Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a37c8abe5fa88b74d7c9bce1b01c77a59b85d3b_ccf28a54_c7bf8410-398f-4fda-93fd-f50c98236c3c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\CBFIJEGI
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\ECFCBFBGDBKJKECAAKKF
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CDE.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Nov 1 11:13:31 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E56.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E86.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\chrome.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3f5b0e24-1654-4de7-ac79-aad26cb9173e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\47a641ab-28bf-4244-8491-6f8dcb9e6e0c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\743c89ff-7079-4e24-876b-cdbf896767d9.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6724B7D0-580.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37b9a.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37c55.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37ce2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37d01.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cff01bda-3f45-4bc4-bd3f-1f5007e72b11.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ee18caac-c678-473e-9323-b4e69bb9a296.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (5162), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (2287)
|
downloaded
|
||
Chrome Cache Entry: 102
|
Unicode text, UTF-8 text, with very long lines (5443)
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (1302)
|
downloaded
|
||
Chrome Cache Entry: 106
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2344 --field-trial-handle=2300,i,12253254969016483560,8201346727917572469,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin
--flag-switches-end --disable-nacl --do-not-de-elevate
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2636 --field-trial-handle=2468,i,18208122850511008875,358630292499300278,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2004,i,11058758626753817860,2067604702649362784,262144
/prefetch:3
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2064
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/6c4adf523b719729.php
|
185.215.113.206
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v2/tokeninfo
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://185.215.113.206/746f34465cf17784/sqlite3.dllR
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/C
|
unknown
|
||
https://publickeyservice.gcp.privacysandboxservices.com
|
unknown
|
||
http://185.215.113.206/746f34465cf17784/sqlite3.dllX
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/F
|
unknown
|
||
https://publickeyservice.pa.aws.privacysandboxservices.com
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/I
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/N
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/M
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/L
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/S
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/P
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/W
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/V
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://ogs.google.com/widget/callout?eom=1
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/X
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/_
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/g
|
unknown
|
||
http://185.215.113.206/#H
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://permanently-removed.invalid/oauth2/v4/token
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phprI2e
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://plus.google.com
|
unknown
|
||
https://permanently-removed.invalid/chrome/blank.html
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://permanently-removed.invalid/v1/issuetoken
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
|
142.250.74.206
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://permanently-removed.invalid/reauth/v1beta/users/
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://185.215.113.206/746f34465cf17784/sqlite3.dllx
|
unknown
|
||
https://publickeyservice.pa.gcp.privacysandboxservices.com
|
unknown
|
||
https://permanently-removed.invalid/RotateBoundCookies
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
|
unknown
|
||
https://msn.com/
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
https://mail.google.com/mail/?tab=rm&ogbl
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://185.215.113.206/6c4adf523b719729.phpUser
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://labs.google.com/search?source=ntp
|
unknown
|
||
https://domains.google.com/suggest/flow
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
https://ogs.google.com/widget/app/so?eom=1
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plus.l.google.com
|
142.250.74.206
|
||
play.google.com
|
172.217.16.206
|
||
www.google.com
|
142.250.185.100
|
||
206.23.85.13.in-addr.arpa
|
unknown
|
||
apis.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
185.215.113.206
|
unknown
|
Portugal
|
||
142.250.74.206
|
plus.l.google.com
|
United States
|
||
172.217.16.206
|
play.google.com
|
United States
|
||
142.250.185.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
|
Top
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
There are 22 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B61000
|
unkown
|
page execute and read and write
|
||
5590000
|
direct allocation
|
page read and write
|
||
17AE000
|
heap
|
page read and write
|
||
1DBE6000
|
heap
|
page read and write
|
||
1DC03000
|
heap
|
page read and write
|
||
74A000FD8000
|
trusted library allocation
|
page read and write
|
||
33AC00728000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
20590D8C000
|
heap
|
page read and write
|
||
1DA857C5000
|
heap
|
page read and write
|
||
25A802580000
|
trusted library allocation
|
page read and write
|
||
7CDDFE000
|
stack
|
page read and write
|
||
74A001B54000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A0014A4000
|
trusted library allocation
|
page read and write
|
||
74A000234000
|
trusted library allocation
|
page read and write
|
||
74A001CCC000
|
trusted library allocation
|
page read and write
|
||
A8002D8000
|
direct allocation
|
page read and write
|
||
74A0012C0000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
25A80261C000
|
trusted library allocation
|
page read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
25A802488000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
74A0001F8000
|
trusted library allocation
|
page read and write
|
||
25A802304000
|
trusted library allocation
|
page read and write
|
||
25A8025BC000
|
trusted library allocation
|
page read and write
|
||
A8002C0000
|
direct allocation
|
page read and write
|
||
A80031C000
|
direct allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
6DBC002FC000
|
trusted library allocation
|
page read and write
|
||
A800290000
|
direct allocation
|
page read and write
|
||
A800270000
|
direct allocation
|
page read and write
|
||
74A001E78000
|
trusted library allocation
|
page read and write
|
||
33AC00828000
|
trusted library allocation
|
page read and write
|
||
1DA857B6000
|
heap
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
74A001F84000
|
trusted library allocation
|
page read and write
|
||
74A00040C000
|
trusted library allocation
|
page read and write
|
||
A800250000
|
direct allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
6C8A1000
|
unkown
|
page readonly
|
||
74A001A5C000
|
trusted library allocation
|
page read and write
|
||
1DA85750000
|
heap
|
page read and write
|
||
1DA8C660000
|
trusted library allocation
|
page read and write
|
||
33AC006C8000
|
trusted library allocation
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
33AC006C8000
|
trusted library allocation
|
page read and write
|
||
74A001E70000
|
trusted library allocation
|
page read and write
|
||
74A0013D0000
|
trusted library allocation
|
page read and write
|
||
A800220000
|
direct allocation
|
page read and write
|
||
2C08003A8000
|
trusted library allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001B64000
|
trusted library allocation
|
page read and write
|
||
7D8DFE000
|
stack
|
page read and write
|
||
74A000ECC000
|
trusted library allocation
|
page read and write
|
||
25A800E01000
|
trusted library allocation
|
page read and write
|
||
25A8023D0000
|
trusted library allocation
|
page read and write
|
||
74A001A7C000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A00034C000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
74A000D74000
|
trusted library allocation
|
page read and write
|
||
74A00180C000
|
trusted library allocation
|
page read and write
|
||
A8002D0000
|
direct allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
74A001A90000
|
trusted library allocation
|
page read and write
|
||
25A802368000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
74A001B7C000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
1DA83913000
|
heap
|
page read and write
|
||
74A001B40000
|
trusted library allocation
|
page read and write
|
||
1DA83867000
|
heap
|
page read and write
|
||
74A000ECC000
|
trusted library allocation
|
page read and write
|
||
74A001D70000
|
trusted library allocation
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
1288000
|
unkown
|
page execute and write copy
|
||
74A001DC0000
|
trusted library allocation
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
1DC03000
|
heap
|
page read and write
|
||
33AC008F4000
|
trusted library allocation
|
page read and write
