Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
I43xo3KKfS.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_I43xo3KKfS.exe_28bc6b3603f5f8d941a5aba9cef8425f2a398_64f2822e_66db753d-6df9-4199-9577-860096641214\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\FBAFIIJK
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\JDGHIIJKEBGIDHIDBKJD
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8540.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 31 08:07:31 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER866A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER869A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\chrome.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8b6d5c38-7013-4935-b302-a38391baefe8.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\946f95c7-b468-4ea4-8fc5-c980224918a7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9b7e0c63-8a8f-4c13-826a-79e2e534c269.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67233AB9-1F04.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38c14.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38d8b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38d9b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38dba.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a0592f6d-518e-43c4-b6c0-7165d2616047.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e19c6e1c-b08f-4fbe-97b7-037000527258.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (5162), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (2287)
|
downloaded
|
||
Chrome Cache Entry: 81
|
Unicode text, UTF-8 text, with very long lines (5438)
|
downloaded
|
||
Chrome Cache Entry: 82
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (1302)
|
downloaded
|
||
Chrome Cache Entry: 85
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\I43xo3KKfS.exe
|
"C:\Users\user\Desktop\I43xo3KKfS.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin
--flag-switches-end --disable-nacl --do-not-de-elevate
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2824 --field-trial-handle=2580,i,9160805204216496030,1290202691667560686,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=2096,i,1110173691356344578,8625308391343283424,262144
/prefetch:3
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2236,i,12728769652571103709,16681002183324042487,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1888
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.88.105.105/caf2400fcdb97982/sqlite3.dll
|
45.88.105.105
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v2/tokeninfo
|
unknown
|
||
http://anglebug.com/6439r
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
http://anglebug.com/5881C999
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpApplication
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.php~
|
unknown
|
||
http://anglebug.com/7488N
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://publickeyservice.gcp.privacysandboxservices.com
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://publickeyservice.pa.aws.privacysandboxservices.com
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpininit.exe
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://ogs.google.com/widget/callout?eom=1
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpb
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpf
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://csp.withgoogle.com/csp/gws/cdt1rj
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v4/token
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://m.google.com/devicemanagement/data/apiaD
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.php=LAX
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=baD
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://permanently-removed.invalid/o/oauth2/revoke8
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpI
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpF
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://plus.google.com
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.php1
|
unknown
|
||
https://permanently-removed.invalid/chrome/blank.html
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.php2
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://permanently-removed.invalid/v1/issuetoken
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
|
172.217.18.110
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://permanently-removed.invalid/reauth/v1beta/users/
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.php8
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
https://publickeyservice.pa.gcp.privacysandboxservices.com
|
unknown
|
||
https://permanently-removed.invalid/RotateBoundCookies
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://anglebug.com/3862v
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://45.88.105.105/e88e05dfd1bdeeb9.phpsL
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
apis.google.com
|
unknown
|
||
plus.l.google.com
|
172.217.18.110
|
||
play.google.com
|
172.217.18.110
|
||
www.google.com
|
142.250.184.228
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.88.105.105
|
unknown
|
Netherlands
|
||
192.168.2.6
|
unknown
|
unknown
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.184.228
|
www.google.com
|
United States
|
||
172.217.18.110
|
plus.l.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Top
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
ProgramId
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
FileId
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
LongPathHash
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Name
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
OriginalFileName
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Publisher
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Version
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
BinFileVersion
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
BinaryType
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
ProductName
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
ProductVersion
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
LinkDate
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
BinProductVersion
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
AppxPackageFullName
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Size
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Language
|
||
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2490000
|
direct allocation
|
page read and write
|
||
89E000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
614400A14000
|
trusted library allocation
|
page read and write
|
||
7DC000318000
|
direct allocation
|
page read and write
|
||
20EED000
|
heap
|
page read and write
|
||
614400984000
|
trusted library allocation
|
page read and write
|
||
2888002F4000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
6144002E0000
|
trusted library allocation
|
page read and write
|
||
6144004EC000
|
trusted library allocation
|
page read and write
|
||
2EE800288000
|
trusted library allocation
|
page read and write
|
||
614401B28000
|
trusted library allocation
|
page read and write
|
||
2EE800230000
|
trusted library allocation
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
7DC000234000
|
direct allocation
|
page read and write
|
||
5D3800334000
|
trusted library allocation
|
page read and write
|
||
5D38002F8000
|
trusted library allocation
|
page read and write
|
||
25B7CF7B000
|
heap
|
page read and write
|
||
675EBFD000
|
stack
|
page read and write
|
||
7DC000328000
|
direct allocation
|
page read and write
|
||
614400EB8000
|
trusted library allocation
|
page read and write
|
||
61440009F000
|
trusted library allocation
|
page read and write
|
||
5D3800020000
|
trusted library allocation
|
page read and write
|
||
6144016E0000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
614401BD0000
|
trusted library allocation
|
page read and write
|
||
61440120C000
|
trusted library allocation
|
page read and write
|
||
288800300000
|
trusted library allocation
|
page read and write
|
||
7DC000316000
|
direct allocation
|
page read and write
|
||
6144016F0000
|
trusted library allocation
|
page read and write
|
||
614400C18000
|
trusted library allocation
|
page read and write
|
||
25B0371C000
|
heap
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
2888002D0000
|
trusted library allocation
|
page read and write
|
||
25B03698000
|
heap
|
page read and write
|
||
614401AC8000
|
trusted library allocation
|
page read and write
|
||
614400C18000
|
trusted library allocation
|
page read and write
|
||
1F50A2F8000
|
heap
|
page read and write
|
||
614401858000
|
trusted library allocation
|
page read and write
|
||
6144019D8000
|
trusted library allocation
|
page read and write
|
||
61440031C000
|
trusted library allocation
|
page read and write
|
||
61440133C000
|
trusted library allocation
|
page read and write
|
||
28880039C000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
614401650000
|
trusted library allocation
|
page read and write
|
||
5D380041C000
|
trusted library allocation
|
page read and write
|
||
6144016CC000
|
trusted library allocation
|
page read and write
|
||
28880031C000
|
trusted library allocation
|
page read and write
|
||
6144005C4000
|
trusted library allocation
|
page read and write
|
||
6144010DC000
|
trusted library allocation
|
page read and write
|
||
614401B08000
|
trusted library allocation
|
page read and write
|
||
288800320000
|
trusted library allocation
|
page read and write
|
||
20FD0000
|
heap
|
page read and write
|
||
5D38002C0000
|
trusted library allocation
|
page read and write
|
||
5D3800104000
|
trusted library allocation
|
page read and write
|
||
288800401000
|
trusted library allocation
|
page read and write
|
||
25B7D155000
|
heap
|
page read and write
|
||
614400FE0000
|
trusted library allocation
|
page read and write
|
||
61440027C000
|
trusted library allocation
|
page read and write
|
||
614401B9C000
|
trusted library allocation
|
page read and write
|
||
2888003C0000
|
trusted library allocation
|
page read and write
|
||
6144012EC000
|
trusted library allocation
|
page read and write
|
||
2B140020C000
|
trusted library allocation
|
page read and write
|
||
668000
|
unkown
|
page execute and read and write
|
||
1F50A2C1000
|
heap
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
6754BFE000
|
stack
|
page read and write
|
||
614400474000
|
trusted library allocation
|
page read and write
|
||
61440140C000
|
trusted library allocation
|
page read and write
|
||
614401B30000
|
trusted library allocation
|
page read and write
|
||
7808002B0000
|
trusted library allocation
|
page read and write
|
||
5D3800244000
|
trusted library allocation
|
page read and write
|
||
1AF66000
|
heap
|
page read and write
|
||
614400ED8000
|
trusted library allocation
|
page read and write
|
||
2B1400320000
|
trusted library allocation
|
page read and write
|
||
614400C84000
|
trusted library allocation
|
page read and write
|
||
614401B14000
|
trusted library allocation
|
page read and write
|
||
6144007CC000
|
trusted library allocation
|
page read and write
|
||
2EE8002C8000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
7DC0002A8000
|
direct allocation
|
page read and write
|
||
6749BFC000
|
stack
|
page read and write
|
||
61440066F000
|
trusted library allocation
|
page read and write
|
||
614400ECD000
|
trusted library allocation
|
page read and write
|
||
614401550000
|
trusted library allocation
|
page read and write
|
||
61440156C000
|
trusted library allocation
|
page read and write
|
||
614400D50000
|
trusted library allocation
|
page read and write
|
||
2EE800270000
|
trusted library allocation
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
6144019C4000
|
trusted library allocation
|
page read and write
|
||
AC687FE000
|
unkown
|
page readonly
|
||
6144017D8000
|
trusted library allocation
|
page read and write
|
||
2B1400624000
|
trusted library allocation
|
page read and write
|
||
614400FE0000
|
trusted library allocation
|
page read and write
|
||
6144011BC000
|
trusted library allocation
|
page read and write
|
||
61440186C000
|
trusted library allocation
|
page read and write
|
||
7DC000290000
|
direct allocation
|
page read and write
|
||
6144002E0000
|
trusted library allocation
|
