Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
UfRKIdsNvD.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UfRKIdsNvD.exe_dd69146b3a63e24f81695b34c9e2fc07c4c13_b481f7d4_37eb541d-c89e-4597-964b-2bb115b65574\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cKVHNxTLdXDmoFXuLNoh.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C92.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Oct 27 12:01:56 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DAC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DCC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\UfRKIdsNvD.exe
|
"C:\Users\user\Desktop\UfRKIdsNvD.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2236,i,8175765210856130800,3496501643183743028,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 1116
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://anglebug.com/4836D
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/4836B
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/5055E
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsq
|
unknown
|
||
https://anglebug.com/7320-
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/6048=
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
http://anglebug.com/53719
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
http://anglebug.com/45517
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en3
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://anglebug.com/6439C
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/3584/
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
http://anglebug.com/4551M
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://anglebug.com/6141z
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://anglebug.com/54211
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://www.youtube.com/854a0aa2c5)
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
http://anglebug.com/5881;
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
https://issuetracker.google.com/issues/166475273L
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://unisolated.invalid/n
|
unknown
|
||
https://docs.google.com/document/?usp=installed_webappdator
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.thirtji13ht.top
|
46.173.214.92
|
||
thirtji13ht.top
|
46.173.214.92
|
||
www.google.com
|
142.250.185.100
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.173.214.92
|
home.thirtji13ht.top
|
Russian Federation
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.100
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
ProgramId
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
FileId
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
LongPathHash
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Name
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
OriginalFileName
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Publisher
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Version
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
BinFileVersion
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
BinaryType
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
ProductName
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
ProductVersion
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
LinkDate
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
BinProductVersion
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
AppxPackageFullName
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Size
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Language
|
||
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7160006D4000
|
trusted library allocation
|
page read and write
|
||
630800303000
|
direct allocation
|
page read and write
|
||
18D000248000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
7160007BC000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
18D0008D8000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
220ABAB0000
|
heap
|
page readonly
|
||
220ABBE0000
|
heap
|
page read and write
|
||
220ABDB5000
|
heap
|
page read and write
|
||
18D0008F4000
|
trusted library allocation
|
page read and write
|
||
716000EC0000
|
trusted library allocation
|
page read and write
|
||
716000074000
|
trusted library allocation
|
page read and write
|
||
18D0006BC000
|
trusted library allocation
|
page read and write
|
||
18D0008EC000
|
trusted library allocation
|
page read and write
|
||
18D000418000
|
trusted library allocation
|
page read and write
|
||
716000401000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
18D000874000
|
trusted library allocation
|
page read and write
|
||
563FDFD000
|
stack
|
page read and write
|
||
18D000848000
|
trusted library allocation
|
page read and write
|
||
31FA000
|
heap
|
page read and write
|
||
716000AA4000
|
trusted library allocation
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
220B57E0000
|
trusted library section
|
page read and write
|
||
220AF6B0000
|
heap
|
page read and write
|
||
18D00084C000
|
trusted library allocation
|
page read and write
|
||
716000A7C000
|
trusted library allocation
|
page read and write
|
||
716000DDC000
|
trusted library allocation
|
page read and write
|
||
18D00079C000
|
trusted library allocation
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
7160005B0000
|
trusted library allocation
|
page read and write
|
||
519C002A0000
|
trusted library allocation
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
220ABB40000
|
heap
|
page read and write
|
||
716000E64000
|
trusted library allocation
|
page read and write
|
||
519C00238000
|
trusted library allocation
|
page read and write
|
||
71600065C000
|
trusted library allocation
|
page read and write
|
||
519C00250000
|
trusted library allocation
|
page read and write
|
||
7160003C8000
|
trusted library allocation
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
716000914000
|
trusted library allocation
|
page read and write
|
||
3226000
|
heap
|
page read and write
|
||
6308002AC000
|
direct allocation
|
page read and write
|
||
308B000
|
heap
|
page read and write
|
||
18D000858000
|
trusted library allocation
|
page read and write
|
||
18D000898000
|
trusted library allocation
|
page read and write
|
||
716000220000
|
trusted library allocation
|
page read and write
|
||
5627DFB000
|
stack
|
page read and write
|
||
220B3683000
|
heap
|
page read and write
|
||
716000D5C000
|
trusted library allocation
|
page read and write
|
||
3085000
|
heap
|
page read and write
|
||
220B5FCE000
|
trusted library section
|
page read and write
|
||
63080023C000
|
direct allocation
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
7160008EF000
|
trusted library allocation
|
page read and write
|
||
18D000860000
|
trusted library allocation
|
page read and write