|
||
7D65FE000
|
unkown
|
page readonly
|
||
74A001F34000
|
trusted library allocation
|
page read and write
|
||
74A0019E0000
|
trusted library allocation
|
page read and write
|
||
20590886000
|
heap
|
page read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
1DBFF000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
25A8022E8000
|
trusted library allocation
|
page read and write
|
||
25A802454000
|
trusted library allocation
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
6C8E7000
|
unkown
|
page read and write
|
||
33AC00408000
|
trusted library allocation
|
page read and write
|
||
6FA400244000
|
direct allocation
|
page read and write
|
||
74A001A50000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
2C08002A4000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A001940000
|
trusted library allocation
|
page read and write
|
||
1B6E000
|
stack
|
page read and write
|
||
74A001AF0000
|
trusted library allocation
|
page read and write
|
||
74A001A70000
|
trusted library allocation
|
page read and write
|
||
25A8024A8000
|
trusted library allocation
|
page read and write
|
||
74A001AA4000
|
trusted library allocation
|
page read and write
|
||
33AC007AC000
|
trusted library allocation
|
page read and write
|
||
7CC5FE000
|
unkown
|
page readonly
|
||
25A80260F000
|
trusted library allocation
|
page read and write
|
||
1D55E000
|
stack
|
page read and write
|
||
33AC00850000
|
trusted library allocation
|
page read and write
|
||
33AC00868000
|
trusted library allocation
|
page read and write
|
||
25A802450000
|
trusted library allocation
|
page read and write
|
||
25A80244C000
|
trusted library allocation
|
page read and write
|
||
2C0800284000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
7D2DFE000
|
stack
|
page read and write
|
||
74A00150C000
|
trusted library allocation
|
page read and write
|
||
74A001920000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
74A001E68000
|
trusted library allocation
|
page read and write
|
||
74A000F58000
|
trusted library allocation
|
page read and write
|
||
74A000CE8000
|
trusted library allocation
|
page read and write
|
||
74A0010ED000
|
trusted library allocation
|
page read and write
|
||
6DBC00238000
|
trusted library allocation
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
25A802428000
|
trusted library allocation
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
74A001DCC000
|
trusted library allocation
|
page read and write
|
||
1DA8382F000
|
heap
|
page read and write
|
||
A8002E0000
|
direct allocation
|
page read and write
|
||
5710000
|
direct allocation
|
page execute and read and write
|
||
74A001AB4000
|
trusted library allocation
|
page read and write
|
||
7C35FE000
|
unkown
|
page readonly
|
||
74A001218000
|
trusted library allocation
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
74A001930000
|
trusted library allocation
|
page read and write
|
||
74A000CDC000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
stack
|
page read and write
|
||
2C0800401000
|
trusted library allocation
|
page read and write
|
||
7BC5FE000
|
unkown
|
page readonly
|
||
5101000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001550000
|
trusted library allocation
|
page read and write
|
||
74A0018EC000
|
trusted library allocation
|
page read and write
|
||
25A8024C4000
|
trusted library allocation
|
page read and write
|
||
33AC007C0000
|
trusted library allocation
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
74A0014F5000
|
trusted library allocation
|
page read and write
|
||
74A00176C000
|
trusted library allocation
|
page read and write
|
||
1DA83AE0000
|
heap
|
page read and write
|
||
1DBF3000
|
heap
|
page read and write
|
||
1DA6D000
|
stack
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
74A0015AC000
|
trusted library allocation
|
page read and write
|
||
74A0010C8000
|
trusted library allocation
|
page read and write
|
||
74A001B14000
|
trusted library allocation
|
page read and write
|
||
7C3DFE000
|
stack
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
20590886000
|
heap
|
page read and write
|
||
25A802490000
|
trusted library allocation
|
page read and write
|
||
25A80246C000
|
trusted library allocation
|
page read and write
|
||
33AC008A8000
|
trusted library allocation
|
page read and write
|
||
25A80256C000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
74A001E18000
|
trusted library allocation
|
page read and write
|
||
2C080027C000
|
trusted library allocation
|
page read and write
|
||
74A0001B4000
|
trusted library allocation
|
page read and write
|
||
74A0001E4000
|
trusted library allocation
|
page read and write
|
||
20590892000
|
heap
|
page read and write
|
||
74A0014E0000
|
trusted library allocation
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
20590DE6000
|
heap
|
page read and write
|
||
33AC006AC000
|
trusted library allocation
|
page read and write
|
||
74A001BC0000
|
trusted library allocation
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A0012DC000
|
trusted library allocation
|
page read and write
|
||
25A8023B4000
|
trusted library allocation
|
page read and write
|
||
7CCDFD000
|
stack
|
page read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
74A00105C000
|
trusted library allocation
|
page read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A0019CC000
|
trusted library allocation
|
page read and write
|
||
25A802401000
|
trusted library allocation
|
page read and write
|
||
1D79F000
|
stack
|
page read and write
|
||
7E0DFE000
|
stack
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
74A001E0C000
|
trusted library allocation
|
page read and write
|
||
74A000F94000
|
trusted library allocation
|
page read and write
|
||
1DA838E9000
|
heap
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1DBF6000
|
heap
|
page read and write
|
||
74A0018BC000
|
trusted library allocation
|
page read and write
|
||
6DBC00230000
|
trusted library allocation
|
page read and write
|
||
74A001654000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
69B4002C0000
|
trusted library allocation
|
page read and write
|
||
74A0019C4000
|
trusted library allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
74A0001B4000
|
trusted library allocation
|
page read and write
|
||
6DBC002B8000
|
trusted library allocation
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
2C0800238000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A00196C000
|
trusted library allocation
|
page read and write
|
||
74A001E74000
|
trusted library allocation
|
page read and write
|
||
25A8024F0000
|
trusted library allocation
|
page read and write
|
||
7DDDFD000
|
stack
|
page read and write
|
||
25A802438000
|
trusted library allocation
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
1DA85736000
|
heap
|
page read and write
|
||
33AC0079C000
|
trusted library allocation
|
page read and write
|
||
183D000
|
heap
|
page read and write
|
||
74A00157C000
|
trusted library allocation
|
page read and write
|
||
74A001F08000
|
trusted library allocation
|
page read and write
|
||
1D69E000
|
stack
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
74A001BA8000
|
trusted library allocation
|
page read and write
|
||
33AC006AC000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
2C0800310000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
unkown
|
page execute and read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
74A001B84000
|
trusted library allocation
|
page read and write
|
||
74A001300000
|
trusted library allocation
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
69B4002C0000
|
trusted library allocation
|
page read and write
|
||
6C840000
|
unkown
|
page readonly
|
||
1DA837F0000
|
heap
|
page readonly
|
||
A800230000
|
direct allocation
|
page read and write
|
||
74A0013D0000
|
trusted library allocation
|
page read and write
|
||
74A001914000
|
trusted library allocation
|
page read and write
|
||
25A800601000
|
trusted library allocation
|
page read and write
|
||
7C0DFE000
|
stack
|
page read and write
|
||
25A8022F4000
|
trusted library allocation
|
page read and write
|
||
74A000415000
|
trusted library allocation
|
page read and write
|
||
6DBC00250000
|
trusted library allocation
|
page read and write
|
||
74A001A18000
|
trusted library allocation
|
page read and write
|
||
74A000C9C000
|
trusted library allocation
|
page read and write
|
||
1DA83844000
|
heap
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
1DA85715000
|
heap
|
page read and write
|
||
25A802394000
|
trusted library allocation
|
page read and write
|
||
C46000
|
unkown
|
page execute and read and write
|
||
25A802630000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A001E1C000
|
trusted library allocation
|
page read and write
|
||
74A001771000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
6DBC002F0000
|
trusted library allocation
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
25A802528000
|
trusted library allocation
|
page read and write
|
||
1DA863E0000
|
unkown
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
CDB000
|
unkown
|
page execute and read and write
|
||
10B1000
|
unkown
|
page execute and read and write
|
||
74A001964000
|
trusted library allocation
|
page read and write
|
||
25A80264C000
|
trusted library allocation
|
page read and write
|
||
74A002004000
|
trusted library allocation
|
page read and write
|
||
25A802480000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
1DA8574E000
|
heap
|
page read and write
|
||
74A000298000
|
trusted library allocation
|
page read and write
|
||
74A001B6C000
|
trusted library allocation
|
page read and write
|
||
25A802464000
|
trusted library allocation
|
