C000
|
trusted library allocation
|
page read and write
|
||
237D1FE0000
|
heap
|
page read and write
|
||
5D300025C000
|
trusted library allocation
|
page read and write
|
||
27580240C000
|
trusted library allocation
|
page read and write
|
||
237CD6A1000
|
heap
|
page read and write
|
||
427E000
|
heap
|
page read and write
|
||
275802AAC000
|
trusted library allocation
|
page read and write
|
||
237CD688000
|
heap
|
page read and write
|
||
275802D80000
|
trusted library allocation
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
6C240000
|
unkown
|
page readonly
|
||
27580228C000
|
trusted library allocation
|
page read and write
|
||
2758022A8000
|
trusted library allocation
|
page read and write
|
There are 1102 hidden memdumps, click here to show them.