page read and write
|
||
5D380022C000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
6144001DC000
|
trusted library allocation
|
page read and write
|
||
614400FE0000
|
trusted library allocation
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
2B14006E8000
|
trusted library allocation
|
page read and write
|
||
20ED0000
|
heap
|
page read and write
|
||
674DBFE000
|
stack
|
page read and write
|
||
1F50A2C7000
|
heap
|
page read and write
|
||
614401024000
|
trusted library allocation
|
page read and write
|
||
6144017A8000
|
trusted library allocation
|
page read and write
|
||
6144000E0000
|
trusted library allocation
|
page read and write
|
||
67693FE000
|
unkown
|
page readonly
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
61440045C000
|
trusted library allocation
|
page read and write
|
||
288800408000
|
trusted library allocation
|
page read and write
|
||
67643FE000
|
unkown
|
page readonly
|
||
6144012D0000
|
trusted library allocation
|
page read and write
|
||
614400384000
|
trusted library allocation
|
page read and write
|
||
6144001E4000
|
trusted library allocation
|
page read and write
|
||
AC5EFFC000
|
stack
|
page read and write
|
||
25B03790000
|
trusted library allocation
|
page read and write
|
||
5D38001D4000
|
trusted library allocation
|
page read and write
|
||
61440171C000
|
trusted library allocation
|
page read and write
|
||
1F50A180000
|
heap
|
page read and write
|
||
6144009AB000
|
trusted library allocation
|
page read and write
|
||
2EE8002F8000
|
trusted library allocation
|
page read and write
|
||
2EE800210000
|
trusted library allocation
|
page read and write
|
||
614401974000
|
trusted library allocation
|
page read and write
|
||
614401040000
|
trusted library allocation
|
page read and write
|
||
25B036BC000
|
heap
|
page read and write
|
||
1F50A160000
|
heap
|
page readonly
|
||
614401640000
|
trusted library allocation
|
page read and write
|
||
6144015F4000
|
trusted library allocation
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
5D38002F8000
|
trusted library allocation
|
page read and write
|
||
1F50C14A000
|
heap
|
page read and write
|
||
614401A54000
|
trusted library allocation
|
page read and write
|
||
6144004F3000
|
trusted library allocation
|
page read and write
|
||
5D38001B8000
|
trusted library allocation
|
page read and write
|
||
7808002D8000
|
trusted library allocation
|
page read and write
|
||
61440153C000
|
trusted library allocation
|
page read and write
|
||
614400469000
|
trusted library allocation
|
page read and write
|
||
614400C94000
|
trusted library allocation
|
page read and write
|
||
614401A0C000
|
trusted library allocation
|
page read and write
|
||
AC64FFE000
|
stack
|
page read and write
|
||
6144010D4000
|
trusted library allocation
|
page read and write
|
||
25B030AB000
|
heap
|
page read and write
|
||
6763BFC000
|
stack
|
page read and write
|
||
614400394000
|
trusted library allocation
|
page read and write
|
||
25B03080000
|
heap
|
page read and write
|
||
6144001E0000
|
trusted library allocation
|
page read and write
|
||
2B1400724000
|
trusted library allocation
|
page read and write
|
||
6144013A8000
|
trusted library allocation
|
page read and write
|
||
7DC000230000
|
direct allocation
|
page read and write
|
||
1F50A2AB000
|
heap
|
page read and write
|
||
6755BFE000
|
stack
|
page read and write
|
||
AC677FE000
|
unkown
|
page readonly
|
||
795800215000
|
direct allocation
|
page read and write
|
||
61440166C000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
5D38002E0000
|
trusted library allocation
|
page read and write
|
||
5D3800230000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
6144019E0000
|
trusted library allocation
|
page read and write
|
||
AC4D7FE000
|
unkown
|
page readonly
|
||
61440078E000
|
trusted library allocation
|
page read and write
|
||
79580025C000
|
direct allocation
|
page read and write
|
||
5D3800088000
|
trusted library allocation
|
page read and write
|
||
288800284000
|
trusted library allocation
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
614401978000
|
trusted library allocation
|
page read and write
|
||
6144000A8000
|
trusted library allocation
|
page read and write
|
||
25B036A2000
|
heap
|
page read and write
|
||
780800278000
|
trusted library allocation
|
page read and write
|
||
2EE800260000
|
trusted library allocation
|
page read and write
|
||
2B14006FC000
|
trusted library allocation
|
page read and write
|
||
288800310000
|
trusted library allocation
|
page read and write
|
||
6144001E8000
|
trusted library allocation
|
page read and write
|
||
614401944000
|
trusted library allocation
|
page read and write
|
||
6144016F8000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
614400DC8000
|
trusted library allocation
|
page read and write
|
||
AC43FFE000
|
unkown
|
page read and write
|
||
1F50C1BF000
|
heap
|
page read and write
|
||
1AB4E000
|
stack
|
page read and write
|
||
614400A14000
|
trusted library allocation
|
page read and write
|
||
5D38002EC000
|
trusted library allocation
|
page read and write
|
||
795800270000
|
direct allocation
|
page read and write
|
||
6144003DC000
|
trusted library allocation
|
page read and write
|
||
25B06C40000
|
trusted library allocation
|
page read and write
|
||
675F3FE000
|
unkown
|
page readonly
|
||
5D3800344000
|
trusted library allocation
|
page read and write
|
||
25B036E6000
|
heap
|
page read and write
|
||
614401838000
|
trusted library allocation
|
page read and write
|
||
2EE8002F0000
|
trusted library allocation
|
page read and write
|
||
1F50A29E000
|
heap
|
page read and write
|
||
25B09BB7000
|
unclassified section
|
page read and write
|
||
1F50A200000
|
heap
|
page read and write
|
||
6144013D4000
|
trusted library allocation
|
page read and write
|
||
AC62FFE000
|
stack
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
2EE800294000
|
trusted library allocation
|
page read and write
|
||
5D3800298000
|
trusted library allocation
|
page read and write
|
||
614400230000
|
trusted library allocation
|
page read and write
|
||
2B1400320000
|
trusted library allocation
|
page read and write
|
||
6144012F4000
|
trusted library allocation
|
page read and write
|
||
61440141C000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
AC647FE000
|
unkown
|
page readonly
|
||
1F50A2EE000
|
heap
|
page read and write
|
||
614401740000
|
trusted library allocation
|
page read and write
|
||
1AA4E000
|
stack
|
page read and write
|
||
1F50A2C6000
|
heap
|
page read and write
|
||
AC54FFD000
|
stack
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
1F50C1A7000
|
heap
|
page read and write
|
||
614400C18000
|
trusted library allocation
|
page read and write
|
||
5D380029C000
|
trusted library allocation
|
page read and write
|
||
7808002A1000
|
trusted library allocation
|
page read and write
|
||
2B14006D4000
|
trusted library allocation
|
page read and write
|
||
6144001F0000
|
trusted library allocation
|
page read and write
|
||
67473FE000
|
unkown
|
page readonly
|
||
2B140069C000
|
trusted library allocation
|
page read and write
|
||
614401A8C000
|
trusted library allocation
|
page read and write
|
||
7808002C8000
|
trusted library allocation
|
page read and write
|
||
AC507FE000
|
unkown
|
page readonly
|
||
614401594000
|
trusted library allocation
|
page read and write
|
||
25B7D04F000
|
heap
|
page read and write
|
||
614401A01000
|
trusted library allocation
|
page read and write
|
||
25B07F20000
|
heap
|
page read and write
|
||
614400210000
|
trusted library allocation
|
page read and write
|
||
61440044C000
|
trusted library allocation
|
page read and write
|
||
41D000
|
unkown
|
page execute read
|
||
614400CEC000
|
trusted library allocation
|
page read and write
|
||
5D38002B4000
|
trusted library allocation
|
page read and write
|
||
2B1400704000
|
trusted library allocation
|
page read and write
|
||
614400F70000
|
trusted library allocation
|
page read and write
|
||
614400674000
|
trusted library allocation
|
page read and write
|
||
614400A01000
|
trusted library allocation
|
page read and write
|
||
1F50C180000
|
heap
|
page read and write
|
||
288800338000
|
trusted library allocation
|
page read and write
|
||
614401AD0000
|
trusted library allocation
|
page read and write
|
||
1F50C100000
|
heap
|
page read and write
|
||
AC477FE000
|
unkown
|
page readonly
|
||
676B3FE000
|
unkown
|
page readonly
|
||
61440160C000
|
trusted library allocation
|
page read and write
|
||
67483FE000
|
unkown
|
page readonly
|
||
1A66E000
|
stack
|
page read and write
|
||
2888002F1000
|
trusted library allocation
|
page read and write
|
||
2B1400368000
|
trusted library allocation
|
page read and write
|
||
614400DE4000
|
trusted library allocation
|
page read and write
|
||
67583FE000
|
unkown
|
page readonly
|
||
5D3800270000
|
trusted library allocation
|
page read and write
|
||
2B14002ED000
|
trusted library allocation
|
page read and write
|
||
614400CF8000
|
trusted library allocation
|
page read and write
|
||
780800235000
|
trusted library allocation
|
page read and write
|
||
6144019A4000
|
trusted library allocation
|
page read and write
|
||
61440035C000
|
trusted library allocation
|
page read and write
|
||
28880040C000
|
trusted library allocation
|
page read and write
|
||
5D3800240000
|
trusted library allocation
|
page read and write
|
||
20EF2000
|
heap
|
page read and write
|
||
614401A48000
|
trusted library allocation
|
page read and write
|
||
1F50C14C000
|
heap
|
page read and write
|
||
61440076C000
|
trusted library allocation
|
page read and write
|
||
6144001B4000
|
trusted library allocation
|
page read and write
|
||
614401201000
|
trusted library allocation
|
page read and write
|
||
25B0377B000
|
heap
|
page read and write
|
||
7DC0002AC000
|
direct allocation
|
page read and write
|
||
61440031C000
|
trusted library allocation
|
page read and write
|
||
6144019A0000
|
trusted library allocation
|
page read and write
|
||
67723FE000
|
unkown
|
page readonly
|
||
5D38002C0000
|
trusted library allocation
|
page read and write
|
||
67443FE000
|
unkown
|
page readonly
|
||
1F50A2BC000
|
heap
|
page read and write
|
||
614401AAC000
|
trusted library allocation
|
page read and write
|
||
AC657FE000
|
unkown
|
page readonly
|
||
5D38003A4000
|
trusted library allocation
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
5D3800260000
|
trusted library allocation
|
page read and write
|
||
7DC000308000
|
direct allocation
|
page read and write
|
||
6766BFE000
|
stack
|
page read and write
|
||
6750BFD000
|
stack
|
page read and write
|
||
675BBFE000
|
unkown
|
page readonly
|
||
956000
|
heap
|
page read and write
|
||
20ED0000
|
trusted library allocation
|
page read and write
|
||
6144017E8000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
614400298000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
614400EF0000
|
trusted library allocation
|
page read and write
|
||
614400D18000
|
trusted library allocation
|
page read and write
|
||
AC4FFFD000
|
stack
|
page read and write
|
||
25B030B0000
|
heap
|
page read and write
|
||
1F512FD0000
|
trusted library allocation
|
page read and write
|
||
6D470000
|
unkown
|
page readonly
|
||
614401180000
|
trusted library allocation
|
page read and write
|
||
6753BFE000
|
stack
|
page read and write
|
||
2B1400788000
|
trusted library allocation
|
page read and write
|
||
AC48FFE000
|
stack
|
page read and write
|
||
7808002A4000
|
trusted library allocation
|
page read and write
|
||
61440078C000
|
trusted library allocation
|
page read and write
|
||
25B094D0000
|
trusted library section
|
page read and write
|
||
6144002FC000
|
trusted library allocation
|
page read and write
|
||
6144015C8000
|
trusted library allocation
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
2B1400664000
|
trusted library allocation
|
page read and write
|
||
7DC00031C000
|
direct allocation
|
page read and write
|
||
614401AB8000
|
trusted library allocation
|
page read and write
|
||
2B1400320000
|
trusted library allocation
|
page read and write
|
||
2B140035C000
|
trusted library allocation
|
page read and write
|
||
614400E68000
|
trusted library allocation
|
page read and write
|
||
614400578000
|
trusted library allocation
|
page read and write
|
||
675C3FE000
|
unkown
|
page readonly
|
||