page read and write
|
||
25A802424000
|
trusted library allocation
|
page read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
6DBC00201000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
direct allocation
|
page read and write
|
||
1DA8572C000
|
heap
|
page read and write
|
||
7D75FE000
|
unkown
|
page readonly
|
||
74A001D30000
|
trusted library allocation
|
page read and write
|
||
33AC002FC000
|
trusted library allocation
|
page read and write
|
||
5700000
|
direct allocation
|
page execute and read and write
|
||
74A00177C000
|
trusted library allocation
|
page read and write
|
||
74A001FF1000
|
trusted library allocation
|
page read and write
|
||
25A802460000
|
trusted library allocation
|
page read and write
|
||
74A00100C000
|
trusted library allocation
|
page read and write
|
||
74A001974000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A0018FC000
|
trusted library allocation
|
page read and write
|
||
6DBC002E4000
|
trusted library allocation
|
page read and write
|
||
74A0011DC000
|
trusted library allocation
|
page read and write
|
||
25A802440000
|
trusted library allocation
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
25A800001000
|
trusted library allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
74A0001E0000
|
trusted library allocation
|
page read and write
|
||
23DCC000
|
heap
|
page read and write
|
||
25A8024B0000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA85738000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
2C08003A0000
|
trusted library allocation
|
page read and write
|
||
2C0800220000
|
trusted library allocation
|
page read and write
|
||
74A001AD8000
|
trusted library allocation
|
page read and write
|
||
74A001484000
|
trusted library allocation
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
74A001E4C000
|
trusted library allocation
|
page read and write
|
||
74A001D64000
|
trusted library allocation
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
25A80233C000
|
trusted library allocation
|
page read and write
|
||
33AC0039C000
|
trusted library allocation
|
page read and write
|
||
1DA8395A000
|
heap
|
page read and write
|
||
25A8023DC000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A001B28000
|
trusted library allocation
|
page read and write
|
||
74A001780000
|
trusted library allocation
|
page read and write
|
||
33AC0078C000
|
trusted library allocation
|
page read and write
|
||
7D6DFE000
|
stack
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
25A80232C000
|
trusted library allocation
|
page read and write
|
||
74A0015B0000
|
trusted library allocation
|
page read and write
|
||
25A8022A8000
|
trusted library allocation
|
page read and write
|
||
74A000214000
|
trusted library allocation
|
page read and write
|
||
1DA83960000
|
heap
|
page read and write
|
||
74A001B30000
|
trusted library allocation
|
page read and write
|
||
74A001E6C000
|
trusted library allocation
|
page read and write
|
||
74A0002A8000
|
trusted library allocation
|
page read and write
|
||
33AC0039C000
|
trusted library allocation
|
page read and write
|
||
2C0800288000
|
trusted library allocation
|
page read and write
|
||
1DA838A0000
|
heap
|
page read and write
|
||
74A000E18000
|
trusted library allocation
|
page read and write
|
||
20590D93000
|
heap
|
page read and write
|
||
1DA83931000
|
heap
|
page read and write
|
||
74A000220000
|
trusted library allocation
|
page read and write
|
||
25A8024C8000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
74A000224000
|
trusted library allocation
|
page read and write
|
||
74A001D28000
|
trusted library allocation
|
page read and write
|
||
7BADFE000
|
unkown
|
page read and write
|
||
7E2DFE000
|
stack
|
page read and write
|
||
74A001790000
|
trusted library allocation
|
page read and write
|
||
6DBC00270000
|
trusted library allocation
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
74A001568000
|
trusted library allocation
|
page read and write
|
||
20590D74000
|
heap
|
page read and write
|
||
74A000124000
|
trusted library allocation
|
page read and write
|
||
74A001A6C000
|
trusted library allocation
|
page read and write
|
||
74A000318000
|
trusted library allocation
|
page read and write
|
||
74A001AD0000
|
trusted library allocation
|
page read and write
|
||
74A000F8C000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
33AC0087C000
|
trusted library allocation
|
page read and write
|
||
33AC00424000
|
trusted library allocation
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
25A8023F4000
|
trusted library allocation
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
20590E16000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
1DBF6000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
E4A000
|
unkown
|
page execute and read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
25A8024FC000
|
trusted library allocation
|
page read and write
|
||
74A001AC4000
|
trusted library allocation
|
page read and write
|
||
25A8025AC000
|
trusted library allocation
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
25A8024E4000
|
trusted library allocation
|
page read and write
|
||
74A0016B4000
|
trusted library allocation
|
page read and write
|
||
25A8023A8000
|
trusted library allocation
|
page read and write
|
||
1DBE6000
|
heap
|
page read and write
|
||
6DBC00288000
|
trusted library allocation
|
page read and write
|
||
2C0800430000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A000F89000
|
trusted library allocation
|
page read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
74A000D00000
|
trusted library allocation
|
page read and write
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
5590000
|
direct allocation
|
page read and write
|
||
74A001C1C000
|
trusted library allocation
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
74A0014A4000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
25A802444000
|
trusted library allocation
|
page read and write
|
||
1D7DE000
|
stack
|
page read and write
|
||
74A001214000
|
trusted library allocation
|
page read and write
|
||
74A0001F4000
|
trusted library allocation
|
page read and write
|
||
74A001224000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001675000
|
trusted library allocation
|
page read and write
|
||
1DA857B8000
|
heap
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page read and write
|
||
33AC00898000
|
trusted library allocation
|
page read and write
|
||
7DB5FE000
|
unkown
|
page readonly
|
||
23DEC000
|
heap
|
page read and write
|
||
1D65F000
|
stack
|
page read and write
|
||
74A001D9C000
|
trusted library allocation
|
page read and write
|
||
1DA83929000
|
heap
|
page read and write
|
||
74A00143B000
|
trusted library allocation
|
page read and write
|
||
6DBC00294000
|
trusted library allocation
|
page read and write
|
||
25A8022D5000
|
trusted library allocation
|
page read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
74A0019F8000
|
trusted library allocation
|
page read and write
|
||
69B4002A4000
|
trusted library allocation
|
page read and write
|
||
33AC00890000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
74A0012F4000
|
trusted library allocation
|
page read and write
|
||
7DFDFE000
|
stack
|
page read and write
|
||
17F3000
|
heap
|
page read and write
|
||
25A8024FC000
|
trusted library allocation
|
page read and write
|
||
74A001300000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
25A8023F8000
|
trusted library allocation
|
page read and write
|
||
25A802514000
|
trusted library allocation
|
page read and write
|
||
74A001CFC000
|
trusted library allocation
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
33AC00878000
|
trusted library allocation
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
2C0800250000
|
trusted library allocation
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
74A001430000
|
trusted library allocation
|
page read and write
|
||
6DBC002D8000
|
trusted library allocation
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
7DD5FE000
|
unkown
|
page readonly
|
||
74A001D88000
|
trusted library allocation
|
page read and write
|
||
2C08002F1000
|
trusted library allocation
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
20590DCE000
|
heap
|
page read and write
|
||
74A001768000
|
trusted library allocation
|
page read and write
|
||
1DA857C7000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
74A001EFC000
|
trusted library allocation
|
page read and write
|
||
74A001434000
|
trusted library allocation
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
25A802280000
|
trusted library allocation
|
page read and write
|
||
74A001D3C000
|
trusted library allocation
|
page read and write
|
||
74A0019B0000
|
trusted library allocation
|
page read and write
|
||
74A001A2C000
|
trusted library allocation
|
page read and write
|
||
74A001CCC000
|
trusted library allocation
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
6DBC00264000
|
trusted library allocation
|
page read and write
|
||
55CB000
|
stack
|
page read and write
|
||
74A001310000
|
trusted library allocation
|
page read and write
|
||
74A001DD0000
|
trusted library allocation
|
page read and write
|
||
25A802414000
|
trusted library allocation
|
page read and write
|
||
1DA838BB000
|
heap
|
page read and write
|
||
7DBDFC000
|
stack
|
page read and write
|
||
74A001FC4000
|
trusted library allocation
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
74A001D44000
|
trusted library allocation
|
page read and write
|
||
74A001EA4000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
25A8024BC000
|
trusted library allocation
|
page read and write
|
||
7C6DFD000
|
stack
|
page read and write