|
||
716000774000
|
trusted library allocation
|
page read and write
|
||
220AF1D3000
|
heap
|
page read and write
|
||
18D000920000
|
trusted library allocation
|
page read and write
|
||
7160009CC000
|
trusted library allocation
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
5636DFD000
|
stack
|
page read and write
|
||
31F4000
|
heap
|
page read and write
|
||
562F5FE000
|
unkown
|
page readonly
|
||
716000423000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
564DDFE000
|
stack
|
page read and write
|
||
220B5312000
|
trusted library section
|
page read and write
|
||
630800284000
|
direct allocation
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
716000D18000
|
trusted library allocation
|
page read and write
|
||
562EDFD000
|
stack
|
page read and write
|
||
3083000
|
heap
|
page read and write
|
||
716000C90000
|
trusted library allocation
|
page read and write
|
||
716000BD4000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
716000F64000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
unkown
|
page read and write
|
||
716001064000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
630800280000
|
direct allocation
|
page read and write
|
||
71600096E000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
220AF797000
|
heap
|
page read and write
|
||
630800250000
|
direct allocation
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
18D000220000
|
trusted library allocation
|
page read and write
|
||
716000D78000
|
trusted library allocation
|
page read and write
|
||
220AF1A0000
|
heap
|
page read and write
|
||
716000D2C000
|
trusted library allocation
|
page read and write
|
||
220AF1CA000
|
heap
|
page read and write
|
||
716000B5C000
|
trusted library allocation
|
page read and write
|
||
716000F4C000
|
trusted library allocation
|
page read and write
|
||
563CDFC000
|
stack
|
page read and write
|
||
324C000
|
heap
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
220AF1D6000
|
heap
|
page read and write
|
||
716000568000
|
trusted library allocation
|
page read and write
|
||
561CDEF000
|
stack
|
page read and write
|
||
716000FA4000
|
trusted library allocation
|
page read and write
|
||
7160002E0000
|
trusted library allocation
|
page read and write
|
||
220AF758000
|
heap
|
page read and write
|
||
7160002B0000
|
trusted library allocation
|
page read and write
|
||
519C002D8000
|
trusted library allocation
|
page read and write
|
||
220ABB48000
|
heap
|
page read and write
|
||
EFE000
|
unkown
|
page write copy
|
||
3253000
|
heap
|
page read and write
|
||
18D000894000
|
trusted library allocation
|
page read and write
|
||
716000F38000
|
trusted library allocation
|
page read and write
|
||
563BDFC000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
18D0002ED000
|
trusted library allocation
|
page read and write
|
||
716000C34000
|
trusted library allocation
|
page read and write
|
||
519C002F0000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
716000A7C000
|
trusted library allocation
|
page read and write
|
||
18D00071C000
|
trusted library allocation
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
562D5FE000
|
unkown
|
page readonly
|
||
716000028000
|
trusted library allocation
|
page read and write
|
||
18D0006C8000
|
trusted library allocation
|
page read and write
|
||
716000628000
|
trusted library allocation
|
page read and write
|
||
7160001AC000
|
trusted library allocation
|
page read and write
|
||
3083000
|
heap
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
3237000
|
heap
|
page read and write
|
||
7160008E0000
|
trusted library allocation
|
page read and write
|
||
7160002A4000
|
trusted library allocation
|
page read and write
|
||
716000001000
|
trusted library allocation
|
page read and write
|
||
716000874000
|
trusted library allocation
|
page read and write
|
||
18D0002F0000
|
trusted library allocation
|
page read and write
|
||
716000C44000
|
trusted library allocation
|
page read and write
|
||
716000A48000
|
trusted library allocation
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
71600100C000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
unkown
|
page write copy
|
||
56435FE000
|
unkown
|
page readonly
|
||
150000
|
heap
|
page read and write
|
||
71600020C000
|
trusted library allocation
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
220B5A80000
|
trusted library section
|
page read and write
|
||
716000D50000
|
trusted library allocation
|
page read and write
|
||
561E5FE000
|
unkown
|
page readonly
|
||
71600096A000
|
trusted library allocation
|
page read and write
|
||
562B5FE000
|
unkown
|
page readonly
|
||
7160006E4000
|
trusted library allocation
|
page read and write
|
||
41000
|
unkown
|
page execute read
|
||
220ABAC0000
|
heap
|
page read and write
|
||
5625DFE000
|
stack
|
page read and write
|
||
71600021C000
|
trusted library allocation
|
page read and write
|
||
220AF760000
|
heap
|
page read and write
|
||
18D000974000
|
trusted library allocation
|
page read and write
|
||
71600102C000
|
trusted library allocation
|
page read and write
|
||
563B5FE000
|
unkown
|
page readonly
|
||
716000CFC000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
519C00264000
|
trusted library allocation
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
6308002DC000
|
direct allocation
|
page read and write
|
||
7160001B4000
|
trusted library allocation
|
page read and write
|
||
716000B4C000
|
trusted library allocation
|
page read and write
|
||
71600113C000
|
trusted library allocation
|
page read and write
|
||
56215FE000
|
unkown
|
page readonly
|
||
56335FE000
|
unkown
|
page readonly
|
||
716000984000
|
trusted library allocation
|
page read and write
|
||
716000F70000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
18D000778000
|
trusted library allocation
|
page read and write
|
||
56355FE000
|
unkown
|
page readonly
|
||
716000C01000
|
trusted library allocation
|
page read and write
|
||
716000C1C000
|
trusted library allocation
|
page read and write
|
||
716000C6C000
|
trusted library allocation
|
page read and write
|
||
564C5FE000
|
unkown
|
page readonly
|
||
18D0008B8000
|
trusted library allocation
|
page read and write
|
||
220ADA20000
|
heap
|
page read and write
|
||
716000426000
|
trusted library allocation
|
page read and write
|
||
716000BCC000
|
trusted library allocation
|
page read and write
|
||
6308002E4000
|
direct allocation
|
page read and write
|
||
5647DFD000
|
stack
|
page read and write
|
||
716000D04000
|
trusted library allocation
|
page read and write
|
||
220B55E0000
|
trusted library section
|
page read and write
|
||
354E000
|
unkown
|
page read and write
|
||
7160003B8000
|
trusted library allocation
|
page read and write
|
||