675A3FE000
|
unkown
|
page readonly
|
||
6144017D0000
|
trusted library allocation
|
page read and write
|
||
AC55FFE000
|
stack
|
page read and write
|
||
614400330000
|
trusted library allocation
|
page read and write
|
||
1F50C170000
|
heap
|
page read and write
|
||
1F50A302000
|
heap
|
page read and write
|
||
25B07E23000
|
heap
|
page read and write
|
||
614401588000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
614401B90000
|
trusted library allocation
|
page read and write
|
||
795800244000
|
direct allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
6758BFC000
|
stack
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
614400588000
|
trusted library allocation
|
page read and write
|
||
614401374000
|
trusted library allocation
|
page read and write
|
||
AC667FE000
|
unkown
|
page readonly
|
||
5D38002EC000
|
trusted library allocation
|
page read and write
|
||
2B1400248000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
6144010EC000
|
trusted library allocation
|
page read and write
|
||
6144002A8000
|
trusted library allocation
|
page read and write
|
||
28880031C000
|
trusted library allocation
|
page read and write
|
||
6144015D0000
|
trusted library allocation
|
page read and write
|
||
6144013B4000
|
trusted library allocation
|
page read and write
|
||
795800284000
|
direct allocation
|
page read and write
|
||
2B1400750000
|
trusted library allocation
|
page read and write
|
||
674BBFB000
|
stack
|
page read and write
|
||
614400AA0000
|
trusted library allocation
|
page read and write
|
||
614400700000
|
trusted library allocation
|
page read and write
|
||
AC67FFC000
|
stack
|
page read and write
|
||
614401584000
|
trusted library allocation
|
page read and write
|
||
25B036AC000
|
heap
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
614401850000
|
trusted library allocation
|
page read and write
|
||
5D380027C000
|
trusted library allocation
|
page read and write
|
||
614401A58000
|
trusted library allocation
|
page read and write
|
||
614400080000
|
trusted library allocation
|
page read and write
|
||
1F50A2FF000
|
heap
|
page read and write
|
||
25B03099000
|
heap
|
page read and write
|
||
AC5BFFE000
|
stack
|
page read and write
|
||
5D3800440000
|
trusted library allocation
|
page read and write
|
||
614400214000
|
trusted library allocation
|
page read and write
|
||
25B036A9000
|
heap
|
page read and write
|
||
614401801000
|
trusted library allocation
|
page read and write
|
||
614400224000
|
trusted library allocation
|
page read and write
|
||
25B036A9000
|
heap
|
page read and write
|
||
614401A64000
|
trusted library allocation
|
page read and write
|
||
614401944000
|
trusted library allocation
|
page read and write
|
||
61440021C000
|
trusted library allocation
|
page read and write
|
||
614401688000
|
trusted library allocation
|
page read and write
|
||
5D38000F4000
|
trusted library allocation
|
page read and write
|
||
25B0309E000
|
heap
|
page read and write
|
||
614401690000
|
trusted library allocation
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
674D3FE000
|
unkown
|
page readonly
|
||
6144007BC000
|
trusted library allocation
|
page read and write
|
||
5D38003D0000
|
trusted library allocation
|
page read and write
|
||
6144002C0000
|
trusted library allocation
|
page read and write
|
||
795800280000
|
direct allocation
|
page read and write
|
||
25B0949D000
|
trusted library section
|
page read and write
|
||
20EEB000
|
heap
|
page read and write
|
||
25B03729000
|
heap
|
page read and write
|
||
AC447FE000
|
unkown
|
page readonly
|
||
25B7D0A0000
|
heap
|
page read and write
|
||
6144015C0000
|
trusted library allocation
|
page read and write
|
||
5D380024C000
|
trusted library allocation
|
page read and write
|
||
2888003A0000
|
trusted library allocation
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
614400E78000
|
trusted library allocation
|
page read and write
|
||
6144010CC000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
5D38001C8000
|
trusted library allocation
|
page read and write
|
||
2888003BC000
|
trusted library allocation
|
page read and write
|
||
25B03704000
|
heap
|
page read and write
|
||
5D3800250000
|
trusted library allocation
|
page read and write
|
||
1F50A32B000
|
heap
|
page read and write
|
||
795800294000
|
direct allocation
|
page read and write
|
||
1F50A272000
|
heap
|
page read and write
|
||
614400C74000
|
trusted library allocation
|
page read and write
|
||
614400FE8000
|
trusted library allocation
|
page read and write
|
||
614400AD4000
|
trusted library allocation
|
page read and write
|
||
61440163C000
|
trusted library allocation
|
page read and write
|
||
25B0A0C3000
|
trusted library section
|
page read and write
|
||
25B7D0C0000
|
trusted library allocation
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
25B03600000
|
trusted library section
|
page read and write
|
||
25B09DE7000
|
unclassified section
|
page read and write
|
||
6144002B8000
|
trusted library allocation
|
page read and write
|
||
614401784000
|
trusted library allocation
|
page read and write
|
||
614401B40000
|
trusted library allocation
|
page read and write
|
||
5D38001F4000
|
trusted library allocation
|
page read and write
|
||
614401040000
|
trusted library allocation
|
page read and write
|
||
6144017B4000
|
trusted library allocation
|
page read and write
|
||
5D3800378000
|
trusted library allocation
|
page read and write
|
||
AC5F7FE000
|
unkown
|
page readonly
|
||
5D38002A0000
|
trusted library allocation
|
page read and write
|
||
25B03710000
|
heap
|
page read and write
|
||
614401528000
|
trusted library allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
6740BEF000
|
stack
|
page read and write
|
||
2B14006E4000
|
trusted library allocation
|
page read and write
|
||
25B093DE000
|
trusted library section
|
page read and write
|
||
6144017F4000
|
trusted library allocation
|
page read and write
|
||
5D38000B4000
|
trusted library allocation
|
page read and write
|
||
25B7CF70000
|
heap
|
page read and write
|
||
614401958000
|
trusted library allocation
|
page read and write
|
||
AC42FF4000
|
stack
|
page read and write
|
||
614401A44000
|
trusted library allocation
|
page read and write
|
||
2B1400784000
|
trusted library allocation
|
page read and write
|
||
675FBFA000
|
stack
|
page read and write
|
||
614400DBA000
|
trusted library allocation
|
page read and write
|
||
20EDD000
|
heap
|
page read and write
|
||
6144016E4000
|
trusted library allocation
|
page read and write
|
||
2B14002B0000
|
trusted library allocation
|
page read and write
|
||
2B14006C8000
|
trusted library allocation
|
page read and write
|
||
2B1400354000
|
trusted library allocation
|
page read and write
|
||
7DC0002D0000
|
direct allocation
|
page read and write
|
||
6144008C4000
|
trusted library allocation
|
page read and write
|
||
61440066C000
|
trusted library allocation
|
page read and write
|
||
2B1400220000
|
trusted library allocation
|
page read and write
|
||
25B7D031000
|
heap
|
page read and write
|
||
2B1400678000
|
trusted library allocation
|
page read and write
|
||
5D3800150000
|
trusted library allocation
|
page read and write
|
||
1F50A302000
|
heap
|
page read and write
|
||
7DC000303000
|
direct allocation
|
page read and write
|
||
28880025C000
|
trusted library allocation
|
page read and write
|
||
2B1400424000
|
trusted library allocation
|
page read and write
|
||
2B1400418000
|
trusted library allocation
|
page read and write
|
||
795800234000
|
direct allocation
|
page read and write
|
||
1F50A2A9000
|
heap
|
page read and write
|
||
614400EF0000
|
trusted library allocation
|
page read and write
|
||
614401AEC000
|
trusted library allocation
|
page read and write
|
||
795800303000
|
direct allocation
|
page read and write
|
||
7808002E4000
|
trusted library allocation
|
page read and write
|
||
6144002DB000
|
trusted library allocation
|
page read and write
|
||
2B14006E0000
|
trusted library allocation
|
page read and write
|
||
614400F70000
|
trusted library allocation
|
page read and write
|
||
614400DA8000
|
trusted library allocation
|
page read and write
|
||
614400198000
|
trusted library allocation
|
page read and write
|
||
1F50A22C000
|
heap
|
page read and write
|
||
7808002F8000
|
trusted library allocation
|
page read and write
|
||
614401401000
|
trusted library allocation
|
page read and write
|
||
2888002AC000
|
trusted library allocation
|
page read and write
|
||
61440170C000
|
trusted library allocation
|
page read and write
|
||
1F50A32B000
|
heap
|
page read and write
|
||
1F50A130000
|
heap
|
page read and write
|
||
6E8000
|
unkown
|
page execute and read and write
|
||
288800390000
|
trusted library allocation
|
page read and write
|
||
1F50A150000
|
heap
|
page read and write
|
||
6144005E8000
|
trusted library allocation
|
page read and write
|
||
614401318000
|
trusted library allocation
|
page read and write
|
||
2B1400770000
|
trusted library allocation
|
page read and write
|
||
6144016BC000
|
trusted library allocation
|
page read and write
|
||
614401B10000
|
trusted library allocation
|
page read and write
|
||
6144013BC000
|
trusted library allocation
|
page read and write
|
||
614400C44000
|
trusted library allocation
|
page read and write
|
||
675ABFC000
|
stack
|
page read and write
|
||
676D3FE000
|
unkown
|
page readonly
|
||
25B7D00C000
|
heap
|
page read and write
|
||
25B03723000
|
heap
|
page read and write
|
||
614400D98000
|
trusted library allocation
|
page read and write
|
||
614400850000
|
trusted library allocation
|
page read and write
|
||
61440015C000
|
trusted library allocation
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
614401508000
|
trusted library allocation
|
page read and write
|
||
674FBFE000
|
stack
|
page read and write
|
||
5D380020C000
|
trusted library allocation
|
page read and write
|
||
25B03732000
|
heap
|
page read and write
|
||
614400771000
|
trusted library allocation
|
page read and write
|
||
5D38004BC000
|
trusted library allocation
|
page read and write
|
||
614401ACC000
|
trusted library allocation
|
page read and write
|
||
1AA0F000
|
stack
|
page read and write
|
||
6D471000
|
unkown
|
page execute read
|
||
61440107C000
|
trusted library allocation
|
page read and write
|
||
614400801000
|
trusted library allocation
|
page read and write
|
||
2B14002CC000
|
trusted library allocation
|
page read and write
|
||
6144016B0000
|
trusted library allocation
|
page read and write
|
||
5D380016C000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
2EE8002E4000
|
trusted library allocation
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
AC557FE000
|
unkown
|
page readonly
|
||
6144001F4000
|
trusted library allocation
|
page read and write
|
||
5D3800350000
|
trusted library allocation
|
page read and write
|
||
5D380021C000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
614400648000
|
trusted library allocation
|
page read and write
|
||
25B03990000
|
trusted library section
|
page read and write
|
||
AC4F7FE000
|
unkown
|
page readonly
|
||
780800201000
|
trusted library allocation
|
page read and write
|
||
2888002A0000
|
trusted library allocation
|
page read and write
|
||
1F50A213000
|
heap
|
page read and write
|
||
614400734000
|
trusted library allocation
|
page read and write
|
||
6144009DC000
|
trusted library allocation
|
page read and write
|
||
7DC000201000
|
direct allocation
|
page read and write
|
||
614400EE0000
|
trusted library allocation
|
page read and write
|
||
614400E01000
|
trusted library allocation
|
page read and write
|
||
5D3800390000
|
trusted library allocation
|
page read and write
|
||
2B1400644000
|
trusted library allocation
|
page read and write
|
||
67703FE000
|
unkown
|
page readonly
|
||
614401060000
|
trusted library allocation
|
page read and write
|
||
6144001D0000
|
trusted library allocation
|
page read and write
|
||
25B7D02C000
|
heap
|
page read and write
|
||
61440008C000
|
trusted library allocation
|
page read and write
|
||
21020000
|
heap
|
page read and write
|
||
6144019C8000
|
trusted library allocation
|
page read and write
|
||
6144012D4000
|
trusted library allocation
|
page read and write
|
||
614401580000
|
trusted library allocation
|
page read and write
|
||
2EE800220000
|
trusted library allocation
|
page read and write