|
||
74A001370000
|
trusted library allocation
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
1DA2E000
|
stack
|
page read and write
|
||
25A8024FC000
|
trusted library allocation
|
page read and write
|
||
1DA838C5000
|
heap
|
page read and write
|
||
74A001D00000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001998000
|
trusted library allocation
|
page read and write
|
||
7CEDFE000
|
stack
|
page read and write
|
||
74A002A18000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
6DBC00220000
|
trusted library allocation
|
page read and write
|
||
74A001064000
|
trusted library allocation
|
page read and write
|
||
33AC00248000
|
trusted library allocation
|
page read and write
|
||
1DA85700000
|
heap
|
page read and write
|
||
17AA000
|
heap
|
page read and write
|
||
74A001A94000
|
trusted library allocation
|
page read and write
|
||
2C08002B0000
|
trusted library allocation
|
page read and write
|
||
74A0014C1000
|
trusted library allocation
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
74A001DF8000
|
trusted library allocation
|
page read and write
|
||
74A001E50000
|
trusted library allocation
|
page read and write
|
||
74A0012CC000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
6DBC002F8000
|
trusted library allocation
|
page read and write
|
||
1DBFE000
|
heap
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
69B4002E4000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
25A802508000
|
trusted library allocation
|
page read and write
|
||
2C0800308000
|
trusted library allocation
|
page read and write
|
||
1DA83863000
|
heap
|
page read and write
|
||
74A000F94000
|
trusted library allocation
|
page read and write
|
||
7C45FE000
|
unkown
|
page readonly
|
||
2C080020C000
|
trusted library allocation
|
page read and write
|
||
10EB000
|
unkown
|
page execute and write copy
|
||
74A0012F4000
|
trusted library allocation
|
page read and write
|
||
74A000E2C000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A0012B4000
|
trusted library allocation
|
page read and write
|
||
74A001560000
|
trusted library allocation
|
page read and write
|
||
69B4002A4000
|
trusted library allocation
|
page read and write
|
||
5710000
|
direct allocation
|
page execute and read and write
|
||
1DA8571D000
|
heap
|
page read and write
|
||
25A80220C000
|
trusted library allocation
|
page read and write
|
||
74A00032C000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001DC4000
|
trusted library allocation
|
page read and write
|
||
2C08002F4000
|
trusted library allocation
|
page read and write
|
||
74A001ADC000
|
trusted library allocation
|
page read and write
|
||
74A00140C000
|
trusted library allocation
|
page read and write
|
||
2C0800350000
|
trusted library allocation
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
2C08003BC000
|
trusted library allocation
|
page read and write
|
||
74A0018F8000
|
trusted library allocation
|
page read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
74A001E3C000
|
trusted library allocation
|
page read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
33AC00864000
|
trusted library allocation
|
page read and write
|
||
74A001DF0000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A001D94000
|
trusted library allocation
|
page read and write
|
||
2C080040C000
|
trusted library allocation
|
page read and write
|
||
25A80260C000
|
trusted library allocation
|
page read and write
|
||
74A001B08000
|
trusted library allocation
|
page read and write
|
||
334C000
|
stack
|
page read and write
|
||
A800201000
|
direct allocation
|
page read and write
|
||
69B4002C0000
|
trusted library allocation
|
page read and write
|
||
74A001BBC000
|
trusted library allocation
|
page read and write
|
||
74A002004000
|
trusted library allocation
|
page read and write
|
||
7DE5FE000
|
unkown
|
page readonly
|
||
25A80245C000
|
trusted library allocation
|
page read and write
|
||
25A80225C000
|
trusted library allocation
|
page read and write
|
||
7BE5FE000
|
unkown
|
page readonly
|
||
338E000
|
stack
|
page read and write
|
||
74A0018E4000
|
trusted library allocation
|
page read and write
|
||
25A8022C4000
|
trusted library allocation
|
page read and write
|
||
20590886000
|
heap
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
25A8024C8000
|
trusted library allocation
|
page read and write
|
||
74A000F30000
|
trusted library allocation
|
page read and write
|
||
74A001CF8000
|
trusted library allocation
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
25A80254C000
|
trusted library allocation
|
page read and write
|
||
74A00199C000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
1287000
|
unkown
|
page execute and read and write
|
||
A800294000
|
direct allocation
|
page read and write
|
||
74A000708000
|
trusted library allocation
|
page read and write
|
||
74A0029DC000
|
trusted library allocation
|
page read and write
|
||
74A00194C000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
1DA83931000
|
heap
|
page read and write
|
||
6DBC00294000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1DA85732000
|
heap
|
page read and write
|
||
25A8024B4000
|
trusted library allocation
|
page read and write
|
||
2C0800300000
|
trusted library allocation
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
7DCDFE000
|
stack
|
page read and write
|
||
1DA838FD000
|
heap
|
page read and write
|
||
25A802314000
|
trusted library allocation
|
page read and write
|
||
74A0019D0000
|
trusted library allocation
|
page read and write
|
||
20590891000
|
heap
|
page read and write
|
||
74A0014C1000
|
trusted library allocation
|
page read and write
|
||
74A0010F8000
|
trusted library allocation
|
page read and write
|
||
74A001430000
|
trusted library allocation
|
page read and write
|
||
25A80260C000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
33AC008F0000
|
trusted library allocation
|
page read and write
|
||
2C08003C4000
|
trusted library allocation
|
page read and write
|
||
25A8023E4000
|
trusted library allocation
|
page read and write
|
||
74A001BC8000
|
trusted library allocation
|
page read and write
|
||
7DADFE000
|
stack
|
page read and write
|
||
74A001FF1000
|
trusted library allocation
|
page read and write
|
||
74A001D54000
|
trusted library allocation
|
page read and write
|
||
7C7DFE000
|
stack
|
page read and write
|
||
74A0016B4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
74A000228000
|
trusted library allocation
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
74A0018CC000
|
trusted library allocation
|
page read and write
|
||
74A000210000
|
trusted library allocation
|
page read and write
|
||
1DA838A5000
|
heap
|
page read and write
|
||
2C08003AC000
|
trusted library allocation
|
page read and write
|
||
74A000E2C000
|
trusted library allocation
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
1384000
|
heap
|
page read and write
|
||
25A802418000
|
trusted library allocation
|
page read and write
|
||
33AC00830000
|
trusted library allocation
|
page read and write
|
||
25A802298000
|
trusted library allocation
|
page read and write
|
||
33AC0091C000
|
trusted library allocation
|
page read and write
|
||
A8002D8000
|
direct allocation
|
page read and write
|
||
74A001434000
|
trusted library allocation
|
page read and write
|
||
1DA85770000
|
heap
|
page read and write
|
||
25A802430000
|
trusted library allocation
|
page read and write
|
||
33AC00418000
|
trusted library allocation
|
page read and write
|
||
33AC007E0000
|
trusted library allocation
|
page read and write
|
||
6DBC00294000
|
trusted library allocation
|
page read and write
|
||
74A000D00000
|
trusted library allocation
|
page read and write
|
||
74A001AB8000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
25A802358000
|
trusted library allocation
|
page read and write
|
||
1DBE0000
|
heap
|
page read and write
|
||
2059087A000
|
heap
|
page read and write
|
||
74A000CE8000
|
trusted library allocation
|
page read and write
|
||
33AC008E4000
|
trusted library allocation
|
page read and write
|
||
74A001218000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
unkown
|
page execute and read and write
|
||
25A80248C000
|
trusted library allocation
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
25A802434000
|
trusted library allocation
|
page read and write
|
||
A800308000
|
direct allocation
|
page read and write
|
||
25A802458000
|
trusted library allocation
|
page read and write
|
||
74A001984000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
25A802270000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001A40000
|
trusted library allocation
|
page read and write
|
||
25A802410000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
74A000F64000
|
trusted library allocation
|
page read and write
|
||
74A001538000
|
trusted library allocation
|
page read and write
|
||
20594EB1000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
74A0001D8000
|
trusted library allocation
|
page read and write
|
||
25A802601000
|
trusted library allocation
|
page read and write
|
||
74A001924000
|
trusted library allocation
|
page read and write
|
||
74A0019E4000
|
trusted library allocation
|
page read and write
|
||
74A001B60000
|
trusted library allocation
|
page read and write
|
||
74A001E90000
|
trusted library allocation
|
page read and write
|
||
1DA8578C000
|
heap
|
page read and write
|
||
20590DEF000
|
heap
|
page read and write
|
||
1DA838AD000
|
heap
|
page read and write
|
||
74A001A68000
|
trusted library allocation
|
page read and write
|
||
7DA5FE000
|
unkown
|
page readonly
|
||
2C0800230000
|
trusted library allocation
|
page read and write
|
||
33AC00778000
|
trusted library allocation