220AF6F5000
|
heap
|
page read and write
|
||
716000C88000
|
trusted library allocation
|
page read and write
|
||
5630DFE000
|
stack
|
page read and write
|
||
716000ADC000
|
trusted library allocation
|
page read and write
|
||
18D000818000
|
trusted library allocation
|
page read and write
|
||
716000B4C000
|
trusted library allocation
|
page read and write
|
||
18D000801000
|
trusted library allocation
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
7160003C8000
|
trusted library allocation
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
564ADFE000
|
stack
|
page read and write
|
||
220B521E000
|
trusted library section
|
page read and write
|
||
71600129C000
|
trusted library allocation
|
page read and write
|
||
716000CC8000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
heap
|
page read and write
|
||
716000C88000
|
trusted library allocation
|
page read and write
|
||
7160003C8000
|
trusted library allocation
|
page read and write
|
||
220B5C37000
|
unclassified section
|
page read and write
|
||
341A000
|
heap
|
page read and write
|
||
56465FE000
|
unkown
|
page readonly
|
||
311B000
|
heap
|
page read and write
|
||
3233000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
18D000408000
|
trusted library allocation
|
page read and write
|
||
318B000
|
heap
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
716000FB0000
|
trusted library allocation
|
page read and write
|
||
716000184000
|
trusted library allocation
|
page read and write
|
||
220ADA23000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
716000818000
|
trusted library allocation
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
18D00040C000
|
trusted library allocation
|
page read and write
|
||
716000B04000
|
trusted library allocation
|
page read and write
|
||
18D0006F4000
|
trusted library allocation
|
page read and write
|
||
18D00060C000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
heap
|
page read and write
|
||
3138000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
716000218000
|
trusted library allocation
|
page read and write
|
||
716000EA4000
|
trusted library allocation
|
page read and write
|
||
71600080C000
|
trusted library allocation
|
page read and write
|
||
3236000
|
heap
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
716000B10000
|
trusted library allocation
|
page read and write
|
||
5643DFD000
|
stack
|
page read and write
|
||
18D000880000
|
trusted library allocation
|
page read and write
|
||
563ADFB000
|
stack
|
page read and write
|
||
519C002B0000
|
trusted library allocation
|
page read and write
|
||
220AF729000
|
heap
|
page read and write
|
||
220AF747000
|
heap
|
page read and write
|
||
3081000
|
heap
|
page read and write
|
||
561EDFF000
|
stack
|
page read and write
|
||
18D0007E0000
|
trusted library allocation
|
page read and write
|
||
71600022C000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
7160012C8000
|
trusted library allocation
|
page read and write
|
||
220B5A42000
|
trusted library section
|
page read and write
|
||
220AF73E000
|
heap
|
page read and write
|
||
7160012B8000
|
trusted library allocation
|
page read and write
|
||
220ABDB0000
|
heap
|
page read and write
|
||
56395FE000
|
unkown
|
page readonly
|
||
716000AE0000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
519C00260000
|
trusted library allocation
|
page read and write
|
||
716000C88000
|
trusted library allocation
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
EFE000
|
unkown
|
page read and write
|
||
18D00095C000
|
trusted library allocation
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
3081000
|
heap
|
page read and write
|
||
18D00091C000
|
trusted library allocation
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
716000E0C000
|
trusted library allocation
|
page read and write
|
||
519C00270000
|
trusted library allocation
|
page read and write
|
||
716000210000
|
trusted library allocation
|
page read and write
|
||
630800290000
|
direct allocation
|
page read and write
|
||
562C5FE000
|
unkown
|
page readonly
|
||
3300000
|
heap
|
page read and write
|
||
716000E40000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
56315FE000
|
unkown
|
page readonly
|
||
3193000
|
heap
|
page read and write
|
||
5644DFD000
|
stack
|
page read and write
|
||
220AF1CA000
|
heap
|
page read and write
|
||
630800217000
|
direct allocation
|
page read and write
|
||
EFE000
|
unkown
|
page write copy
|
||
7160001B4000
|
trusted library allocation
|
page read and write
|
||
18D00080C000
|
trusted library allocation
|
page read and write
|
||
716001030000
|
trusted library allocation
|
page read and write
|
||
71600017C000
|
trusted library allocation
|
page read and write
|
||
716000D24000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
71600129C000
|
trusted library allocation
|
page read and write
|
||
18D000404000
|
trusted library allocation
|
page read and write
|
||
18D000828000
|
trusted library allocation
|
page read and write
|
||
220B5432000
|
trusted library section
|
page read and write
|
||
18D000728000
|
trusted library allocation
|
page read and write
|
||
716000F70000
|
trusted library allocation
|
page read and write
|
||
18D000790000
|
trusted library allocation
|
page read and write
|
||
716000F5C000
|
trusted library allocation
|
page read and write
|
||
716000421000
|
trusted library allocation
|
page read and write
|
||
716000128000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
220ABAF0000
|
heap
|
page read and write
|
||
5649DFE000
|
stack
|
page read and write
|
||
7160008C8000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
716000914000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
5629DFC000
|
stack
|
page read and write
|
||
56245FE000
|
unkown
|
page readonly
|
||
716000090000
|
trusted library allocation
|
page read and write
|
||
18D0006E8000
|
trusted library allocation
|
page read and write
|
||
63080020C000
|
direct allocation
|
page read and write
|
||
308F000
|
heap
|
page read and write
|
||
519C002C0000
|
trusted library allocation
|
page read and write
|
||
716000370000
|
trusted library allocation
|
page read and write
|
||
716000CA0000
|
trusted library allocation
|
page read and write
|
||
220B5273000
|
trusted library section
|
page read and write
|
||
7160001D0000
|
trusted library allocation
|
page read and write
|
||
220B5473000
|
trusted library section
|
page read and write
|
||
18D00082C000
|
trusted library allocation
|
page read and write
|
||
220B3680000
|
heap
|
page read and write
|
||
312A000
|
heap
|
page read and write
|
||
716001048000
|
trusted library allocation
|
page read and write
|
||
220B3D57000
|
unclassified section
|
page read and write
|
||