|
||
6144002D0000
|
trusted library allocation
|
page read and write
|
||
61440106C000
|
trusted library allocation
|
page read and write
|
||
25B02340000
|
unkown
|
page read and write
|
||
61440001C000
|
trusted library allocation
|
page read and write
|
||
780800250000
|
trusted library allocation
|
page read and write
|
||
614401570000
|
trusted library allocation
|
page read and write
|
||
614401680000
|
trusted library allocation
|
page read and write
|
||
210D0000
|
trusted library allocation
|
page read and write
|
||
1AF60000
|
trusted library allocation
|
page read and write
|
||
288800230000
|
trusted library allocation
|
page read and write
|
||
780800238000
|
trusted library allocation
|
page read and write
|
||
614400BD8000
|
trusted library allocation
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
614401100000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
25B03727000
|
heap
|
page read and write
|
||
5D38000C6000
|
trusted library allocation
|
page read and write
|
||
6742BFF000
|
stack
|
page read and write
|
||
674EBFE000
|
stack
|
page read and write
|
||
2EE8002D8000
|
trusted library allocation
|
page read and write
|
||
1F50C10B000
|
heap
|
page read and write
|
||
614400218000
|
trusted library allocation
|
page read and write
|
||
2EE8002B8000
|
trusted library allocation
|
page read and write
|
||
25B03590000
|
trusted library section
|
page read and write
|
||
6144014E8000
|
trusted library allocation
|
page read and write
|
||
614401438000
|
trusted library allocation
|
page read and write
|
||
614400CAC000
|
trusted library allocation
|
page read and write
|
||
614401788000
|
trusted library allocation
|
page read and write
|
||
614401780000
|
trusted library allocation
|
page read and write
|
||
5D3800118000
|
trusted library allocation
|
page read and write
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
25B0375B000
|
heap
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
2B140080C000
|
trusted library allocation
|
page read and write
|
||
614400F70000
|
trusted library allocation
|
page read and write
|
||
795800290000
|
direct allocation
|
page read and write
|
||
67523FE000
|
unkown
|
page readonly
|
||
5D3800294000
|
trusted library allocation
|
page read and write
|
||
7DC000220000
|
direct allocation
|
page read and write
|
||
2B1400374000
|
trusted library allocation
|
page read and write
|
||
79580026C000
|
direct allocation
|
page read and write
|
||
2B1400330000
|
trusted library allocation
|
page read and write
|
||
6144012F4000
|
trusted library allocation
|
page read and write
|
||
614400CB4000
|
trusted library allocation
|
page read and write
|
||
614401744000
|
trusted library allocation
|
page read and write
|
||
614400B74000
|
trusted library allocation
|
page read and write
|
||
780800294000
|
trusted library allocation
|
page read and write
|
||
6144013EC000
|
trusted library allocation
|
page read and write
|
||
1F50C146000
|
heap
|
page read and write
|
||
614400F94000
|
trusted library allocation
|
page read and write
|
||
2B14006B8000
|
trusted library allocation
|
page read and write
|
||
614400B58000
|
trusted library allocation
|
page read and write
|
||
5D380007C000
|
trusted library allocation
|
page read and write
|
||
5D3800238000
|
trusted library allocation
|
page read and write
|
||
1AE60000
|
heap
|
page read and write
|
||
2B14007B4000
|
trusted library allocation
|
page read and write
|
||
795800217000
|
direct allocation
|
page read and write
|
||
6144001B4000
|
trusted library allocation
|
page read and write
|
||
61440183C000
|
trusted library allocation
|
page read and write
|
||
7DC000244000
|
direct allocation
|
page read and write
|
||
25B0A2E0000
|
trusted library section
|
page read and write
|
||
614400C1C000
|
trusted library allocation
|
page read and write
|
||
61440086C000
|
trusted library allocation
|
page read and write
|
||
20EF7000
|
heap
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
5D38002A4000
|
trusted library allocation
|
page read and write
|
||
493000
|
unkown
|
page write copy
|
||
5D38002A8000
|
trusted library allocation
|
page read and write
|
||
20FF0000
|
heap
|
page read and write
|
||
614401894000
|
trusted library allocation
|
page read and write
|
||
6144002B4000
|
trusted library allocation
|
page read and write
|
||
67513FE000
|
unkown
|
page readonly
|
||
61440137C000
|
trusted library allocation
|
page read and write
|
||
614401574000
|
trusted library allocation
|
page read and write
|
||
2B140078C000
|
trusted library allocation
|
page read and write
|
||
67623FE000
|
unkown
|
page readonly
|
||
614401A84000
|
trusted library allocation
|
page read and write
|
||
1F50A2FF000
|
heap
|
page read and write
|
||
61440060C000
|
trusted library allocation
|
page read and write
|
||
1F50C002000
|
heap
|
page read and write
|
||
5D38000A4000
|
trusted library allocation
|
page read and write
|
||
4E6000
|
unkown
|
page execute and read and write
|
||
6743BFE000
|
stack
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
25B09492000
|
trusted library section
|
page read and write
|
||
1F50C12D000
|
heap
|
page read and write
|
||
61440176C000
|
trusted library allocation
|
page read and write
|
||
5D3800218000
|
trusted library allocation
|
page read and write
|
||
25B0309E000
|
heap
|
page read and write
|
||
25B099AC000
|
trusted library section
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
6744BFE000
|
stack
|
page read and write
|
||
61440198C000
|
trusted library allocation
|
page read and write
|
||
61440177C000
|
trusted library allocation
|
page read and write
|
||
25B7D06D000
|
heap
|
page read and write
|
||
614400394000
|
trusted library allocation
|
page read and write
|
||
25B030AF000
|
heap
|
page read and write
|
||
5D3800284000
|
trusted library allocation
|
page read and write
|
||
7958002A8000
|
direct allocation
|
page read and write
|
||
648000
|
unkown
|
page execute and read and write
|
||
AC627FE000
|
unkown
|
page readonly
|
||
6144004FC000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
614400E1C000
|
trusted library allocation
|
page read and write
|
||
614400401000
|
trusted library allocation
|
page read and write
|
||
6144001A0000
|
trusted library allocation
|
page read and write
|
||
614400C1C000
|
trusted library allocation
|
page read and write
|
||
2B14007C8000
|
trusted library allocation
|
page read and write
|
||
5D3800248000
|
trusted library allocation
|
page read and write
|
||
6144016F4000
|
trusted library allocation
|
page read and write
|
||
6144002A8000
|
trusted library allocation
|
page read and write
|
||
6144002A4000
|
trusted library allocation
|
page read and write
|
||
78080020C000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
5D38004C8000
|
trusted library allocation
|
page read and write
|
||
614401B0C000
|
trusted library allocation
|
page read and write
|
||
6144017BC000
|
trusted library allocation
|
page read and write
|
||
25B018D0000
|
trusted library section
|
page readonly
|
||
6769BFE000
|
stack
|
page read and write
|
||
5D3800424000
|
trusted library allocation
|
page read and write
|
||
614401B90000
|
trusted library allocation
|
page read and write
|
||
2B14002FC000
|
trusted library allocation
|
page read and write
|
||
AC5AFFE000
|
stack
|
page read and write
|
||
288800380000
|
trusted library allocation
|
page read and write
|
||
25B03771000
|
heap
|
page read and write
|
||
2B1400734000
|
trusted library allocation
|
page read and write
|
||
6747BFB000
|
stack
|
page read and write
|
||
61440161C000
|
trusted library allocation
|
page read and write
|
||
2B140040C000
|
trusted library allocation
|
page read and write
|
||
7808002B0000
|
trusted library allocation
|
page read and write
|
||
AC4A7FE000
|
unkown
|
page readonly
|
||
5D38003E0000
|
trusted library allocation
|
page read and write
|
||
614401718000
|
trusted library allocation
|
page read and write
|
||
5D3800214000
|
trusted library allocation
|
page read and write
|
||
614400490000
|
trusted library allocation
|
page read and write
|
||
25B07F7A000
|
heap
|
page read and write
|
||
25B030A2000
|
heap
|
page read and write
|
||
5D38002BC000
|
trusted library allocation
|
page read and write
|
||
20EF7000
|
heap
|
page read and write
|
||
2B140060C000
|
trusted library allocation
|
page read and write
|
||
61440173C000
|
trusted library allocation
|
page read and write
|
||
61440133C000
|
trusted library allocation
|
page read and write
|
||
5D380000C000
|
trusted library allocation
|
page read and write
|
||
7DC000212000
|
direct allocation
|
page read and write
|
||
1A7AE000
|
stack
|
page read and write
|
||
614400E5C000
|
trusted library allocation
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
614400F7C000
|
trusted library allocation
|
page read and write
|
||
614400AF0000
|
trusted library allocation
|
page read and write
|
||
5D38003C0000
|
trusted library allocation
|
page read and write
|
||
614400C50000
|
trusted library allocation
|
page read and write
|
||
25B03680000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
614401A5C000
|
trusted library allocation
|
page read and write
|
||
6745BFE000
|
stack
|
page read and write
|
||
614400EF0000
|
trusted library allocation
|
page read and write
|
||
2B1400201000
|
trusted library allocation
|
page read and write
|
||
675B3FC000
|
stack
|
page read and write
|
||
67503FE000
|
unkown
|
page readonly
|
||
6144006D8000
|
trusted library allocation
|
page read and write
|
||
AC697FE000
|
unkown
|
page readonly
|
||
614401810000
|
trusted library allocation
|
page read and write
|
||
288800308000
|
trusted library allocation
|
page read and write
|
||
61440089C000
|
trusted library allocation
|
page read and write
|
||
61440016C000
|
trusted library allocation
|
page read and write
|
||
6748BFB000
|
stack
|
page read and write
|
||
2B140075C000
|
trusted library allocation
|
page read and write
|
||
614401034000
|
trusted library allocation
|
page read and write
|
||
614401984000
|
trusted library allocation
|
page read and write
|
||
5D3800434000
|
trusted library allocation
|
page read and write
|
||
AC63FFE000
|
stack
|
page read and write
|
||
25B0369D000
|
heap
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
1F50C134000
|
heap
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
2B1400758000
|
trusted library allocation
|
page read and write
|
||
25B030A5000
|
heap
|
page read and write
|
||
5D38002E0000
|
trusted library allocation
|
page read and write
|
||
614400D7C000
|
trusted library allocation
|
page read and write
|
||
674A3FE000
|
unkown
|
page readonly
|
||
7DC0002D0000
|
direct allocation
|
page read and write
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
2B140039C000
|
trusted library allocation
|
page read and write
|
||
AC6AFFE000
|
stack
|
page read and write
|
||
6144003DC000
|
trusted library allocation
|
page read and write
|
||
7808002F4000
|
trusted library allocation
|
page read and write
|
||
614401558000
|
trusted library allocation
|
page read and write
|
||
61440118C000
|
trusted library allocation
|
page read and write
|
||
AC6D7FE000
|
unkown
|
page readonly
|
||
614400370000
|
trusted library allocation
|
page read and write
|
||
2B1400760000
|
trusted library allocation
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
5D3800094000
|
trusted library allocation
|
page read and write
|
||
2B14002E4000
|
trusted library allocation
|
page read and write
|
||
6144015AC000
|
trusted library allocation
|
page read and write
|
||
1AB9E000
|
stack
|
page read and write
|
||
1A8AF000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
AC6CFFE000
|
stack
|
page read and write
|
||
614400E0C000
|
trusted library allocation
|
page read and write
|
||
2B1400744000
|
trusted library allocation
|
page read and write
|
||
AC46FFE000
|
stack
|
page read and write
|
||
676CBFC000
|
stack
|
page read and write
|
||
61440110C000
|
trusted library allocation
|
page read and write
|
||
5D3800310000
|
trusted library allocation
|
page read and write
|
||
614400C74000
|
trusted library allocation
|
page read and write
|
||
614400C1C000
|
trusted library allocation
|
page read and write
|
||
2B1400238000
|
trusted library allocation
|
page read and write
|
||
614400EF0000
|
trusted library allocation
|
page read and write
|
||