|
page read and write
|
||
A80024C000
|
direct allocation
|
page read and write
|
||
A800210000
|
direct allocation
|
page read and write
|
||
74A001768000
|
trusted library allocation
|
page read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
1DA8579F000
|
heap
|
page read and write
|
||
A800284000
|
direct allocation
|
page read and write
|
||
74A000C38000
|
trusted library allocation
|
page read and write
|
||
74A0018C0000
|
trusted library allocation
|
page read and write
|
||
33AC007D4000
|
trusted library allocation
|
page read and write
|
||
1DA8574E000
|
heap
|
page read and write
|
||
74A00040C000
|
trusted library allocation
|
page read and write
|
||
1DA8387C000
|
heap
|
page read and write
|
||
7BB5FE000
|
unkown
|
page readonly
|
||
5101000
|
heap
|
page read and write
|
||
74A0012C0000
|
trusted library allocation
|
page read and write
|
||
74A001028000
|
trusted library allocation
|
page read and write
|
||
74A001988000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
2C08002D8000
|
trusted library allocation
|
page read and write
|
||
74A0001B4000
|
trusted library allocation
|
page read and write
|
||
74A00150C000
|
trusted library allocation
|
page read and write
|
||
6DBC002B8000
|
trusted library allocation
|
page read and write
|
||
74A001994000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001F48000
|
trusted library allocation
|
page read and write
|
||
20590D85000
|
heap
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
74A001D6C000
|
trusted library allocation
|
page read and write
|
||
25A8025A8000
|
trusted library allocation
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
74A001D0C000
|
trusted library allocation
|
page read and write
|
||
74A001EA0000
|
trusted library allocation
|
page read and write
|
||
33AC0081C000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
25A8024D8000
|
trusted library allocation
|
page read and write
|
||
74A00148E000
|
trusted library allocation
|
page read and write
|
||
1DA8385B000
|
heap
|
page read and write
|
||
74A001300000
|
trusted library allocation
|
page read and write
|
||
74A001E34000
|
trusted library allocation
|
page read and write
|
||
25A802478000
|
trusted library allocation
|
page read and write
|
||
33AC006E0000
|
trusted library allocation
|
page read and write
|
||
6DBC00294000
|
trusted library allocation
|
page read and write
|
||
1DA85734000
|
heap
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
74A002AD4000
|
trusted library allocation
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
74A001440000
|
trusted library allocation
|
page read and write
|
||
74A0010BC000
|
trusted library allocation
|
page read and write
|
||
25A802320000
|
trusted library allocation
|
page read and write
|
||
6DBC00278000
|
trusted library allocation
|
page read and write
|
||
7C8DFC000
|
stack
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
direct allocation
|
page execute and read and write
|
||
74A00140C000
|
trusted library allocation
|
page read and write
|
||
7B9DF4000
|
stack
|
page read and write
|
||
1DA838B5000
|
heap
|
page read and write
|
||
74A001310000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
23EA0000
|
trusted library allocation
|
page read and write
|
||
1DA83800000
|
heap
|
page read and write
|
||
74A0013D0000
|
trusted library allocation
|
page read and write
|
||
20590E0E000
|
heap
|
page read and write
|
||
A800311000
|
direct allocation
|
page read and write
|
||
6DBC00274000
|
trusted library allocation
|
page read and write
|
||
2C0800364000
|
trusted library allocation
|
page read and write
|
||
74A001B88000
|
trusted library allocation
|
page read and write
|
||
74A001434000
|
trusted library allocation
|
page read and write
|
||
74A000ECC000
|
trusted library allocation
|
page read and write
|
||
74A0015AC000
|
trusted library allocation
|
page read and write
|
||
74A001E8C000
|
trusted library allocation
|
page read and write
|
||
33AC007BC000
|
trusted library allocation
|
page read and write
|
||
74A001DF4000
|
trusted library allocation
|
page read and write
|
||
74A0012C7000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
1DCF0000
|
trusted library allocation
|
page read and write
|
||
6DBC00260000
|
trusted library allocation
|
page read and write
|
||
25A802448000
|
trusted library allocation
|
page read and write
|
||
33AC008C4000
|
trusted library allocation
|
page read and write
|
||
74A0012F8000
|
trusted library allocation
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
20590D7E000
|
heap
|
page read and write
|
||
74A001D68000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1821000
|
heap
|
page read and write
|
||
74A0019C8000
|
trusted library allocation
|
page read and write
|
||
1DA8570B000
|
heap
|
page read and write
|
||
5105000
|
heap
|
page read and write
|
||
25A8024A4000
|
trusted library allocation
|
page read and write
|
||
1DA8575A000
|
heap
|
page read and write
|
||
23C6B000
|
heap
|
page read and write
|
||
25A802594000
|
trusted library allocation
|
page read and write
|
||
7CE5FE000
|
unkown
|
page readonly
|
||
74A001D80000
|
trusted library allocation
|
page read and write
|
||
2C08002C4000
|
trusted library allocation
|
page read and write
|
||
74A000D00000
|
trusted library allocation
|
page read and write
|
||
25A802698000
|
trusted library allocation
|
page read and write
|
||
1DA85800000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
A8002EC000
|
direct allocation
|
page read and write
|
||
74A00100C000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
74A001BAC000
|
trusted library allocation
|
page read and write
|
||
69B400248000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
20590DE7000
|
heap
|
page read and write
|
||
25A8024F0000
|
trusted library allocation
|
page read and write
|
||
74A0002F3000
|
trusted library allocation
|
page read and write
|
||
74A000EF4000
|
trusted library allocation
|
page read and write
|
||
74A000CF8000
|
trusted library allocation
|
page read and write
|
||
1A6E000
|
stack
|
page read and write
|
||
25A802508000
|
trusted library allocation
|
page read and write
|
||
74A001530000
|
trusted library allocation
|
page read and write
|
||
2C0800404000
|
trusted library allocation
|
page read and write
|
||
1DBF3000
|
heap
|
page read and write
|
||
1DA838AB000
|
heap
|
page read and write
|
||
25A80240C000
|
trusted library allocation
|
page read and write
|
||
33AC007E4000
|
trusted library allocation
|
page read and write
|
||
74A000ECC000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
stack
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
7BDDFE000
|
stack
|
page read and write
|
||
2C080039C000
|
trusted library allocation
|
page read and write
|
||
74A000CE8000
|
trusted library allocation
|
page read and write
|
||
1D92E000
|
stack
|
page read and write
|
||
74A000D00000
|
trusted library allocation
|
page read and write
|
||
7C65FE000
|
unkown
|
page readonly
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
A800260000
|
direct allocation
|
page read and write
|
||
1DBFD000
|
heap
|
page read and write
|
||
74A001DD8000
|
trusted library allocation
|
page read and write
|
||
7CD5FE000
|
unkown
|
page readonly
|
||
74A000F88000
|
trusted library allocation
|
page read and write
|
||
74A001B98000
|
trusted library allocation
|
page read and write
|
||
7C1DFE000
|
stack
|
page read and write
|
||
6DBC00235000
|
trusted library allocation
|
page read and write
|
||
74A000C38000
|
trusted library allocation
|
page read and write
|
||
D07000
|
unkown
|
page execute and read and write
|
||
7C15FE000
|
unkown
|
page readonly
|
||
25A800201000
|
trusted library allocation
|
page read and write
|
||
74A001D1C000
|
trusted library allocation
|
page read and write
|
||
7C5DFE000
|
stack
|
page read and write
|
||
74A001773000
|
trusted library allocation
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
74A000CE8000
|
trusted library allocation
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
74A001928000
|
trusted library allocation
|
page read and write
|
||
20590E0B000
|
heap
|
page read and write
|
||
74A000458000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
33AC00790000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
7E15FE000
|
unkown
|
page readonly
|
||
A800303000
|
direct allocation
|
page read and write
|
||
74A001DC8000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA838A0000
|
heap
|
page read and write
|
||
6C841000
|
unkown
|
page execute read
|
||
A8002AC000
|
direct allocation
|
page read and write
|
||
1DA8DA00000
|
heap
|
page read and write
|
||
74A00143E000
|
trusted library allocation
|
page read and write
|
||
1DA886E0000
|
trusted library section
|
page readonly
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
74A00073C000
|
trusted library allocation
|
page read and write
|
||
1DA85736000
|
heap
|
page read and write
|
||
74A00037C000
|
trusted library allocation
|
page read and write
|
||
74A001722000
|
trusted library allocation
|
page read and write
|
||
A800316000
|
direct allocation
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
131C000
|
stack
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
25A80254C000
|
trusted library allocation
|
page read and write
|
||
74A001790000
|
trusted library allocation
|
page read and write
|
||
74A0017C8000
|
trusted library allocation
|
page read and write
|
||
2058D385000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
7BBDFF000
|
stack
|
page read and write
|
||
25A80228C000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
unkown
|
page execute and read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
1806000
|
heap
|