519C002A0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
358F000
|
unkown
|
page read and write
|
||
18D000864000
|
trusted library allocation
|
page read and write
|
||
18D0007C4000
|
trusted library allocation
|
page read and write
|
||
220AF1D3000
|
heap
|
page read and write
|
||
519C002C8000
|
trusted library allocation
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
7160002F4000
|
trusted library allocation
|
page read and write
|
||
71600009C000
|
trusted library allocation
|
page read and write
|
||
716000840000
|
trusted library allocation
|
page read and write
|
||
562CDFE000
|
stack
|
page read and write
|
||
220AF6E9000
|
heap
|
page read and write
|
||
716000AE0000
|
trusted library allocation
|
page read and write
|
||
71600001C000
|
trusted library allocation
|
page read and write
|
||
18D000878000
|
trusted library allocation
|
page read and write
|
||
716000D5C000
|
trusted library allocation
|
page read and write
|
||
519C002B0000
|
trusted library allocation
|
page read and write
|
||
7160003DC000
|
trusted library allocation
|
page read and write
|
||
71600042C000
|
trusted library allocation
|
page read and write
|
||
562E5FE000
|
unkown
|
page readonly
|
||
716000BC8000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
220AF738000
|
heap
|
page read and write
|
||
18D000210000
|
trusted library allocation
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
56425FE000
|
unkown
|
page readonly
|
||
220ABC2E000
|
heap
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
56205FE000
|
unkown
|
page readonly
|
||
18D0008C4000
|
trusted library allocation
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
18D000788000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
71600111C000
|
trusted library allocation
|
page read and write
|
||
716000941000
|
trusted library allocation
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
7160005C4000
|
trusted library allocation
|
page read and write
|
||
5622DFD000
|
stack
|
page read and write
|
||
71600034C000
|
trusted library allocation
|
page read and write
|
||
7160004C4000
|
trusted library allocation
|
page read and write
|
||
7160002F0000
|
trusted library allocation
|
page read and write
|
||
220AF745000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
7160008FC000
|
trusted library allocation
|
page read and write
|
||
18D000840000
|
trusted library allocation
|
page read and write
|
||
7160001B4000
|
trusted library allocation
|
page read and write
|
||
7160001F8000
|
trusted library allocation
|
page read and write
|
||
220B54F7000
|
unclassified section
|
page read and write
|
||
6C91D000
|
unkown
|
page read and write
|
||
519C002C0000
|
trusted library allocation
|
page read and write
|
||
7160001F4000
|
trusted library allocation
|
page read and write
|
||
716000EC0000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7160002A4000
|
trusted library allocation
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
3086000
|
heap
|
page read and write
|
||
220B5A90000
|
trusted library section
|
page read and write
|
||
18D0007AC000
|
trusted library allocation
|
page read and write
|
||
220AF820000
|
trusted library section
|
page read and write
|
||
519C002C0000
|
trusted library allocation
|
page read and write
|
||
220B5420000
|
trusted library section
|
page read and write
|
||
18D000904000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
18D000601000
|
trusted library allocation
|
page read and write
|
||
7160004A4000
|
trusted library allocation
|
page read and write
|
||
716000298000
|
trusted library allocation
|
page read and write
|
||
767000
|
unkown
|
page write copy
|
||
7160003A4000
|
trusted library allocation
|
page read and write
|
||
716000E18000
|
trusted library allocation
|
page read and write
|
||
56265FE000
|
unkown
|
page readonly
|
||
18D000230000
|
trusted library allocation
|
page read and write
|
||
716000801000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
220B5FB7000
|
unclassified section
|
page read and write
|
||
18D000430000
|
trusted library allocation
|
page read and write
|
||
716000D44000
|
trusted library allocation
|
page read and write
|
||
71600040C000
|
trusted library allocation
|
page read and write
|
||
716000294000
|
trusted library allocation
|
page read and write
|
||
18D00027C000
|
trusted library allocation
|
page read and write
|
||
56285FE000
|
unkown
|
page readonly
|
||
220AF726000
|
heap
|
page read and write
|
||
71600038C000
|
trusted library allocation
|
page read and write
|
||
18D0006D4000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
7160008B8000
|
trusted library allocation
|
page read and write
|
||
716000B90000
|
trusted library allocation
|
page read and write
|
||
18D0006E0000
|
trusted library allocation
|
page read and write
|
||
564A5FE000
|
unkown
|
page readonly
|
||
519C002F4000
|
trusted library allocation
|
page read and write
|
||
519C00230000
|
trusted library allocation
|
page read and write
|
||
716000A20000
|
trusted library allocation
|
page read and write
|
||
18D0002E4000
|
trusted library allocation
|
page read and write
|
||
716000848000
|
trusted library allocation
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
716000E80000
|
trusted library allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
18D000424000
|
trusted library allocation
|
page read and write
|
||
71600120C000
|
trusted library allocation
|
page read and write
|
||
716000A88000
|
trusted library allocation
|
page read and write
|
||
563E5FE000
|
unkown
|
page readonly
|
||
220AF741000
|
heap
|
page read and write
|
||
716000AC0000
|
trusted library allocation
|
page read and write
|
||
71600029E000
|
trusted library allocation
|
page read and write
|
||
5639DFD000
|
stack
|
page read and write
|
||
716000E80000
|
trusted library allocation
|
page read and write
|
||
56385FE000
|
unkown
|
page readonly
|
||
18D00039C000
|
trusted library allocation
|
page read and write
|
||
716000FDD000
|
trusted library allocation
|
page read and write
|
||
716001201000
|
trusted library allocation
|
page read and write
|
||
5633DFC000
|
stack
|
page read and write
|
||
7160007EC000
|
trusted library allocation
|
page read and write
|
||
716000E38000
|
trusted library allocation
|
page read and write
|
||
18D00025C000
|
trusted library allocation
|
page read and write
|
||
56415FE000
|
unkown
|
page readonly
|
||
7160010E0000
|
trusted library allocation
|
page read and write
|
||
563D5FE000
|
unkown
|
page readonly
|
||
716000201000
|
trusted library allocation
|
page read and write
|
||
71600048C000
|
trusted library allocation
|
page read and write
|
||
3239000
|
heap
|
page read and write
|
||
5620DFE000
|
stack
|
page read and write
|
||