6144004AC000
|
trusted library allocation
|
page read and write
|
||
614400CD4000
|
trusted library allocation
|
page read and write
|
||
5D380040C000
|
trusted library allocation
|
page read and write
|
||
1F50A2A3000
|
heap
|
page read and write
|
||
AC4BFFE000
|
stack
|
page read and write
|
||
6D519000
|
unkown
|
page readonly
|
||
614400D98000
|
trusted library allocation
|
page read and write
|
||
7DC00024C000
|
direct allocation
|
page read and write
|
||
25B03099000
|
heap
|
page read and write
|
||
AC4CFFE000
|
stack
|
page read and write
|
||
2B1400330000
|
trusted library allocation
|
page read and write
|
||
1F50C15E000
|
heap
|
page read and write
|
||
5D38000C1000
|
trusted library allocation
|
page read and write
|
||
2B14006F0000
|
trusted library allocation
|
page read and write
|
||
7958002DC000
|
direct allocation
|
page read and write
|
||
614400A20000
|
trusted library allocation
|
page read and write
|
||
1F514400000
|
heap
|
page read and write
|
||
614400001000
|
trusted library allocation
|
page read and write
|
||
614400A0C000
|
trusted library allocation
|
page read and write
|
||
1F50A245000
|
heap
|
page read and write
|
||
614400E0C000
|
trusted library allocation
|
page read and write
|
||
AC66FFE000
|
stack
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
5D3800344000
|
trusted library allocation
|
page read and write
|
||
1ACEE000
|
stack
|
page read and write
|
||
614400FBC000
|
trusted library allocation
|
page read and write
|
||
614400C84000
|
trusted library allocation
|
page read and write
|
||
614401601000
|
trusted library allocation
|
page read and write
|
||
20EF4000
|
heap
|
page read and write
|
||
61440159C000
|
trusted library allocation
|
page read and write
|
||
7808002A4000
|
trusted library allocation
|
page read and write
|
||
614400F0C000
|
trusted library allocation
|
page read and write
|
||
AC547FE000
|
unkown
|
page readonly
|
||
1F50A1A0000
|
heap
|
page read and write
|
||
7DC000284000
|
direct allocation
|
page read and write
|
||
25B03779000
|
heap
|
page read and write
|
||
614401A98000
|
trusted library allocation
|
page read and write
|
||
614400C18000
|
trusted library allocation
|
page read and write
|
||
2B140027C000
|
trusted library allocation
|
page read and write
|
||
61440167C000
|
trusted library allocation
|
page read and write
|
||
614400DC4000
|
trusted library allocation
|
page read and write
|
||
2B1400401000
|
trusted library allocation
|
page read and write
|
||
7DC000215000
|
direct allocation
|
page read and write
|
||
614400994000
|
trusted library allocation
|
page read and write
|
||
614401624000
|
trusted library allocation
|
page read and write
|
||
780800264000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
61440152C000
|
trusted library allocation
|
page read and write
|
||
614400D6C000
|
trusted library allocation
|
page read and write
|
||
28880032C000
|
trusted library allocation
|
page read and write
|
||
676DBFE000
|
stack
|
page read and write
|
||
676EBFE000
|
stack
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
1F50C1B3000
|
heap
|
page read and write
|
||
614400F64000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
614401112000
|
trusted library allocation
|
page read and write
|
||
2B14007E0000
|
trusted library allocation
|
page read and write
|
||
1A62F000
|
stack
|
page read and write
|
||
675CBFD000
|
stack
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
6144019DC000
|
trusted library allocation
|
page read and write
|
||
675DBFC000
|
stack
|
page read and write
|
||
6D517000
|
unkown
|
page read and write
|
||
6144006BC000
|
trusted library allocation
|
page read and write
|
||
7DC00026C000
|
direct allocation
|
page read and write
|
||
614401820000
|
trusted library allocation
|
page read and write
|
||
614401660000
|
trusted library allocation
|
page read and write
|
||
1F50C174000
|
heap
|
page read and write
|
||
6144002B4000
|
trusted library allocation
|
page read and write
|
||
25B03714000
|
heap
|
page read and write
|
||
57B000
|
unkown
|
page execute and read and write
|
||
288800304000
|
trusted library allocation
|
page read and write
|
||
676C3FE000
|
unkown
|
page readonly
|
||
61440199C000
|
trusted library allocation
|
page read and write
|
||
1F50A302000
|
heap
|
page read and write
|
||
614400066000
|
trusted library allocation
|
page read and write
|
||
5D3800378000
|
trusted library allocation
|
page read and write
|
||
2B14003EC000
|
trusted library allocation
|
page read and write
|
||
5D3800201000
|
trusted library allocation
|
page read and write
|
||
614401C28000
|
trusted library allocation
|
page read and write
|
||
6144001AC000
|
trusted library allocation
|
page read and write
|
||
25B076B2000
|
trusted library allocation
|
page read and write
|
||
1F50C136000
|
heap
|
page read and write
|
||
2B1400630000
|
trusted library allocation
|
page read and write
|
||
AC61FFE000
|
stack
|
page read and write
|
||
614401988000
|
trusted library allocation
|
page read and write
|
||
AC4C7FE000
|
unkown
|
page readonly
|
||
B0F000
|
stack
|
page read and write
|
||
1F50A327000
|
heap
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
614400184000
|
trusted library allocation
|
page read and write
|
||
1ADED000
|
stack
|
page read and write
|
||
1F50A2BF000
|
heap
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
614401828000
|
trusted library allocation
|
page read and write
|
||
2EE800278000
|
trusted library allocation
|
page read and write
|
||
2B140033C000
|
trusted library allocation
|
page read and write
|
||
2B140033C000
|
trusted library allocation
|
page read and write
|
||
1AC9D000
|
stack
|
page read and write
|
||
1F50A2A9000
|
heap
|
page read and write
|
||
6144004AC000
|
trusted library allocation
|
page read and write
|
||
614400070000
|
trusted library allocation
|
page read and write
|
||
614400BBC000
|
trusted library allocation
|
page read and write
|
||
AC617FE000
|
unkown
|
page readonly
|
||
614401540000
|
trusted library allocation
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
25B03725000
|
heap
|
page read and write
|
||
25B0A090000
|
trusted library section
|
page read and write
|
||
6144001B4000
|
trusted library allocation
|
page read and write
|
||
5D38001EC000
|
trusted library allocation
|
page read and write
|
||
6144004B8000
|
trusted library allocation
|
page read and write
|
||
614400330000
|
trusted library allocation
|
page read and write
|
||
2B1400430000
|
trusted library allocation
|
page read and write
|
||
7DC000210000
|
direct allocation
|
page read and write
|
||
5D3800460000
|
trusted library allocation
|
page read and write
|
||
7808002C0000
|
trusted library allocation
|
page read and write
|
||
67493FE000
|
unkown
|
page readonly
|
||
61E01000
|
direct allocation
|
page execute read
|
||
49E000
|
unkown
|
page readonly
|
||
614401318000
|
trusted library allocation
|
page read and write
|
||
614400370000
|
trusted library allocation
|
page read and write
|
||
614400C18000
|
trusted library allocation
|
page read and write
|
||
61440178C000
|
trusted library allocation
|
page read and write
|
||
5D3800424000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
675D3FE000
|
unkown
|
page readonly
|
||
8E3000
|
heap
|
page read and write
|
||
61440020C000
|
trusted library allocation
|
page read and write
|
||
25B09BEE000
|
trusted library section
|
page read and write
|
||
6144003DC000
|
trusted library allocation
|
page read and write
|
||
780800260000
|
trusted library allocation
|
page read and write
|
||
614401A80000
|
trusted library allocation
|
page read and write
|
||
25B0A0A0000
|
trusted library section
|
page read and write
|
||
614400A14000
|
trusted library allocation
|
page read and write
|
||
614401A6C000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
614400568000
|
trusted library allocation
|
page read and write
|
||
5D3800427000
|
trusted library allocation
|
page read and write
|
||
7DC000280000
|
direct allocation
|
page read and write
|
||
AC52FFD000
|
stack
|
page read and write
|
||
25B03721000
|
heap
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
614401170000
|
trusted library allocation
|
page read and write
|
||
7DC00030A000
|
direct allocation
|
page read and write
|
||
614400FBC000
|
trusted library allocation
|
page read and write
|
||
614401358000
|
trusted library allocation
|
page read and write
|
||
2EE800210000
|
trusted library allocation
|
page read and write
|
||
61440129C000
|
trusted library allocation
|
page read and write
|
||
6144012B8000
|
trusted library allocation
|
page read and write
|
||
6144003DC000
|
trusted library allocation
|
page read and write
|
||
614401024000
|
trusted library allocation
|
page read and write
|
||
5D3800068000
|
trusted library allocation
|
page read and write
|
||
614400F48000
|
trusted library allocation
|
page read and write
|
||
7958002EC000
|
direct allocation
|
page read and write
|
||
614401730000
|
trusted library allocation
|
page read and write
|
||
2B1400620000
|
trusted library allocation
|
page read and write
|
||
6771BFE000
|
stack
|
page read and write
|
||
614400348000
|
trusted library allocation
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
5D38002EC000
|
trusted library allocation
|
page read and write
|
||
6144002B6000
|
trusted library allocation
|
page read and write
|
||
67423FE000
|
unkown
|
page readonly
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
6144012A8000
|
trusted library allocation
|
page read and write
|
||
2B140035C000
|
trusted library allocation
|
page read and write
|
||
25B7D080000
|
heap
|
page read and write
|
||
614400A94000
|
trusted library allocation
|
page read and write
|
||
1F50C170000
|
heap
|
page read and write
|
||
614401BB9000
|
trusted library allocation
|
page read and write
|
||
2EE800274000
|
trusted library allocation
|
page read and write
|
||
614400201000
|
trusted library allocation
|
page read and write
|
||
6144016AC000
|
trusted library allocation
|
page read and write
|
||
2EE8002A0000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page execute and read and write
|
||
6144001D4000
|
trusted library allocation
|
page read and write
|
||
2B1400640000
|
trusted library allocation
|
page read and write
|
||
6144001D8000
|
trusted library allocation
|
page read and write
|
||
288800210000
|
trusted library allocation
|
page read and write
|
||
780800230000
|
trusted library allocation
|
page read and write
|
||
2EE800294000
|
trusted library allocation
|
page read and write
|
||
676BBFA000
|
stack
|
page read and write
|
||
7958002E4000
|
direct allocation
|
page read and write
|
||
5D38001E8000
|
trusted library allocation
|
page read and write
|
||
AC6B7FE000
|
unkown
|
page readonly
|
||
614400E84000
|
trusted library allocation
|
page read and write
|
||
79580020C000
|
direct allocation
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
1F50A29E000
|
heap
|
page read and write
|
||
AC5DFFC000
|
stack
|
page read and write
|
||
6144016E8000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
614400220000
|
trusted library allocation
|
page read and write
|
||
614401508000
|
trusted library allocation
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
25B03070000
|
heap
|
page read and write
|
||
2B1400668000
|
trusted library allocation
|
page read and write
|
||
5D380038C000
|
trusted library allocation
|
page read and write
|
||
25B030A2000
|
heap
|
page read and write
|
||
2888002D8000
|
trusted library allocation
|
page read and write
|
||
5D3800144000
|
trusted library allocation
|
page read and write
|
||
1F50A2CB000
|
heap
|
page read and write
|
||
5D38003A0000
|
trusted library allocation
|
page read and write
|
||
AC4AFFE000
|
stack
|
page read and write
|
||
795800220000
|
direct allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
7DC000250000
|
direct allocation
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
614400DC8000
|
trusted library allocation
|
page read and write
|
||
614401BDC000
|
trusted library allocation
|
page read and write
|
||
AC4B7FE000
|
unkown
|
page readonly
|
||
61440009D000
|
trusted library allocation
|
page read and write
|
||
288800350000
|
trusted library allocation
|
page read and write
|
||
614400C01000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