page read and write
|
||
33AC00974000
|
trusted library allocation
|
page read and write
|
||
20590DC9000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
25A80222C000
|
trusted library allocation
|
page read and write
|
||
1DA85730000
|
heap
|
page read and write
|
||
74A001E38000
|
trusted library allocation
|
page read and write
|
||
74A001448000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
20594E81000
|
heap
|
page read and write
|
||
25A8024C0000
|
trusted library allocation
|
page read and write
|
||
74A001EFC000
|
trusted library allocation
|
page read and write
|
||
1DA857D7000
|
heap
|
page read and write
|
||
1DCF1000
|
heap
|
page read and write
|
||
33AC006F4000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2C0800424000
|
trusted library allocation
|
page read and write
|
||
74A00073C000
|
trusted library allocation
|
page read and write
|
||
74A00192C000
|
trusted library allocation
|
page read and write
|
||
25A802384000
|
trusted library allocation
|
page read and write
|
||
25A801001000
|
trusted library allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
25A8024B8000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A001714000
|
trusted library allocation
|
page read and write
|
||
74A001B70000
|
trusted library allocation
|
page read and write
|
||
6DBC00210000
|
trusted library allocation
|
page read and write
|
||
69B4002D8000
|
trusted library allocation
|
page read and write
|
||
A800328000
|
direct allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
23DE0000
|
heap
|
page read and write
|
||
1DA8572D000
|
heap
|
page read and write
|
||
1DA8392D000
|
heap
|
page read and write
|
||
25A80241C000
|
trusted library allocation
|
page read and write
|
||
1DA85728000
|
heap
|
page read and write
|
||
74A001A4C000
|
trusted library allocation
|
page read and write
|
||
2C0800358000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
unkown
|
page execute and read and write
|
||
74A0019AC000
|
trusted library allocation
|
page read and write
|
||
7C05FE000
|
unkown
|
page readonly
|
||
74A0014F6000
|
trusted library allocation
|
page read and write
|
||
74A00073C000
|
trusted library allocation
|
page read and write
|
||
2C08003C0000
|
trusted library allocation
|
page read and write
|
||
1DA855E0000
|
heap
|
page read and write
|
||
74A000FC0000
|
trusted library allocation
|
page read and write
|
||
74A001660000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
74A00020C000
|
trusted library allocation
|
page read and write
|
||
33AC00844000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
25A8022D0000
|
trusted library allocation
|
page read and write
|
||
25A80252C000
|
trusted library allocation
|
page read and write
|
||
74A0014E0000
|
trusted library allocation
|
page read and write
|
||
74A001A78000
|
trusted library allocation
|
page read and write
|
||
2C0800201000
|
trusted library allocation
|
page read and write
|
||
1DA8578E000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
7E05FE000
|
unkown
|
page readonly
|
||
7D85FE000
|
unkown
|
page readonly
|
||
74A001CE8000
|
trusted library allocation
|
page read and write
|
||
74A0017BB000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
33AC008C8000
|
trusted library allocation
|
page read and write
|
||
1DBFE000
|
heap
|
page read and write
|
||
74A000218000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
1DA837C0000
|
heap
|
page read and write
|
||
25A802640000
|
trusted library allocation
|
page read and write
|
||
25A802594000
|
trusted library allocation
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
7CADFE000
|
stack
|
page read and write
|
||
1DA85721000
|
heap
|
page read and write
|
||
74A001504000
|
trusted library allocation
|
page read and write
|
||
25A8024F0000
|
trusted library allocation
|
page read and write
|
||
25A8024E4000
|
trusted library allocation
|
page read and write
|
||
74A001A74000
|
trusted library allocation
|
page read and write
|
||
74A00149C000
|
trusted library allocation
|
page read and write
|
||
20590D90000
|
heap
|
page read and write
|
||
33AC00894000
|
trusted library allocation
|
page read and write
|
||
74A000E2C000
|
trusted library allocation
|
page read and write
|
||
69B4002B0000
|
trusted library allocation
|
page read and write
|
||
74A0016C0000
|
trusted library allocation
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A000EF4000
|
trusted library allocation
|
page read and write
|
||
6DBC00210000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
33AC00788000
|
trusted library allocation
|
page read and write
|
||
74A001A48000
|
trusted library allocation
|
page read and write
|
||
74A001655000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
74A001B80000
|
trusted library allocation
|
page read and write
|
||
25A8023F0000
|
trusted library allocation
|
page read and write
|
||
CFB000
|
unkown
|
page execute and read and write
|
||
1384000
|
heap
|
page read and write
|
||
20590886000
|
heap
|
page read and write
|
||
20590887000
|
heap
|
page read and write
|
||
1D51F000
|
stack
|
page read and write
|
||
1DA8392D000
|
heap
|
page read and write
|
||
74A000CF8000
|
trusted library allocation
|
page read and write
|
||
2C0800418000
|
trusted library allocation
|
page read and write
|
||
33AC0085C000
|
trusted library allocation
|
page read and write
|
||
2C0800290000
|
trusted library allocation
|
page read and write
|
||
25A8022B8000
|
trusted library allocation
|
page read and write
|
||
74A000124000
|
trusted library allocation
|
page read and write
|
||
69B4002C0000
|
trusted library allocation
|
page read and write
|
||
23DA0000
|
heap
|
page read and write
|
||
74A001DAC000
|
trusted library allocation
|
page read and write
|
||
25A802474000
|
trusted library allocation
|
page read and write
|
||
25A802580000
|
trusted library allocation
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
74A001DC8000
|
trusted library allocation
|
page read and write
|
||
69B4002C0000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
25A800C01000
|
trusted library allocation
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
74A001968000
|
trusted library allocation
|
page read and write
|
||
25A80234C000
|
trusted library allocation
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
33AC0060C000
|
trusted library allocation
|
page read and write
|
||
25A8026A4000
|
trusted library allocation
|
page read and write
|
||
7D35FE000
|
unkown
|
page readonly
|
||
74A001B50000
|
trusted library allocation
|
page read and write
|
||
74A00040C000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
74A002AE4000
|
trusted library allocation
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
25A802458000
|
trusted library allocation
|
page read and write
|
||
33D7000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
74A001300000
|
trusted library allocation
|
page read and write
|
||
74A001078000
|
trusted library allocation
|
page read and write
|
||
74A001DD4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
20590D6A000
|
heap
|
page read and write
|
||
74A0004C4000
|
trusted library allocation
|
page read and write
|
||
74A00158C000
|
trusted library allocation
|
page read and write
|
||
5710000
|
direct allocation
|
page execute and read and write
|
||
74A0001E8000
|
trusted library allocation
|
page read and write
|
||
25A802598000
|
trusted library allocation
|
page read and write
|
||
6DBC00294000
|
trusted library allocation
|
page read and write
|
||
7E35FE000
|
unkown
|
page readonly
|
||
74A001AEC000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA857DE000
|
heap
|
page read and write
|
||
2C0800320000
|
trusted library allocation
|
page read and write
|
||
74A001430000
|
trusted library allocation
|
page read and write
|
||
74A001D2C000
|
trusted library allocation
|
page read and write
|
||
2C080032C000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
74A0002F0000
|
trusted library allocation
|
page read and write
|
||
1DBF9000
|
heap
|
page read and write
|
||
74A001310000
|
trusted library allocation
|
page read and write
|
||
A800280000
|
direct allocation
|
page read and write
|
||
74A00100C000
|
trusted library allocation
|
page read and write
|
||
1DBF6000
|
heap
|
page read and write
|
||
74A00148D000
|
trusted library allocation
|
page read and write
|
||
74A0013AC000
|
trusted library allocation
|
page read and write
|
||
74A0001F0000
|
trusted library allocation
|
page read and write
|
||
25A800801000
|
trusted library allocation
|
page read and write
|
||
1DBD2000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
25A802374000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
50DF000
|
stack
|
page read and write
|
||
74A001448000
|
trusted library allocation
|
page read and write
|
||
33AC008E8000
|
trusted library allocation
|
page read and write
|
||
74A0012B4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA85729000
|
heap
|
page read and write
|
||
74A001548000
|
trusted library allocation
|
page read and write
|
||
20590885000
|
heap
|
page read and write
|
||
74A0013D0000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
2C080031C000
|
trusted library allocation
|
page read and write
|
||
20590E0F000
|
heap
|
page read and write
|
||
2C0800374000
|
trusted library allocation
|
page read and write
|
||
74A001768000
|
trusted library allocation
|
page read and write
|
||
33AC007D0000
|
trusted library allocation
|
page read and write
|
||
74A001524000
|
trusted library allocation
|
page read and write
|
||
25A800A01000
|
trusted library allocation
|
page read and write
|
||
74A001DB4000
|
trusted library allocation
|
page read and write
|
||
7C95FE000
|
unkown