716001104000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
563DDFB000
|
stack
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
220AE470000
|
unkown
|
page read and write
|
||
716000760000
|
trusted library allocation
|
page read and write
|
||
220B5031000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
716000511000
|
trusted library allocation
|
page read and write
|
||
716000FA4000
|
trusted library allocation
|
page read and write
|
||
716000954000
|
trusted library allocation
|
page read and write
|
||
564BDFE000
|
stack
|
page read and write
|
||
716000C2C000
|
trusted library allocation
|
page read and write
|
||
519C00235000
|
trusted library allocation
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
630800220000
|
direct allocation
|
page read and write
|
||
320C000
|
heap
|
page read and write
|
||
220AF1E1000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
716000A30000
|
trusted library allocation
|
page read and write
|
||
18D000401000
|
trusted library allocation
|
page read and write
|
||
716000F80000
|
trusted library allocation
|
page read and write
|
||
220AF1CF000
|
heap
|
page read and write
|
||
71600064C000
|
trusted library allocation
|
page read and write
|
||
18D00081C000
|
trusted library allocation
|
page read and write
|
||
220ABB20000
|
trusted library allocation
|
page read and write
|
||
716001070000
|
trusted library allocation
|
page read and write
|
||
5641DFD000
|
stack
|
page read and write
|
||
71600072C000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
220AF743000
|
heap
|
page read and write
|
||
56235FE000
|
unkown
|
page readonly
|
||
5648DFC000
|
stack
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
630800230000
|
direct allocation
|
page read and write
|
||
519C002A0000
|
trusted library allocation
|
page read and write
|
||
3386000
|
heap
|
page read and write
|
||
563EDFE000
|
stack
|
page read and write
|
||
220AF74F000
|
heap
|
page read and write
|
||
7160005E4000
|
trusted library allocation
|
page read and write
|
||
7160001E0000
|
trusted library allocation
|
page read and write
|
||
716000E1C000
|
trusted library allocation
|
page read and write
|
||
716000638000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
716000DD0000
|
trusted library allocation
|
page read and write
|
||
716000B84000
|
trusted library allocation
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
519C002A0000
|
trusted library allocation
|
page read and write
|
||
220B52B6000
|
trusted library section
|
page read and write
|
||
716000927000
|
trusted library allocation
|
page read and write
|
||
562ADFE000
|
stack
|
page read and write
|
||
716000A6C000
|
trusted library allocation
|
page read and write
|
||
519C00274000
|
trusted library allocation
|
page read and write
|
||
716000084000
|
trusted library allocation
|
page read and write
|
||
56345FE000
|
unkown
|
page readonly
|
||
716000A5C000
|
trusted library allocation
|
page read and write
|
||
3086000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
5621DFE000
|
stack
|
page read and write
|
||
328C000
|
heap
|
page read and write
|
||
716000EB6000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
3140000
|
heap
|
page read and write
|
||
630800201000
|
direct allocation
|
page read and write
|
||
519C002C0000
|
trusted library allocation
|
page read and write
|
||
71600058C000
|
trusted library allocation
|
page read and write
|
||
220AF78E000
|
heap
|
page read and write
|
||
18D000964000
|
trusted library allocation
|
page read and write
|
||
716000578000
|
trusted library allocation
|
page read and write
|
||
7160006B0000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
561FDFE000
|
stack
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
7160001DC000
|
trusted library allocation
|
page read and write
|
||
716000AF4000
|
trusted library allocation
|
page read and write
|
||
335C000
|
heap
|
page read and write
|
||
18D0002CC000
|
trusted library allocation
|
page read and write
|
||
716000FA8000
|
trusted library allocation
|
page read and write
|
||
6C91F000
|
unkown
|
page readonly
|
||
716000FA4000
|
trusted library allocation
|
page read and write
|
||
716000C90000
|
trusted library allocation
|
page read and write
|
||
18D0008A8000
|
trusted library allocation
|
page read and write
|
||
220AF8E0000
|
trusted library section
|
page read and write
|
||
3379000
|
heap
|
page read and write
|
||
7160001D8000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
220B5AA1000
|
trusted library section
|
page read and write
|
||
7160011C8000
|
trusted library allocation
|
page read and write
|
||
630800260000
|
direct allocation
|
page read and write
|
||
18D0007A0000
|
trusted library allocation
|
page read and write
|
||
220B5200000
|
trusted library section
|
page read and write
|
||
220AF1DC000
|
heap
|
page read and write
|
||
7160004F4000
|
trusted library allocation
|
page read and write
|
||
18D0006E8000
|
trusted library allocation
|
page read and write
|
||
716000780000
|
trusted library allocation
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
71600047C000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
220AF1D4000
|
heap
|
page read and write
|
||
7160009F8000
|
trusted library allocation
|
page read and write
|
||
716000378000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
716000601000
|
trusted library allocation
|
page read and write
|
||
220AD9E0000
|
heap
|
page read and write
|
||
71600049C000
|
trusted library allocation
|
page read and write
|
||
220B3D80000
|
heap
|
page read and write
|
||
220AF971000
|
trusted library section
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
18D0002F4000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
unkown
|
page readonly
|
||
519C002E4000
|
trusted library allocation
|
page read and write
|
||
716000F64000
|
trusted library allocation
|
page read and write
|
||
18D000884000
|
trusted library allocation
|
page read and write
|
||
5624DFB000
|
stack
|
page read and write
|
||
7160003C8000
|
trusted library allocation
|
page read and write
|
||
562A5FE000
|
unkown
|
page readonly
|
||
220B5BB0000
|
trusted library section
|
page read and write
|
||
7160004E8000
|
trusted library allocation
|
page read and write
|
||
716001134000
|
trusted library allocation
|
page read and write
|
||
716000FE0000
|
trusted library allocation
|
page read and write
|
||
18D0006AC000
|
trusted library allocation
|
page read and write
|
||
56255FE000
|
unkown
|
page readonly
|
||
18D0002B8000
|
trusted library allocation
|
page read and write
|
||
716000B8C000
|
trusted library allocation
|
page read and write
|
||
716000E74000
|
trusted library allocation
|
page read and write
|
||
56375FE000
|
unkown
|
page readonly
|
||
71600050D000
|