6144005F8000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
7808002C0000
|
trusted library allocation
|
page read and write
|
||
674B3FE000
|
unkown
|
page readonly
|
||
25B7D010000
|
heap
|
page read and write
|
||
614401BD0000
|
trusted library allocation
|
page read and write
|
||
61440155C000
|
trusted library allocation
|
page read and write
|
||
614400F80000
|
trusted library allocation
|
page read and write
|
||
795800250000
|
direct allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
614400FE0000
|
trusted library allocation
|
page read and write
|
||
674F3FE000
|
unkown
|
page readonly
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
288800250000
|
trusted library allocation
|
page read and write
|
||
614400A14000
|
trusted library allocation
|
page read and write
|
||
614401824000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
67573FE000
|
unkown
|
page readonly
|
||
614401B18000
|
trusted library allocation
|
page read and write
|
||
614400EC8000
|
trusted library allocation
|
page read and write
|
||
1F50C153000
|
heap
|
page read and write
|
||
614400724000
|
trusted library allocation
|
page read and write
|
||
25B0368A000
|
heap
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
614401748000
|
trusted library allocation
|
page read and write
|
||
1F50A360000
|
heap
|
page read and write
|
||
AC517FE000
|
unkown
|
page readonly
|
||
25B099A0000
|
trusted library section
|
page read and write
|
||
7DC000294000
|
direct allocation
|
page read and write
|
||
1F514402000
|
heap
|
page read and write
|
||
6751BFE000
|
stack
|
page read and write
|
||
6144001EC000
|
trusted library allocation
|
page read and write
|
||
6144004C8000
|
trusted library allocation
|
page read and write
|
||
1F50A2BF000
|
heap
|
page read and write
|
||
28880020C000
|
trusted library allocation
|
page read and write
|
||
5D380026C000
|
trusted library allocation
|
page read and write
|
||
25B7D150000
|
heap
|
page read and write
|
||
25B018F3000
|
heap
|
page read and write
|
||
25B07F71000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
614400E90000
|
trusted library allocation
|
page read and write
|
||
AC5B7FE000
|
unkown
|
page readonly
|
||
25B07F27000
|
heap
|
page read and write
|
||
2B1400684000
|
trusted library allocation
|
page read and write
|
||
614401098000
|
trusted library allocation
|
page read and write
|
||
25B030A3000
|
heap
|
page read and write
|
||
614401001000
|
trusted library allocation
|
page read and write
|
||
61440110D000
|
trusted library allocation
|
page read and write
|
||
1F50C188000
|
heap
|
page read and write
|
||
5D3800278000
|
trusted library allocation
|
page read and write
|
||
288800344000
|
trusted library allocation
|
page read and write
|
||
1F50A2A3000
|
heap
|
page read and write
|
||
6144019E4000
|
trusted library allocation
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
614401BD0000
|
trusted library allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
1AE61000
|
heap
|
page read and write
|
||
2B1400310000
|
trusted library allocation
|
page read and write
|
||
21031000
|
heap
|
page read and write
|
||
6144001AC000
|
trusted library allocation
|
page read and write
|
||
1F50A2ED000
|
heap
|
page read and write
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
614400C74000
|
trusted library allocation
|
page read and write
|
||
25B08130000
|
heap
|
page read and write
|
||
6144002FC000
|
trusted library allocation
|
page read and write
|
||
7808002A0000
|
trusted library allocation
|
page read and write
|
||
614400B50000
|
trusted library allocation
|
page read and write
|
||
1F512EF0000
|
trusted library allocation
|
page read and write
|
||
614401BA8000
|
trusted library allocation
|
page read and write
|
||
288800424000
|
trusted library allocation
|
page read and write
|
||
25B03700000
|
heap
|
page read and write
|
||
2B1400730000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
2EE800235000
|
trusted library allocation
|
page read and write
|
||
6144019B4000
|
trusted library allocation
|
page read and write
|
||
20EDD000
|
heap
|
page read and write
|
||
25B0A020000
|
trusted library section
|
page read and write
|
||
6144015D4000
|
trusted library allocation
|
page read and write
|
||
7958002D0000
|
direct allocation
|
page read and write
|
||
614401AF4000
|
trusted library allocation
|
page read and write
|
||
25B03300000
|
heap
|
page read and write
|
||
25B030B0000
|
heap
|
page read and write
|
||
288800418000
|
trusted library allocation
|
page read and write
|
||
1F50C144000
|
heap
|
page read and write
|
||
6741BFE000
|
unkown
|
page read and write
|
||
288800290000
|
trusted library allocation
|
page read and write
|
||
614401798000
|
trusted library allocation
|
page read and write
|
||
5D38002B8000
|
trusted library allocation
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
20ED0000
|
trusted library allocation
|
page read and write
|
||
6759BFD000
|
stack
|
page read and write
|
||
5D38001DC000
|
trusted library allocation
|
page read and write
|
||
614400601000
|
trusted library allocation
|
page read and write
|
||
5D3800470000
|
trusted library allocation
|
page read and write
|
||
614400598000
|
trusted library allocation
|
page read and write
|
||
1F50C148000
|
heap
|
page read and write
|
||
614400118000
|
trusted library allocation
|
page read and write
|
||
6144016D0000
|
trusted library allocation
|
page read and write
|
||
780800270000
|
trusted library allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
6144009D0000
|
trusted library allocation
|
page read and write
|
||
2B14002B8000
|
trusted library allocation
|
page read and write
|
||
2EE800264000
|
trusted library allocation
|
page read and write
|
||
675E3FE000
|
unkown
|
page readonly
|
||
614401758000
|
trusted library allocation
|
page read and write
|
||
28880032C000
|
trusted library allocation
|
page read and write
|
||
6144008FC000
|
trusted library allocation
|
page read and write
|
||
6144012E8000
|
trusted library allocation
|
page read and write
|
||
5D3800274000
|
trusted library allocation
|
page read and write
|
||
614400E2C000
|
trusted library allocation
|
page read and write
|
||
614400924000
|
trusted library allocation
|
page read and write
|
||
5D3800304000
|
trusted library allocation
|
page read and write
|
||
2EE800248000
|
trusted library allocation
|
page read and write
|
||
5D3800134000
|
trusted library allocation
|
page read and write
|
||
2B14006AC000
|
trusted library allocation
|
page read and write
|
||
AC577FE000
|
unkown
|
page readonly
|
||
614400290000
|
trusted library allocation
|
page read and write
|
||
25B018F0000
|
heap
|
page read and write
|
||
614400789000
|
trusted library allocation
|
page read and write
|
||
5D3800044000
|
trusted library allocation
|
page read and write
|
||
2B1400601000
|
trusted library allocation
|
page read and write
|
||
25B0373D000
|
heap
|
page read and write
|
||
67533FE000
|
unkown
|
page readonly
|
||
1F50A2BF000
|
heap
|
page read and write
|
||
2B1400408000
|
trusted library allocation
|
page read and write
|
||
5D3800364000
|
trusted library allocation
|
page read and write
|
||
614400794000
|
trusted library allocation
|
page read and write
|
||
614400BE0000
|
trusted library allocation
|
page read and write
|
||
2EE8002B8000
|
trusted library allocation
|
page read and write
|
||
24FC000
|
heap
|
page read and write
|
||
549000
|
unkown
|
page execute and read and write
|
||
2B1400250000
|
trusted library allocation
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
2B1400310000
|
trusted library allocation
|
page read and write
|
||
614400669000
|
trusted library allocation
|
page read and write
|
||
1F50C1D6000
|
heap
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
25B036A2000
|
heap
|
page read and write
|
||
5D38002E0000
|
trusted library allocation
|
page read and write
|
||
5D3800124000
|
trusted library allocation
|
page read and write
|
||
614400A48000
|
trusted library allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
6144017DC000
|
trusted library allocation
|
page read and write
|
||
6767BFE000
|
stack
|
page read and write
|
||
1F50C1C8000
|
heap
|
page read and write
|
||
25B0371F000
|
heap
|
page read and write
|
||
795800230000
|
direct allocation
|
page read and write
|
||
6144017E4000
|
trusted library allocation
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
7DC0002D8000
|
direct allocation
|
page read and write
|
||
6762BFD000
|
stack
|
page read and write
|
||
2888002C4000
|
trusted library allocation
|
page read and write
|
||
614400F00000
|
trusted library allocation
|
page read and write
|
||
614400D48000
|
trusted library allocation
|
page read and write
|
||
614401098000
|
trusted library allocation
|
page read and write
|
||
1AE61000
|
heap
|
page read and write
|
||
6144017C4000
|
trusted library allocation
|
page read and write
|
||
61440061C000
|
trusted library allocation
|
page read and write
|
||
288800201000
|
trusted library allocation
|
page read and write
|
||
288800220000
|
trusted library allocation
|
page read and write
|
||
6144004B0000
|
trusted library allocation
|
page read and write
|
||
614400060000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
67673FE000
|
unkown
|
page readonly
|
||
6D4D1000
|
unkown
|
page readonly
|
||
614400A14000
|
trusted library allocation
|
page read and write
|
||
288800248000
|
trusted library allocation
|
page read and write
|
||
614400CA4000
|
trusted library allocation
|
page read and write
|
||
614400F30000
|
trusted library allocation
|
page read and write
|
||
6144016EC000
|
trusted library allocation
|
page read and write
|
||
7DC00025C000
|
direct allocation
|
page read and write
|
||
614400B7C000
|
trusted library allocation
|
page read and write
|
||
61440014C000
|
trusted library allocation
|
page read and write
|
||
288800374000
|
trusted library allocation
|
page read and write
|
||
614400294000
|
trusted library allocation
|
page read and write
|
||
2B1400354000
|
trusted library allocation
|
page read and write
|
||
59B000
|
unkown
|
page execute and read and write
|
||
2EE8002B8000
|
trusted library allocation
|
page read and write
|
||
614400AC8000
|
trusted library allocation
|
page read and write
|
||
288800360000
|
trusted library allocation
|
page read and write
|
||
614400F58000
|
trusted library allocation
|
page read and write
|
||
614401B04000
|
trusted library allocation
|
page read and write
|
||
24FE000
|
heap
|
page read and write
|
||
5D38001F0000
|
trusted library allocation
|
page read and write
|
||
614400308000
|
trusted library allocation
|
page read and write
|
||
614400B40000
|
trusted library allocation
|
page read and write
|
||
614400B40000
|
trusted library allocation
|
page read and write
|
||
614400314000
|
trusted library allocation
|
page read and write
|
||
6144015F0000
|
trusted library allocation
|
page read and write
|
||
2B14006B0000
|
trusted library allocation
|
page read and write
|
||
288800284000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
AC53FFE000
|
stack
|
page read and write
|
||
25B07F78000
|
heap
|
page read and write
|
||
6144006A8000
|
trusted library allocation
|
page read and write
|
||
25B09E1E000
|
trusted library section
|
page read and write
|
||
6770BF9000
|
stack
|
page read and write
|
||
990000
|
direct allocation
|
page execute and read and write
|
||
614400F94000
|
trusted library allocation
|
page read and write
|
||
61440129C000
|
trusted library allocation
|
page read and write
|
||
614400858000
|
trusted library allocation
|
page read and write
|
||
61440168C000
|
trusted library allocation
|
page read and write
|
||
1AE50000
|
heap
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
5D38001F8000
|
trusted library allocation
|
page read and write
|
||
5D380023C000
|
trusted library allocation
|
page read and write
|
||
614401318000
|
trusted library allocation
|
page read and write
|
||
67683FE000
|
unkown
|
page readonly
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
614401778000
|
trusted library allocation
|
page read and write
|
||
6144015C4000
|
trusted library allocation
|
page read and write
|
||
67713FE000
|
unkown
|
page readonly
|
||
288800238000
|
trusted library allocation
|
page read and write
|
||
6144005B0000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