|
page readonly
|
||
74A001D40000
|
trusted library allocation
|
page read and write
|
||
1DA85732000
|
heap
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
23DC0000
|
heap
|
page read and write
|
||
74A00150C000
|
trusted library allocation
|
page read and write
|
||
74A000CE8000
|
trusted library allocation
|
page read and write
|
||
33DB000
|
heap
|
page read and write
|
||
74A00021C000
|
trusted library allocation
|
page read and write
|
||
5740000
|
direct allocation
|
page execute and read and write
|
||
7CF5FE000
|
unkown
|
page readonly
|
||
74A0019D4000
|
trusted library allocation
|
page read and write
|
||
A800318000
|
direct allocation
|
page read and write
|
||
7D55FE000
|
unkown
|
page readonly
|
||
25A802558000
|
trusted library allocation
|
page read and write
|
||
74A0010EC000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
74A000E2C000
|
trusted library allocation
|
page read and write
|
||
6DBC00248000
|
trusted library allocation
|
page read and write
|
||
7C2DFE000
|
stack
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
33AC006E8000
|
trusted library allocation
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
25A80243C000
|
trusted library allocation
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
7D4DFE000
|
stack
|
page read and write
|
||
A80021C000
|
direct allocation
|
page read and write
|
||
6DBC002B8000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
25A8022CA000
|
trusted library allocation
|
page read and write
|
||
33AC0040C000
|
trusted library allocation
|
page read and write
|
||
10D2000
|
unkown
|
page execute and read and write
|
||
74A00177C000
|
trusted library allocation
|
page read and write
|
||
74A002A18000
|
trusted library allocation
|
page read and write
|
||
25A8025D4000
|
trusted library allocation
|
page read and write
|
||
74A00148D000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2C0800304000
|
trusted library allocation
|
page read and write
|
||
33AC00860000
|
trusted library allocation
|
page read and write
|
||
74A00160E000
|
trusted library allocation
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
1DA85734000
|
heap
|
page read and write
|
||
23DA0000
|
trusted library allocation
|
page read and write
|
||
2C08002D0000
|
trusted library allocation
|
page read and write
|
||
33AC007A0000
|
trusted library allocation
|
page read and write
|
||
74A001439000
|
trusted library allocation
|
page read and write
|
||
74A00190C000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
unkown
|
page execute and read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
A800217000
|
direct allocation
|
page read and write
|
||
74A001970000
|
trusted library allocation
|
page read and write
|
||
1DBE6000
|
heap
|
page read and write
|
||
CCE000
|
unkown
|
page execute and read and write
|
||
74A001478000
|
trusted library allocation
|
page read and write
|
||
20590D83000
|
heap
|
page read and write
|
||
33AC00818000
|
trusted library allocation
|
page read and write
|
||
20590DFE000
|
heap
|
page read and write
|
||
25A8024E4000
|
trusted library allocation
|
page read and write
|
||
25A802468000
|
trusted library allocation
|
page read and write
|
||
1DA857E0000
|
heap
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
74A0017B8000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
unkown
|
page execute and write copy
|
||
74A0017BE000
|
trusted library allocation
|
page read and write
|
||
74A002A0C000
|
trusted library allocation
|
page read and write
|
||
7C25FE000
|
unkown
|
page readonly
|
||
25A8025E8000
|
trusted library allocation
|
page read and write
|
||
74A000F88000
|
trusted library allocation
|
page read and write
|
||
2C0800284000
|
trusted library allocation
|
page read and write
|
||
74A0001DC000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A0001EC000
|
trusted library allocation
|
page read and write
|
||
69B4002C8000
|
trusted library allocation
|
page read and write
|
||
74A000F5D000
|
trusted library allocation
|
page read and write
|
||
5730000
|
direct allocation
|
page execute and read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A0019E8000
|
trusted library allocation
|
page read and write
|
||
2C0800338000
|
trusted library allocation
|
page read and write
|
||
7BFDFE000
|
stack
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
1DA837E0000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A00145C000
|
trusted library allocation
|
page read and write
|
||
74A0014D8000
|
trusted library allocation
|
page read and write
|
||
74A000CF8000
|
trusted library allocation
|
page read and write
|
||
74A001B8C000
|
trusted library allocation
|
page read and write
|
||
74A002A18000
|
trusted library allocation
|
page read and write
|
||
74A00034C000
|
trusted library allocation
|
page read and write
|
||
25A80252C000
|
trusted library allocation
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
20590885000
|
heap
|
page read and write
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
25A802201000
|
trusted library allocation
|
page read and write
|
||
74A001B5C000
|
trusted library allocation
|
page read and write
|
||
1DA8574E000
|
heap
|
page read and write
|
||
74A001340000
|
trusted library allocation
|
page read and write
|
||
74A001478000
|
trusted library allocation
|
page read and write
|
||
74A0013AC000
|
trusted library allocation
|
page read and write
|
||
74A001570000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
25A80221C000
|
trusted library allocation
|
page read and write
|
||
1DC05000
|
heap
|
page read and write
|
||
1DC00000
|
heap
|
page read and write
|
||
2C0800380000
|
trusted library allocation
|
page read and write
|
||
25A8025C8000
|
trusted library allocation
|
page read and write
|
||
25A802508000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
74A0004E0000
|
trusted library allocation
|
page read and write
|
||
74A000E18000
|
trusted library allocation
|
page read and write
|
||
25A802580000
|
trusted library allocation
|
page read and write
|
||
74A0018E0000
|
trusted library allocation
|
page read and write
|
||
23DA0000
|
trusted library allocation
|
page read and write
|
||
74A001A64000
|
trusted library allocation
|
page read and write
|
||
6DBC002A0000
|
trusted library allocation
|
page read and write
|
||
1DA83902000
|
heap
|
page read and write
|
||
74A001BEC000
|
trusted library allocation
|
page read and write
|
||
33AC006AC000
|
trusted library allocation
|
page read and write
|
||
2C080032C000
|
trusted library allocation
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
7D5DFC000
|
stack
|
page read and write
|
||
25A80253C000
|
trusted library allocation
|
page read and write
|
||
74A001BC4000
|
trusted library allocation
|
page read and write
|
||
2C0800408000
|
trusted library allocation
|
page read and write
|
||
1DA83813000
|
heap
|
page read and write
|
||
2C0800360000
|
trusted library allocation
|
page read and write
|
||
74A0001D0000
|
trusted library allocation
|
page read and write
|
||
74A0019A0000
|
trusted library allocation
|
page read and write
|
||
74A0012F8000
|
trusted library allocation
|
page read and write
|
||
74A001B04000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
7CBDFB000
|
stack
|
page read and write
|
||
25A8024A0000
|
trusted library allocation
|
page read and write
|
||
74A0018E8000
|
trusted library allocation
|
page read and write
|
||
74A001EA8000
|
trusted library allocation
|
page read and write
|
||
2C0800248000
|
trusted library allocation
|
page read and write
|
||
74A0014EC000
|
trusted library allocation
|
page read and write
|
||
74A0014F5000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
74A000CB8000
|
trusted library allocation
|
page read and write
|
||
74A001768000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page read and write
|
||
1DA838BA000
|
heap
|
page read and write
|
||
74A001DEC000
|
trusted library allocation
|
page read and write
|
||
1DA8382C000
|
heap
|
page read and write
|
||
74A001D84000
|
trusted library allocation
|
page read and write
|
||
25A802474000
|
trusted library allocation
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
74A00022C000
|
trusted library allocation
|
page read and write
|
||
69B4002A0000
|
trusted library allocation
|
page read and write
|
||
74A000ECC000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A00157C000
|
trusted library allocation
|
page read and write
|
||
25A802484000
|
trusted library allocation
|
page read and write
|
||
25A8024D8000
|
trusted library allocation
|
page read and write
|
||
25A8022D8000
|
trusted library allocation
|
page read and write
|
||
74A001A28000
|
trusted library allocation
|
page read and write
|
||
33AC0071C000
|
trusted library allocation
|
page read and write
|
||
74A000EF4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
25A800401000
|
trusted library allocation
|
page read and write
|
||
74A000C38000
|
trusted library allocation
|
page read and write
|
||
20590DD6000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A00037C000
|
trusted library allocation
|
page read and write
|
||
74A000F58000
|
trusted library allocation
|
page read and write
|
||
74A000CF8000
|
trusted library allocation
|
page read and write
|
||
1DA85730000
|
heap
|
page read and write
|
||
74A000454000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1DBF3000
|
heap
|
page read and write
|
||
A800212000
|
direct allocation
|
page read and write
|
||
74A0018D0000
|
trusted library allocation
|
page read and write
|
||
74A001910000
|
trusted library allocation
|
page read and write
|
||
74A001F60000
|
trusted library allocation
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