trusted library allocation
|
page read and write
|
||
716000750000
|
trusted library allocation
|
page read and write
|
||
716000ECC000
|
trusted library allocation
|
page read and write
|
||
716000714000
|
trusted library allocation
|
page read and write
|
||
71600047C000
|
trusted library allocation
|
page read and write
|
||
12AF000
|
stack
|
page read and write
|
||
56225FE000
|
unkown
|
page readonly
|
||
7160001E4000
|
trusted library allocation
|
page read and write
|
||
220ABAA0000
|
heap
|
page read and write
|
||
5645DFD000
|
stack
|
page read and write
|
||
3288000
|
heap
|
page read and write
|
||
716000CD4000
|
trusted library allocation
|
page read and write
|
||
18D0008E8000
|
trusted library allocation
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
7160001F0000
|
trusted library allocation
|
page read and write
|
||
716000688000
|
trusted library allocation
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
4AD000
|
unkown
|
page write copy
|
||
7160002F4000
|
trusted library allocation
|
page read and write
|
||
716000C50000
|
trusted library allocation
|
page read and write
|
||
56495FE000
|
unkown
|
page readonly
|
||
18D0002B0000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
220B543E000
|
trusted library section
|
page read and write
|
||
716000F64000
|
trusted library allocation
|
page read and write
|
||
18D00085C000
|
trusted library allocation
|
page read and write
|
||
18D000248000
|
trusted library allocation
|
page read and write
|
||
630800234000
|
direct allocation
|
page read and write
|
||
18D000918000
|
trusted library allocation
|
page read and write
|
||
630800274000
|
direct allocation
|
page read and write
|
||
716000294000
|
trusted library allocation
|
page read and write
|
||
716000F38000
|
trusted library allocation
|
page read and write
|
||
716000CC0000
|
trusted library allocation
|
page read and write
|
||
71600046C000
|
trusted library allocation
|
page read and write
|
||
18D0006AC000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
716000BE9000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
618000
|
unkown
|
page readonly
|
||
716000CEC000
|
trusted library allocation
|
page read and write
|
||
71600033C000
|
trusted library allocation
|
page read and write
|
||
220B3C67000
|
unclassified section
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
6C96C000
|
unkown
|
page readonly
|
||
561DDFE000
|
unkown
|
page read and write
|
||
3084000
|
heap
|
page read and write
|
||
18D0006F0000
|
trusted library allocation
|
page read and write
|
||
3084000
|
heap
|
page read and write
|
||
716000224000
|
trusted library allocation
|
page read and write
|
||
71600015C000
|
trusted library allocation
|
page read and write
|
||
18D000700000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
716000B64000
|
trusted library allocation
|
page read and write
|
||
6C841000
|
unkown
|
page execute read
|
||
716000894000
|
trusted library allocation
|
page read and write
|
||
7160003EC000
|
trusted library allocation
|
page read and write
|
||
56365FE000
|
unkown
|
page readonly
|
||
716000C0C000
|
trusted library allocation
|
page read and write
|
||
7160001C4000
|
trusted library allocation
|
page read and write
|
||
519C002F8000
|
trusted library allocation
|
page read and write
|
||
220B0AE0000
|
trusted library allocation
|
page read and write
|
||
716000D5C000
|
trusted library allocation
|
page read and write
|
||
7160011C8000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
31AC000
|
heap
|
page read and write
|
||
716000C88000
|
trusted library allocation
|
page read and write
|
||
308D000
|
heap
|
page read and write
|
||
716000294000
|
trusted library allocation
|
page read and write
|
||
716000358000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
716000228000
|
trusted library allocation
|
page read and write
|
||
716000384000
|
trusted library allocation
|
page read and write
|
||
716000378000
|
trusted library allocation
|
page read and write
|
||
6308002EC000
|
direct allocation
|
page read and write
|
||
71600000C000
|
trusted library allocation
|
page read and write
|
||
7160006B0000
|
trusted library allocation
|
page read and write
|
||
716000CB0000
|
trusted library allocation
|
page read and write
|
||
6C969000
|
unkown
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
716000134000
|
trusted library allocation
|
page read and write
|
||
716000E84000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
220B531D000
|
trusted library section
|
page read and write
|
||
716000ED8000
|
trusted library allocation
|
page read and write
|
||
5626DFB000
|
stack
|
page read and write
|
||
5632DFE000
|
stack
|
page read and write
|
||
71600014C000
|
trusted library allocation
|
page read and write
|
||
716000994000
|
trusted library allocation
|
page read and write
|
||
564E5FE000
|
unkown
|
page readonly
|
||
716001168000
|
trusted library allocation
|
page read and write
|
||
18D0008B4000
|
trusted library allocation
|
page read and write
|
||
716000A7C000
|
trusted library allocation
|
page read and write
|
||
18D000868000
|
trusted library allocation
|
page read and write
|
||
5646DFA000
|
stack
|
page read and write
|
||
220B5B56000
|
trusted library section
|
page read and write
|
||
33BA000
|
heap
|
page read and write
|
||
220ABB10000
|
trusted library allocation
|
page read and write
|
||
220B5B7D000
|
trusted library section
|
page read and write
|
||
7160003AC000
|
trusted library allocation
|
page read and write
|
||
7160002C0000
|
trusted library allocation
|
page read and write
|
||
7160001C8000
|
trusted library allocation
|
page read and write
|
||
716000C90000
|
trusted library allocation
|
page read and write
|
||
18D000890000
|
trusted library allocation
|
page read and write
|
||
630800270000
|
direct allocation
|
page read and write
|
||
18D000288000
|
trusted library allocation
|
page read and write
|
||
56325FE000
|
unkown
|
page readonly
|
||
7160001A0000
|
trusted library allocation
|
page read and write
|
||
716000E4C000
|
trusted library allocation
|
page read and write
|
||
3087000
|
heap
|
page read and write
|
||
716001080000
|
trusted library allocation
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
7160000EC000
|
trusted library allocation
|
page read and write
|
||
5631DFE000
|
stack
|
page read and write
|
||
562DDFE000
|
stack
|
page read and write
|
||
519C002BC000
|
trusted library allocation
|
page read and write
|
||
716000CF4000
|
trusted library allocation
|
page read and write
|
||
716000974000
|
trusted library allocation
|
page read and write
|
||
91C000
|
stack
|
page read and write
|
||
220AF749000
|
heap
|
page read and write
|
||
18D0008F0000
|
trusted library allocation
|