1F50A2A4000
|
heap
|
page read and write
|
||
614401734000
|
trusted library allocation
|
page read and write
|
||
614401840000
|
trusted library allocation
|
page read and write
|
||
1AE61000
|
heap
|
page read and write
|
||
2B1400698000
|
trusted library allocation
|
page read and write
|
||
25B097A0000
|
trusted library section
|
page read and write
|
||
614401C1C000
|
trusted library allocation
|
page read and write
|
||
2EE8002FC000
|
trusted library allocation
|
page read and write
|
||
614400F94000
|
trusted library allocation
|
page read and write
|
||
6144011AC000
|
trusted library allocation
|
page read and write
|
||
5D3800220000
|
trusted library allocation
|
page read and write
|
||
61440106C000
|
trusted library allocation
|
page read and write
|
||
25B09BE0000
|
trusted library section
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
5D3800304000
|
trusted library allocation
|
page read and write
|
||
67543FE000
|
unkown
|
page readonly
|
||
67553FE000
|
unkown
|
page readonly
|
||
2B1400688000
|
trusted library allocation
|
page read and write
|
||
614400684000
|
trusted library allocation
|
page read and write
|
||
5D3800224000
|
trusted library allocation
|
page read and write
|
||
614400950000
|
trusted library allocation
|
page read and write
|
||
2B14006D0000
|
trusted library allocation
|
page read and write
|
||
674E3FE000
|
unkown
|
page readonly
|
||
61440151C000
|
trusted library allocation
|
page read and write
|
||
1F50A2FF000
|
heap
|
page read and write
|
||
25B095A7000
|
unclassified section
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
25B036E7000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
614401A70000
|
trusted library allocation
|
page read and write
|
||
614401AF0000
|
trusted library allocation
|
page read and write
|
||
5D3800264000
|
trusted library allocation
|
page read and write
|
||
AC5FFFD000
|
stack
|
page read and write
|
||
2B1400368000
|
trusted library allocation
|
page read and write
|
||
1F50A2E3000
|
heap
|
page read and write
|
||
614400E38000
|
trusted library allocation
|
page read and write
|
||
614400228000
|
trusted library allocation
|
page read and write
|
||
25B030A2000
|
heap
|
page read and write
|
||
67453FE000
|
unkown
|
page readonly
|
||
67613FE000
|
unkown
|
page readonly
|
||
7DC0002D8000
|
direct allocation
|
page read and write
|
||
5D3800324000
|
trusted library allocation
|
page read and write
|
||
614400C84000
|
trusted library allocation
|
page read and write
|
||
AC49FFE000
|
stack
|
page read and write
|
||
5D3800114000
|
trusted library allocation
|
page read and write
|
||
7958002AC000
|
direct allocation
|
page read and write
|
||
6757BFC000
|
stack
|
page read and write
|
||
AC537FE000
|
unkown
|
page readonly
|
||
61440017C000
|
trusted library allocation
|
page read and write
|
||
614400480000
|
trusted library allocation
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
5D38001AC000
|
trusted library allocation
|
page read and write
|
||
614400714000
|
trusted library allocation
|
page read and write
|
||
1F50A2A3000
|
heap
|
page read and write
|
||
61440181C000
|
trusted library allocation
|
page read and write
|
||
67463FE000
|
unkown
|
page readonly
|
||
2B14002D4000
|
trusted library allocation
|
page read and write
|
||
61440040C000
|
trusted library allocation
|
page read and write
|
||
614401A68000
|
trusted library allocation
|
page read and write
|
||
AC50FFD000
|
stack
|
page read and write
|
||
6144001AC000
|
trusted library allocation
|
page read and write
|
||
20EE9000
|
heap
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
614400964000
|
trusted library allocation
|
page read and write
|
||
614400FE0000
|
trusted library allocation
|
page read and write
|
||
5D380002A000
|
trusted library allocation
|
page read and write
|
||
6144016A0000
|
trusted library allocation
|
page read and write
|
||
1F50A330000
|
heap
|
page read and write
|
||
288800430000
|
trusted library allocation
|
page read and write
|
||
6765BFE000
|
stack
|
page read and write
|
||
2B14006CC000
|
trusted library allocation
|
page read and write
|
||
25B0372B000
|
heap
|
page read and write
|
||
795800201000
|
direct allocation
|
page read and write
|
||
6144009EC000
|
trusted library allocation
|
page read and write
|
||
780800274000
|
trusted library allocation
|
page read and write
|
||
795800210000
|
direct allocation
|
page read and write
|
||
614401BD0000
|
trusted library allocation
|
page read and write
|
||
5D3800250000
|
trusted library allocation
|
page read and write
|
||
6144017C0000
|
trusted library allocation
|
page read and write
|
||
61440033C000
|
trusted library allocation
|
page read and write
|
||
614401A60000
|
trusted library allocation
|
page read and write
|
||
614401A20000
|
trusted library allocation
|
page read and write
|
||
AC60FFE000
|
stack
|
page read and write
|
||
614400D08000
|
trusted library allocation
|
page read and write
|
||
61440110C000
|
trusted library allocation
|
page read and write
|
||
2B14006C4000
|
trusted library allocation
|
page read and write
|
||
6761BFB000
|
stack
|
page read and write
|
||
614400A7C000
|
trusted library allocation
|
page read and write
|
||
20ED4000
|
heap
|
page read and write
|
||
1A4D0000
|
heap
|
page read and write
|
||
5D38001A0000
|
trusted library allocation
|
page read and write
|
||
AC567FE000
|
unkown
|
page readonly
|
||
614401620000
|
trusted library allocation
|
page read and write
|
||
5D380025C000
|
trusted library allocation
|
page read and write
|
||
2B1400248000
|
trusted library allocation
|
page read and write
|
||
2EE800294000
|
trusted library allocation
|
page read and write
|
||
61440140C000
|
trusted library allocation
|
page read and write
|
||
614401118000
|
trusted library allocation
|
page read and write
|
||
61440133C000
|
trusted library allocation
|
page read and write
|
||
614400694000
|
trusted library allocation
|
page read and write
|
||
25B07D17000
|
unclassified section
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
5D3800378000
|
trusted library allocation
|
page read and write
|
||
6144003DC000
|
trusted library allocation
|
page read and write
|
||
614400330000
|
trusted library allocation
|
page read and write
|
||
614401A4C000
|
trusted library allocation
|
page read and write
|
||
7808002C0000
|
trusted library allocation
|
page read and write
|
||
5D3800304000
|
trusted library allocation
|
page read and write
|
||
5D38002EC000
|
trusted library allocation
|
page read and write
|
||
2EE800201000
|
trusted library allocation
|
page read and write
|
||
6144011C4000
|
trusted library allocation
|
page read and write
|
||
5D3800160000
|
trusted library allocation
|
page read and write
|
||
194000
|
stack
|
page read and write
|
||
28880027C000
|
trusted library allocation
|
page read and write
|
||
2EE8002B8000
|
trusted library allocation
|
page read and write
|
||
2EE800294000
|
trusted library allocation
|
page read and write
|
||
6768BFE000
|
stack
|
page read and write
|
||
24F3000
|
heap
|
page read and write
|
||
1F50A2EB000
|
heap
|
page read and write
|
||
5D38002D0000
|
trusted library allocation
|
page read and write
|
||
2EE800238000
|
trusted library allocation
|
page read and write
|
||
25B7D0D0000
|
trusted library allocation
|
page read and write
|
||
67603FE000
|
unkown
|
page readonly
|
||
2B1400404000
|
trusted library allocation
|
page read and write
|
||
5D38003CC000
|
trusted library allocation
|
page read and write
|
||
5D3800454000
|
trusted library allocation
|
page read and write
|
||
2B14007D0000
|
trusted library allocation
|
page read and write
|
||
614400350000
|
trusted library allocation
|
page read and write
|
||
6752BFA000
|
stack
|
page read and write
|
||
5D380038C000
|
trusted library allocation
|
page read and write
|
||
614401B2C000
|
trusted library allocation
|
page read and write
|
||
61440172C000
|
trusted library allocation
|
page read and write
|
||
6144015CC000
|
trusted library allocation
|
page read and write
|
||
20EED000
|
heap
|
page read and write
|
||
61440150C000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
614401638000
|
trusted library allocation
|
page read and write
|
||
288800404000
|
trusted library allocation
|
page read and write
|
||
1F50C013000
|
heap
|
page read and write
|
||
614401A90000
|
trusted library allocation
|
page read and write
|
||
6144006CC000
|
trusted library allocation
|
page read and write
|
||
6144009B4000
|
trusted library allocation
|
page read and write
|
||
614401C0C000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
2B1400614000
|
trusted library allocation
|
page read and write
|
||
614401834000
|
trusted library allocation
|
page read and write
|
||
66E000
|
unkown
|
page execute and read and write
|
||
614401AA8000
|
trusted library allocation
|
page read and write
|
||
67633FE000
|
unkown
|
page readonly
|
||
614401A24000
|
trusted library allocation
|
page read and write
|
||
6144017F8000
|
trusted library allocation
|
page read and write
|
||
6144019A8000
|
trusted library allocation
|
page read and write
|
||
614400E44000
|
trusted library allocation
|
page read and write
|
||
AC5C7FE000
|
unkown
|
page readonly
|
||
21011000
|
heap
|
page read and write
|
||
25B036E8000
|
heap
|
page read and write
|
||
5D3800280000
|
trusted library allocation
|
page read and write
|
||
614401868000
|
trusted library allocation
|
page read and write
|
||
780800220000
|
trusted library allocation
|
page read and write
|
||
674ABFA000
|
stack
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
5D38000CC000
|
trusted library allocation
|
page read and write
|
||
1F50A1F0000
|
trusted library section
|
page readonly
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
614400B6C000
|
trusted library allocation
|
page read and write
|
||
614401854000
|
trusted library allocation
|
page read and write
|
||
5D3800450000
|
trusted library allocation
|
page read and write
|
||
6144008D8000
|
trusted library allocation
|
page read and write
|
||
6144007F0000
|
trusted library allocation
|
page read and write
|
||
7808002C0000
|
trusted library allocation
|
page read and write
|
||
614400B00000
|
trusted library allocation
|
page read and write
|
||
2B14006B4000
|
trusted library allocation
|
page read and write
|
||
6144000D0000
|
trusted library allocation
|
page read and write
|
||
614400D88000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
unkown
|
page readonly
|
||
2888003C4000
|
trusted library allocation
|
page read and write
|
||
AC68FFD000
|
stack
|
page read and write
|
||
1F50C15E000
|
heap
|
page read and write
|
||
5D3800234000
|
trusted library allocation
|
page read and write
|
||
6144016C8000
|
trusted library allocation
|
page read and write
|
||
2B14006EC000
|
trusted library allocation
|
page read and write
|
||
614401C01000
|
trusted library allocation
|
page read and write
|
||
614401BC4000
|
trusted library allocation
|
page read and write
|
||
614401554000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
61440000C000
|
trusted library allocation
|
page read and write
|
||
20EF7000
|
heap
|
page read and write
|
||
2B1400210000
|
trusted library allocation
|
page read and write
|
||
614401634000
|
trusted library allocation
|
page read and write
|
||
7DC000311000
|
direct allocation
|
page read and write
|
||
79580024C000
|
direct allocation
|
page read and write
|
||
6144013CC000
|
trusted library allocation
|
page read and write
|
||
20EEF000
|
heap
|
page read and write
|
||
614400EA8000
|
trusted library allocation
|
page read and write
|
||
AC56FFE000
|
stack
|
page read and write
|
||
614401388000
|
trusted library allocation
|
page read and write
|
||
61440120C000
|
trusted library allocation
|
page read and write
|
||
1F50A25F000
|
heap
|
page read and write
|
||
2B1400380000
|
trusted library allocation
|
page read and write
|
||
5D3800324000
|
trusted library allocation
|
page read and write
|
||
1F50A230000
|
heap
|
page read and write
|
||
67663FE000
|
unkown
|
page readonly
|
||
614401708000
|
trusted library allocation
|
page read and write
|
||
61440100C000
|
trusted library allocation
|
page read and write
|
||
6144016A8000
|
trusted library allocation
|
page read and write
|
||
614400914000
|
trusted library allocation
|
page read and write
|
||
614400298000