20590DFF000
|
heap
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
74A001950000
|
trusted library allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
1DA8DA02000
|
heap
|
page read and write
|
||
74A001A1C000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
A800274000
|
direct allocation
|
page read and write
|
||
74A001AD4000
|
trusted library allocation
|
page read and write
|
||
74A0002A8000
|
trusted library allocation
|
page read and write
|
||
61E01000
|
direct allocation
|
page execute read
|
||
1DBE6000
|
heap
|
page read and write
|
||
2059088D000
|
heap
|
page read and write
|
||
25A8026A8000
|
trusted library allocation
|
page read and write
|
||
A8002A8000
|
direct allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
74A001350000
|
trusted library allocation
|
page read and write
|
||
7CB5FE000
|
unkown
|
page readonly
|
||
74A00073C000
|
trusted library allocation
|
page read and write
|
||
74A0002B4000
|
trusted library allocation
|
page read and write
|
||
74A001D04000
|
trusted library allocation
|
page read and write
|
||
7C85FE000
|
unkown
|
page readonly
|
||
74A000300000
|
trusted library allocation
|
page read and write
|
||
1DBD0000
|
heap
|
page read and write
|
||
74A001EAC000
|
trusted library allocation
|
page read and write
|
||
20594E97000
|
heap
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
7D95FE000
|
unkown
|
page readonly
|
||
25A80242C000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
74A000BEC000
|
trusted library allocation
|
page read and write
|
||
33AC0070C000
|
trusted library allocation
|
page read and write
|
||
1DBDB000
|
heap
|
page read and write
|
||
1DA8388C000
|
heap
|
page read and write
|
||
74A001064000
|
trusted library allocation
|
page read and write
|
||
74A0018BC000
|
trusted library allocation
|
page read and write
|
||
6DBC002A8000
|
trusted library allocation
|
page read and write
|
||
1DA83967000
|
heap
|
page read and write
|
||
1DA8C580000
|
trusted library allocation
|
page read and write
|
||
74A000F30000
|
trusted library allocation
|
page read and write
|
||
1DA8573A000
|
heap
|
page read and write
|
||
A80030A000
|
direct allocation
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
74A00038C000
|
trusted library allocation
|
page read and write
|
||
74A001A30000
|
trusted library allocation
|
page read and write
|
||
25A8025D8000
|
trusted library allocation
|
page read and write
|
||
74A0016CE000
|
trusted library allocation
|
page read and write
|
||
33AC008EC000
|
trusted library allocation
|
page read and write
|
||
74A0014C0000
|
trusted library allocation
|
page read and write
|
||
2C080031C000
|
trusted library allocation
|
page read and write
|
||
74A001028000
|
trusted library allocation
|
page read and write
|
||
74A00038D000
|
trusted library allocation
|
page read and write
|
||
74A00158C000
|
trusted library allocation
|
page read and write
|
||
74A0013AC000
|
trusted library allocation
|
page read and write
|
||
25A8026A8000
|
trusted library allocation
|
page read and write
|
||
25A802420000
|
trusted library allocation
|
page read and write
|
||
74A0012B4000
|
trusted library allocation
|
page read and write
|
||
74A0012F8000
|
trusted library allocation
|
page read and write
|
||
1DA8573A000
|
heap
|
page read and write
|
||
A800244000
|
direct allocation
|
page read and write
|
||
25A8024F0000
|
trusted library allocation
|
page read and write
|
||
74A0019C0000
|
trusted library allocation
|
page read and write
|
||
74A0002B4000
|
trusted library allocation
|
page read and write
|
||
1DA85785000
|
heap
|
page read and write
|
||
74A0001D4000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
10DC000
|
unkown
|
page execute and read and write
|
||
1DB6C000
|
stack
|
page read and write
|
||
1D8DF000
|
stack
|
page read and write
|
||
25A8023C0000
|
trusted library allocation
|
page read and write
|
||
74A000230000
|
trusted library allocation
|
page read and write
|
||
74A001184000
|
trusted library allocation
|
page read and write
|
||
20590885000
|
heap
|
page read and write
|
||
7D9DFE000
|
stack
|
page read and write
|
||
74A001224000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A0014C0000
|
trusted library allocation
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
1DA85783000
|
heap
|
page read and write
|
||
1DA857BA000
|
heap
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001438000
|
trusted library allocation
|
page read and write
|
||
74A000298000
|
trusted library allocation
|
page read and write
|
||
1DA857B4000
|
heap
|
page read and write
|
||
74A001E24000
|
trusted library allocation
|
page read and write
|
||
1D41E000
|
stack
|
page read and write
|
||
6DBC002C8000
|
trusted library allocation
|
page read and write
|
||
5720000
|
direct allocation
|
page execute and read and write
|
||
A800215000
|
direct allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1DA85613000
|
heap
|
page read and write
|
||
74A000324000
|
trusted library allocation
|
page read and write
|
||
2C080025C000
|
trusted library allocation
|
page read and write
|
||
1DA838A5000
|
heap
|
page read and write
|
||
25A802624000
|
trusted library allocation
|
page read and write
|
||
25A8024AC000
|
trusted library allocation
|
page read and write
|
||
1DBF4000
|
heap
|
page read and write
|
||
20590D7B000
|
heap
|
page read and write
|
||
74A0011E0000
|
trusted library allocation
|
page read and write
|
||
2059087F000
|
heap
|
page read and write
|
||
74A000F64000
|
trusted library allocation
|
page read and write
|
||
7C75FE000
|
unkown
|
page readonly
|
||
36DF000
|
stack
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
56E0000
|
direct allocation
|
page execute and read and write
|
||
74A000C38000
|
trusted library allocation
|
page read and write
|
||
6C8E9000
|
unkown
|
page readonly
|
||
421E000
|
stack
|
page read and write
|
||
1DA85602000
|
heap
|
page read and write
|
||
74A001B58000
|
trusted library allocation
|
page read and write
|
||
74A001A60000
|
trusted library allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
25A802470000
|
trusted library allocation
|
page read and write
|
||
74A001FC4000
|
trusted library allocation
|
page read and write
|
||
2059088C000
|
heap
|
page read and write
|
||
74A00030C000
|
trusted library allocation
|
page read and write
|
||
25A80256C000
|
trusted library allocation
|
page read and write
|
||
1DA8576C000
|
heap
|
page read and write
|
||
74A001BD8000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
74A001B2C000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
6DBC002B4000
|
trusted library allocation
|
page read and write
|
||
74A001310000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA85794000
|
heap
|
page read and write
|
||
74A000469000
|
trusted library allocation
|
page read and write
|
||
2C0800210000
|
trusted library allocation
|
page read and write
|
||
74A0015AC000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
33AC0080C000
|
trusted library allocation
|
page read and write
|
||
74A001D98000
|
trusted library allocation
|
page read and write
|
||
74A001E88000
|
trusted library allocation
|
page read and write
|
||
33AC00884000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
20594EA9000
|
heap
|
page read and write
|
||
A800234000
|
direct allocation
|
page read and write
|
||
56CF000
|
stack
|
page read and write
|
||
74A001B68000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
74A001714000
|
trusted library allocation
|
page read and write
|
||
7DC5FE000
|
unkown
|
page readonly
|
||
74A001064000
|
trusted library allocation
|
page read and write
|
||
20594E8F000
|
heap
|
page read and write
|
||
25A80247C000
|
trusted library allocation
|
page read and write
|
||
2C0800344000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA857C9000
|
heap
|
page read and write
|
||
74A001310000
|
trusted library allocation
|
page read and write
|
||
20590884000
|
heap
|
page read and write
|
||
74A000294000
|
trusted library allocation
|
page read and write
|
||
DA8000
|
unkown
|
page execute and read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
74A001D08000
|
trusted library allocation
|
page read and write
|
||
7D7DFD000
|
stack
|
page read and write
|
||
2C0800390000
|
trusted library allocation
|
page read and write
|
||
74A001A44000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
unkown
|
page execute and read and write
|
||
74A0012C0000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
1DA8571C000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
C74000
|
unkown
|
page execute and read and write
|
||
74A001B18000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
74A001E20000
|
trusted library allocation
|
page read and write
|
||
74A000338000
|
trusted library allocation
|
page read and write
|
||
23D07000
|
heap
|
page read and write
|
||
A8002D0000
|
direct allocation
|
page read and write
|
||
74A001B24000
|
trusted library allocation
|
page read and write
|
||
1DA838A5000
|
heap
|
page read and write
|
||
33AC00848000
|
trusted library allocation
|
page read and write
|
||
74A00140C000
|
trusted library allocation
|
page read and write
|
||
74A000FD8000
|
trusted library allocation
|
page read and write
|
||
74A001330000
|
trusted library allocation
|
page read and write
|
||
1DA8578A000
|
heap
|
page read and write
|
||
33AC0082C000
|
trusted library allocation
|
page read and write
|
||
74A000340000
|
trusted library allocation
|
page read and write
|
||
74A00073C000
|
trusted library allocation
|
page read and write
|
||
74A001224000
|
trusted library allocation
|
page read and write
|
There are 1397 hidden memdumps, click here to show them.