page read and write
|
||
716000498000
|
trusted library allocation
|
page read and write
|
||
3083000
|
heap
|
page read and write
|
||
716000FDC000
|
trusted library allocation
|
page read and write
|
||
716000230000
|
trusted library allocation
|
page read and write
|
||
71600006A000
|
trusted library allocation
|
page read and write
|
||
18D0008C8000
|
trusted library allocation
|
page read and write
|
||
6308002A8000
|
direct allocation
|
page read and write
|
||
3135000
|
heap
|
page read and write
|
||
5634DFC000
|
stack
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
220AF722000
|
heap
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
76C000
|
unkown
|
page readonly
|
||
71600027C000
|
trusted library allocation
|
page read and write
|
||
716000A0C000
|
trusted library allocation
|
page read and write
|
||
220B61C0000
|
trusted library section
|
page read and write
|
||
7160002B4000
|
trusted library allocation
|
page read and write
|
||
18D00020C000
|
trusted library allocation
|
page read and write
|
||
63080024C000
|
direct allocation
|
page read and write
|
||
5638DFC000
|
stack
|
page read and write
|
||
18D0006C8000
|
trusted library allocation
|
page read and write
|
||
716000FCC000
|
trusted library allocation
|
page read and write
|
||
220AF1D3000
|
heap
|
page read and write
|
||
716000E28000
|
trusted library allocation
|
page read and write
|
||
630800294000
|
direct allocation
|
page read and write
|
||
519C00248000
|
trusted library allocation
|
page read and write
|
||
308C000
|
heap
|
page read and write
|
||
71600020C000
|
trusted library allocation
|
page read and write
|
||
716000E5C000
|
trusted library allocation
|
page read and write
|
||
630800215000
|
direct allocation
|
page read and write
|
||
716000EE8000
|
trusted library allocation
|
page read and write
|
||
220AF1E0000
|
heap
|
page read and write
|
||
7160006F4000
|
trusted library allocation
|
page read and write
|
||
716000E84000
|
trusted library allocation
|
page read and write
|
||
31F8000
|
heap
|
page read and write
|
||
716000EF8000
|
trusted library allocation
|
page read and write
|
||
716001090000
|
trusted library allocation
|
page read and write
|
||
7160006D7000
|
trusted library allocation
|
page read and write
|
||
716000290000
|
trusted library allocation
|
page read and write
|
||
716000AB4000
|
trusted library allocation
|
page read and write
|
||
318A000
|
heap
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
220AF1DC000
|
heap
|
page read and write
|
||
56295FE000
|
unkown
|
page readonly
|
||
716000FE8000
|
trusted library allocation
|
page read and write
|
||
716000FC5000
|
trusted library allocation
|
page read and write
|
||
716000F10000
|
trusted library allocation
|
page read and write
|
||
18D000948000
|
trusted library allocation
|
page read and write
|
||
56405FE000
|
unkown
|
page readonly
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
220B5022000
|
heap
|
page read and write
|
||
6C840000
|
unkown
|
page readonly
|
||
71600034C000
|
trusted library allocation
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
7160006D9000
|
trusted library allocation
|
page read and write
|
||
18D000960000
|
trusted library allocation
|
page read and write
|
||
7160001EC000
|
trusted library allocation
|
page read and write
|
||
220AF74B000
|
heap
|
page read and write
|
||
220B5C70000
|
trusted library section
|
page read and write
|
||
3082000
|
heap
|
page read and write
|
||
716001001000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
heap
|
page read and write
|
||
716000CA0000
|
trusted library allocation
|
page read and write
|
||
5628DFB000
|
stack
|
page read and write
|
||
56455FE000
|
unkown
|
page readonly
|
||
6308002D0000
|
direct allocation
|
page read and write
|
||
220AF731000
|
heap
|
page read and write
|
||
71600060C000
|
trusted library allocation
|
page read and write
|
||
220B57EC000
|
trusted library section
|
page read and write
|
||
519C0020C000
|
trusted library allocation
|
page read and write
|
||
716000A01000
|
trusted library allocation
|
page read and write
|
||
7160005F4000
|
trusted library allocation
|
page read and write
|
||
716000C90000
|
trusted library allocation
|
page read and write
|
||
220B5212000
|
trusted library section
|
page read and write
|
||
220B5C7E000
|
trusted library section
|
page read and write
|
||
716000194000
|
trusted library allocation
|
page read and write
|
||
71600038C000
|
trusted library allocation
|
page read and write
|
||
716000294000
|
trusted library allocation
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
519C002C0000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
71600016C000
|
trusted library allocation
|
page read and write
|
||
71600099C000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
220B5350000
|
trusted library section
|
page read and write
|
||
220AF1B0000
|
heap
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
56275FE000
|
unkown
|
page readonly
|
||
716000214000
|
trusted library allocation
|
page read and write
|
||
7160001AC000
|
trusted library allocation
|
page read and write
|
||
7160012A8000
|
trusted library allocation
|
page read and write
|
||
716001170000
|
trusted library allocation
|
page read and write
|
||
5623DFB000
|
stack
|
page read and write
|
||
716000E90000
|
trusted library allocation
|
page read and write
|
||
519C002B0000
|
trusted library allocation
|
page read and write
|
||
3332000
|
heap
|
page read and write
|
||
716000F64000
|
trusted library allocation
|
page read and write
|
||
220AF5D0000
|
trusted library section
|
page read and write
|
||
716000358000
|
trusted library allocation
|
page read and write
|
||
7160008D8000
|
trusted library allocation
|
page read and write
|
||
3259000
|
heap
|
page read and write
|
||
7160012B4000
|
trusted library allocation
|
page read and write
|
||
220ABBFB000
|
heap
|
page read and write
|
||
6C968000
|
unkown
|
page readonly
|
||
60F000
|
unkown
|
page write copy
|
||
716001018000
|
trusted library allocation
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
716000DF4000
|
trusted library allocation
|
page read and write
|
||
56445FE000
|
unkown
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
220AF1E1000
|
heap
|
page read and write
|
||
220ABC01000
|
heap
|
page read and write
|
||
220AF1CF000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
716000ECF000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
220B5B72000
|
trusted library section
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
519C00294000
|
trusted library allocation
|
page read and write
|
||
18D0002FC000
|
trusted library allocation
|
page read and write
|
||
564B5FE000
|
unkown
|
page readonly
|
||
7160000DC000
|