|
trusted library allocation
|
page read and write
|
||
5D38000DC000
|
trusted library allocation
|
page read and write
|
||
25B0A031000
|
trusted library section
|
page read and write
|
||
614400054000
|
trusted library allocation
|
page read and write
|
||
61440107C000
|
trusted library allocation
|
page read and write
|
||
614400CDC000
|
trusted library allocation
|
page read and write
|
||
7DC000217000
|
direct allocation
|
page read and write
|
||
2B140025C000
|
trusted library allocation
|
page read and write
|
||
AC65FFE000
|
stack
|
page read and write
|
||
5A7000
|
unkown
|
page execute and read and write
|
||
614401428000
|
trusted library allocation
|
page read and write
|
||
5D38002B0000
|
trusted library allocation
|
page read and write
|
||
21022000
|
heap
|
page read and write
|
||
1F50C1AA000
|
heap
|
page read and write
|
||
2B14002F4000
|
trusted library allocation
|
page read and write
|
||
61440022C000
|
trusted library allocation
|
page read and write
|
||
5D38002D4000
|
trusted library allocation
|
page read and write
|
||
5D3800001000
|
trusted library allocation
|
page read and write
|
||
6144016FC000
|
trusted library allocation
|
page read and write
|
||
1A90E000
|
stack
|
page read and write
|
||
2B140085C000
|
trusted library allocation
|
page read and write
|
||
6144012EC000
|
trusted library allocation
|
page read and write
|
||
AC457FE000
|
unkown
|
page readonly
|
||
614400DDC000
|
trusted library allocation
|
page read and write
|
||
6144015BC000
|
trusted library allocation
|
page read and write
|
||
676ABFE000
|
stack
|
page read and write
|
||
614401A94000
|
trusted library allocation
|
page read and write
|
||
5D3800210000
|
trusted library allocation
|
page read and write
|
||
614401684000
|
trusted library allocation
|
page read and write
|
||
7808002A4000
|
trusted library allocation
|
page read and write
|
||
25B09E10000
|
trusted library section
|
page read and write
|
||
6144013E4000
|
trusted library allocation
|
page read and write
|
||
6760BFE000
|
stack
|
page read and write
|
||
61440077C000
|
trusted library allocation
|
page read and write
|
||
20EF7000
|
heap
|
page read and write
|
||
1F50C13E000
|
heap
|
page read and write
|
||
6144001C8000
|
trusted library allocation
|
page read and write
|
||
2B1400714000
|
trusted library allocation
|
page read and write
|
||
2B1400230000
|
trusted library allocation
|
page read and write
|
||
25B093D2000
|
trusted library section
|
page read and write
|
||
5D38002F8000
|
trusted library allocation
|
page read and write
|
||
288800358000
|
trusted library allocation
|
page read and write
|
||
676FBFD000
|
stack
|
page read and write
|
||
614401890000
|
trusted library allocation
|
page read and write
|
||
2B1400288000
|
trusted library allocation
|
page read and write
|
||
614401518000
|
trusted library allocation
|
page read and write
|
||
2EE8002A8000
|
trusted library allocation
|
page read and write
|
||
7DC0002C0000
|
direct allocation
|
page read and write
|
||
25B0A0B1000
|
trusted library section
|
page read and write
|
||
61440080C000
|
trusted library allocation
|
page read and write
|
||
AC637FE000
|
unkown
|
page readonly
|
||
AC4EFFE000
|
stack
|
page read and write
|
||
5D3800258000
|
trusted library allocation
|
page read and write
|
||
5D38003B4000
|
trusted library allocation
|
page read and write
|
||
1F50A2BD000
|
heap
|
page read and write
|
||
614401AE0000
|
trusted library allocation
|
page read and write
|
||
61440164C000
|
trusted library allocation
|
page read and write
|
||
1F50A358000
|
heap
|
page read and write
|
||
25B07F66000
|
heap
|
page read and write
|
||
614400830000
|
trusted library allocation
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
614400A58000
|
trusted library allocation
|
page read and write
|
||
7DC000270000
|
direct allocation
|
page read and write
|
||
2B1400320000
|
trusted library allocation
|
page read and write
|
||
614401A34000
|
trusted library allocation
|
page read and write
|
||
614401114000
|
trusted library allocation
|
page read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
67593FE000
|
unkown
|
page readonly
|
||
25B036A2000
|
heap
|
page read and write
|
||
25B03776000
|
heap
|
page read and write
|
||
6144001F8000
|
trusted library allocation
|
page read and write
|
||
2B1400720000
|
trusted library allocation
|
page read and write
|
||
6144016A4000
|
trusted library allocation
|
page read and write
|
||
7808002F0000
|
trusted library allocation
|
page read and write
|
||
514000
|
unkown
|
page execute and read and write
|
||
5D3800268000
|
trusted library allocation
|
page read and write
|
||
614400514000
|
trusted library allocation
|
page read and write
|
||
5D3800254000
|
trusted library allocation
|
page read and write
|
||
614400774000
|
trusted library allocation
|
page read and write
|
||
61440107C000
|
trusted library allocation
|
page read and write
|
||
7808002C0000
|
trusted library allocation
|
page read and write
|
||
61440036C000
|
trusted library allocation
|
page read and write
|
||
614401054000
|
trusted library allocation
|
page read and write
|
||
1F50A2F8000
|
heap
|
page read and write
|
||
2888003A8000
|
trusted library allocation
|
page read and write
|
||
614400328000
|
trusted library allocation
|
page read and write
|
||
6144015E4000
|
trusted library allocation
|
page read and write
|
||
614400370000
|
trusted library allocation
|
page read and write
|
||
7DC0002E0000
|
direct allocation
|
page read and write
|
||
1F50A2ED000
|
heap
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
674C3FE000
|
unkown
|
page readonly
|
||
61440154C000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
5D3800228000
|
trusted library allocation
|
page read and write
|
||
1F50C123000
|
heap
|
page read and write
|
||
614401BD0000
|
trusted library allocation
|
page read and write
|
||
676F3FE000
|
unkown
|
page readonly
|
||
614400C74000
|
trusted library allocation
|
page read and write
|
||
7DC00021C000
|
direct allocation
|
page read and write
|
||
67563FE000
|
unkown
|
page readonly
|
||
1F50CDC0000
|
unkown
|
page read and write
|
||
2EE800250000
|
trusted library allocation
|
page read and write
|
||
AC607FE000
|
unkown
|
page readonly
|
||
614401618000
|
trusted library allocation
|
page read and write
|
||
614401318000
|
trusted library allocation
|
page read and write
|
||
AC497FE000
|
unkown
|
page readonly
|
||
6144017B8000
|
trusted library allocation
|
page read and write
|
||
614401BEC000
|
trusted library allocation
|
page read and write
|
||
2B1400390000
|
trusted library allocation
|
page read and write
|
||
614400330000
|
trusted library allocation
|
page read and write
|
||
614400EA8000
|
trusted library allocation
|
page read and write
|
||
6144007A8000
|
trusted library allocation
|
page read and write
|
||
2B1400330000
|
trusted library allocation
|
page read and write
|
||
614400C9C000
|
trusted library allocation
|
page read and write
|
||
614401A28000
|
trusted library allocation
|
page read and write
|
||
780800288000
|
trusted library allocation
|
page read and write
|
||
780800248000
|
trusted library allocation
|
page read and write
|
||
2B14007CC000
|
trusted library allocation
|
page read and write
|
||
676A3FE000
|
unkown
|
page readonly
|
||
25B036A9000
|
heap
|
page read and write
|
||
2B1400610000
|
trusted library allocation
|
page read and write
|
||
5D380026C000
|
trusted library allocation
|
page read and write
|
||
5D3800401000
|
trusted library allocation
|
page read and write
|
||
288800364000
|
trusted library allocation
|
page read and write
|
||
6756BFB000
|
stack
|
page read and write
|
||
25B09586000
|
trusted library section
|
page read and write
|
||
2888003AC000
|
trusted library allocation
|
page read and write
|
||
AC44FFF000
|
stack
|
page read and write
|
||
2B1400648000
|
trusted library allocation
|
page read and write
|
||
614400128000
|
trusted library allocation
|
page read and write
|
||
6764BFC000
|
stack
|
page read and write
|
||
614401AA4000
|
trusted library allocation
|
page read and write
|
||
614401738000
|
trusted library allocation
|
page read and write
|
||
2B1400694000
|
trusted library allocation
|
page read and write
|
||
5D380046C000
|
trusted library allocation
|
page read and write
|
||
6144000F0000
|
trusted library allocation
|
page read and write
|
||
614401A1C000
|
trusted library allocation
|
page read and write
|
||
2EE8002B4000
|
trusted library allocation
|
page read and write
|
||
6144017E0000
|
trusted library allocation
|
page read and write
|
||
614401170000
|
trusted library allocation
|
page read and write
|
||
614400FBC000
|
trusted library allocation
|
page read and write
|
||
614400330000
|
trusted library allocation
|
page read and write
|
||
1A76F000
|
stack
|
page read and write
|
||
25B07E20000
|
heap
|
page read and write
|
||
614401A88000
|
trusted library allocation
|
page read and write
|
||
1F50C141000
|
heap
|
page read and write
|
||
614400C74000
|
trusted library allocation
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
2B1400700000
|
trusted library allocation
|
page read and write
|
||
6144002F0000
|
trusted library allocation
|
page read and write
|
||
25B07DA7000
|
unclassified section
|
page read and write
|
||
614400DC8000
|
trusted library allocation
|
page read and write
|
||
6144008B4000
|
trusted library allocation
|
page read and write
|
||
25B7CF60000
|
heap
|
page readonly
|
||
288800288000
|
trusted library allocation
|
page read and write
|
||
2B1400658000
|
trusted library allocation
|
page read and write
|
||
614400E9C000
|
trusted library allocation
|
page read and write
|
||
1A52E000
|
stack
|
page read and write
|
||
2B1400754000
|
trusted library allocation
|
page read and write
|
||
614400C0D000
|
trusted library allocation
|
page read and write
|
||
1F50A330000
|
heap
|
page read and write
|
||
614401ADC000
|
trusted library allocation
|
page read and write
|
||
25B03689000
|
heap
|
page read and write
|
||
614400CF1000
|
trusted library allocation
|
page read and write
|
||
6144017D4000
|
trusted library allocation
|
page read and write
|
||
614400D24000
|
trusted library allocation
|
page read and write
|
||
614401598000
|
trusted library allocation
|
page read and write
|
||
614401390000
|
trusted library allocation
|
page read and write
|
||
614400134000
|
trusted library allocation
|
page read and write
|
||
25B030AB000
|
heap
|
page read and write
|
||
67653FE000
|
unkown
|
page readonly
|
||
6746BFD000
|
stack
|
page read and write
|
||
614401768000
|
trusted library allocation
|
page read and write
|
||
6144012EF000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
61440165C000
|
trusted library allocation
|
page read and write
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
747000
|
heap
|
page read and write
|
||
5D380017C000
|
trusted library allocation
|
page read and write
|
||
5D380018C000
|
trusted library allocation
|
page read and write
|
||
6144001C4000
|
trusted library allocation
|
page read and write
|
||
2B1400348000
|
trusted library allocation
|
page read and write
|
||
6144001AC000
|
trusted library allocation
|
page read and write
|
||
614400904000
|
trusted library allocation
|
page read and write
|
||
AC5E7FE000
|
unkown
|
page readonly
|
||
676E3FE000
|
unkown
|
page readonly
|
||
614400DC8000
|
trusted library allocation
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
674CBFC000
|
stack
|
page read and write
|
||
61440180C000
|
trusted library allocation
|
page read and write
|
||
614400FBC000
|
trusted library allocation
|
page read and write
|
||
2B14002F0000
|
trusted library allocation
|
page read and write
|
||
1F50A2F8000
|
heap
|
page read and write
|
||
1F50A313000
|
heap
|
page read and write
|
||
2B1400364000
|
trusted library allocation
|
page read and write
|
||
5D38002AC000
|
trusted library allocation
|
page read and write
|
||
1F50A1C0000
|
trusted library allocation
|
page read and write
|
||
25B7CE80000
|
heap
|
page read and write
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
614400308000
|
trusted library allocation
|
page read and write
|
||
7DC0002EC000
|
direct allocation
|
page read and write
|
||
61440020C000
|
trusted library allocation
|
page read and write
|
There are 1571 hidden memdumps, click here to show them.