trusted library allocation
|
page read and write
|
||
18D000830000
|
trusted library allocation
|
page read and write
|
||
716000D80000
|
trusted library allocation
|
page read and write
|
||
18D0007BC000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
heap
|
page read and write
|
||
519C00220000
|
trusted library allocation
|
page read and write
|
||
563C5FE000
|
unkown
|
page readonly
|
||
31D5000
|
heap
|
page read and write
|
||
220ABC35000
|
heap
|
page read and write
|
||
7160007E4000
|
trusted library allocation
|
page read and write
|
||
7160009E8000
|
trusted library allocation
|
page read and write
|
||
5640DFE000
|
stack
|
page read and write
|
||
220B5FC0000
|
trusted library section
|
page read and write
|
||
7160010AC000
|
trusted library allocation
|
page read and write
|
||
716000FC1000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
519C00278000
|
trusted library allocation
|
page read and write
|
||
71600034C000
|
trusted library allocation
|
page read and write
|
||
325D000
|
stack
|
page read and write
|
||
5637DFD000
|
stack
|
page read and write
|
||
220B5A30000
|
trusted library section
|
page read and write
|
||
18D0008E4000
|
trusted library allocation
|
page read and write
|
||
7160010F4000
|
trusted library allocation
|
page read and write
|
||
56485FE000
|
unkown
|
page readonly
|
||
7160000B4000
|
trusted library allocation
|
page read and write
|
||
716000F10000
|
trusted library allocation
|
page read and write
|
||
18D0007D4000
|
trusted library allocation
|
page read and write
|
||
18D0006F4000
|
trusted library allocation
|
page read and write
|
||
716001048000
|
trusted library allocation
|
page read and write
|
||
716000D8C000
|
trusted library allocation
|
page read and write
|
||
716000364000
|
trusted library allocation
|
page read and write
|
||
716000DBC000
|
trusted library allocation
|
page read and write
|
||
716001154000
|
trusted library allocation
|
page read and write
|
||
18D00078C000
|
trusted library allocation
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
220ABBDC000
|
heap
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
7160002E7000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page readonly
|
||
56305FE000
|
unkown
|
page readonly
|
||
563A5FE000
|
unkown
|
page readonly
|
||
7160010E8000
|
trusted library allocation
|
page read and write
|
||
220AF76D000
|
heap
|
page read and write
|
||
5642DFE000
|
stack
|
page read and write
|
||
716000F38000
|
trusted library allocation
|
page read and write
|
||
3087000
|
heap
|
page read and write
|
||
18D0006AC000
|
trusted library allocation
|
page read and write
|
||
3083000
|
heap
|
page read and write
|
||
3085000
|
heap
|
page read and write
|
||
31C1000
|
heap
|
page read and write
|
||
3124000
|
heap
|
page read and write
|
||
716000FA4000
|
trusted library allocation
|
page read and write
|
||
716000F80000
|
trusted library allocation
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
41000
|
unkown
|
page execute read
|
||
18D00039C000
|
trusted library allocation
|
page read and write
|
||
7160001AC000
|
trusted library allocation
|
page read and write
|
||
716000854000
|
trusted library allocation
|
page read and write
|
||
71600092C000
|
trusted library allocation
|
page read and write
|
||
71600059C000
|
trusted library allocation
|
page read and write
|
||
7160001AC000
|
trusted library allocation
|
page read and write
|
||
56475FE000
|
unkown
|
page readonly
|
||
716000EB4000
|
trusted library allocation
|
page read and write
|
||
562BDFE000
|
stack
|
page read and write
|
||
562FDFA000
|
stack
|
page read and write
|
||
7160000FC000
|
trusted library allocation
|
page read and write
|
||
18D00070C000
|
trusted library allocation
|
page read and write
|
||
7160001E8000
|
trusted library allocation
|
page read and write
|
||
716000118000
|
trusted library allocation
|
page read and write
|
||
18D0007E4000
|
trusted library allocation
|
page read and write
|
||
18D000250000
|
trusted library allocation
|
page read and write
|
||
519C00288000
|
trusted library allocation
|
page read and write
|
||
519C00201000
|
trusted library allocation
|
page read and write
|
||
716000C90000
|
trusted library allocation
|
page read and write
|
||
716000B78000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
71600034C000
|
trusted library allocation
|
page read and write
|
||
563F5FE000
|
unkown
|
page readonly
|
||
18D0007C0000
|
trusted library allocation
|
page read and write
|
||
7160001D4000
|
trusted library allocation
|
page read and write
|
||
18D000844000
|
trusted library allocation
|
page read and write
|
||
716001058000
|
trusted library allocation
|
page read and write
|
||
18D000238000
|
trusted library allocation
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
716000398000
|
trusted library allocation
|
page read and write
|
||
220AF960000
|
trusted library section
|
page read and write
|
||
716000D6C000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
heap
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
220B5AB3000
|
trusted library section
|
page read and write
|
||
329A000
|
stack
|
page read and write
|
||
716000ED8000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
heap
|
page read and write
|
||
716000298000
|
trusted library allocation
|
page read and write
|
||
716000518000
|
trusted library allocation
|
page read and write
|
||
220B5000000
|
heap
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
716000F70000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
716000E01000
|
trusted library allocation
|
page read and write
|
||
31F2000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
716000C88000
|
trusted library allocation
|
page read and write
|
||
220ABD80000
|
trusted library section
|
page readonly
|
||
308A000
|
heap
|
page read and write
|
||
220B5A4E000
|
trusted library section
|
page read and write
|
||
630800210000
|
direct allocation
|
page read and write
|
||
716000A3C000
|
trusted library allocation
|
page read and write
|
||
716000C78000
|
trusted library allocation
|
page read and write
|
||
18D000201000
|
trusted library allocation
|
page read and write
|
||
7160006E0000
|
trusted library allocation
|
page read and write
|
||
18D00087C000
|
trusted library allocation
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
18D0002D4000
|
trusted library allocation
|
page read and write
|
||
5635DFA000
|
stack
|
page read and write
|
||
220B3882000
|
trusted library allocation
|
page read and write
|
||
716000AE0000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
unkown
|
page read and write
|
||
7160006C0000
|
trusted library allocation
|
page read and write
|
There are 924 hidden memdumps, click here to show them.