Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
oRu3cWBChq.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_oRu3cWBChq.exe_da7bbdf090bef74ee177dbaed143b999951e7c_fb6c3755_5a622457-cb16-49f3-a0ed-c4970ffb2239\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11D2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Oct 29 13:08:30 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1388.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13C8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FebhmzvlXmYcFFIxCzuX.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\oRu3cWBChq.exe
|
"C:\Users\user\Desktop\oRu3cWBChq.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2308,i,8530634217441217944,11485973606428198520,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5628 -s 1600
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://home.fivejo5vt.top/zViguzTHOAJchzMFSLOa1730123672
|
109.207.173.223
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj$b
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
http://home.fivejo5vt.top/zViguzTHOAJchzMFSLOa17
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
||
http://issuetracker.google.com/200067929
|
unknown
|
||
https://lens.google.com/v3/2
|
unknown
|
||
https://anglebug.com/7847
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivejo5vt.top
|
109.207.173.223
|
||
fivejo5vt.top
|
109.207.173.223
|
||
www.google.com
|
142.250.186.68
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
109.207.173.223
|
home.fivejo5vt.top
|
Russian Federation
|
||
142.250.186.68
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
ProgramId
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
FileId
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
LongPathHash
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Name
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
OriginalFileName
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Publisher
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Version
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
BinFileVersion
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
BinaryType
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
ProductName
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
ProductVersion
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
LinkDate
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
BinProductVersion
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
AppxPackageFullName
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Size
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Language
|
||
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AB400C34000
|
trusted library allocation
|
page read and write
|
||
1C803134000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400670000
|
trusted library allocation
|
page read and write
|
||
AB4009F4000
|
trusted library allocation
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
32969FE000
|
unkown
|
page readonly
|
||
1C803132000
|
heap
|
page read and write
|
||
32B71FC000
|
stack
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB400C3C000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
329B1FD000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
AB4002F3000
|
trusted library allocation
|
page read and write
|
||
62240040C000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB4008E8000
|
trusted library allocation
|
page read and write
|
||
1C80313B000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
6224006AC000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
32911FB000
|
stack
|
page read and write
|
||
1C803100000
|
heap
|
page read and write
|
||
1C8036B5000
|
heap
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
3E51000
|
heap
|
page read and write
|
||
3F2D000
|
heap
|
page read and write
|
||
AB400268000
|
trusted library allocation
|
page read and write
|
||
3EBC000
|
heap
|
page read and write
|
||
AB4006D4000
|
trusted library allocation
|
page read and write
|
||
3FF8000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
3EAB000
|
heap
|
page read and write
|
||
1C80A06D000
|
trusted library section
|
page read and write
|
||
1C875D80000
|
trusted library allocation
|
page read and write
|
||
AB400D14000
|
trusted library allocation
|
page read and write
|
||
AB400EBA000
|
trusted library allocation
|
page read and write
|
||
3D7E000
|
heap
|
page read and write
|
||
6224002B0000
|
trusted library allocation
|
page read and write
|
||
32901FD000
|
stack
|
page read and write
|
||
3DF4000
|
heap
|
page read and write
|
||
32B29FE000
|
unkown
|
page readonly
|
||
1C803132000
|
heap
|
page read and write
|
||
622400704000
|
trusted library allocation
|
page read and write
|
||
AB4009DC000
|
trusted library allocation
|
page read and write
|
||
AB400A0C000
|
trusted library allocation
|
page read and write
|
||
1C809F3E000
|
trusted library section
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
3C56000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80314E000
|
heap
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
1908002D8000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1C80362F000
|
heap
|
page read and write
|
||
1908002F8000
|
trusted library allocation
|
page read and write
|
||
190800248000
|
trusted library allocation
|
page read and write
|
||
AB4004AC000
|
trusted library allocation
|
page read and write
|
||
3E1C000
|
heap
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
328E9FE000
|
unkown
|
page readonly
|
||
1C803132000
|
heap
|
page read and write
|
||
AB4009B8000
|
trusted library allocation
|
page read and write
|
||
AB400218000
|
trusted library allocation
|
page read and write
|
||
1C809190000
|
heap
|
page read and write
|
||
AB40099C000
|
trusted library allocation
|
page read and write
|
||
AB400E78000
|
trusted library allocation
|
page read and write
|
||
32931FE000
|
stack
|
page read and write
|
||
441800260000
|
direct allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
622400354000
|
trusted library allocation
|
page read and write
|
||
AB400FDC000
|
trusted library allocation
|
page read and write
|
||
32B69FE000
|
unkown
|
page readonly
|
||
622400201000
|
trusted library allocation
|
page read and write
|
||
6224003EC000
|
trusted library allocation
|
page read and write
|
||
AB400A30000
|
trusted library allocation
|
page read and write
|
||
1C875D60000
|
heap
|
page read and write
|
||
32B89FE000
|
unkown
|
page readonly
|
||
1980000
|
heap
|
page read and write
|
||
3C5C000
|
heap
|
page read and write
|
||
AB4005B8000
|
trusted library allocation
|
page read and write
|
||
AB400CFC000
|
trusted library allocation
|
page read and write
|
||
1C803150000
|
heap
|
page read and write
|
||
622400630000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
AB400124000
|
trusted library allocation
|
page read and write
|
||
6C3E9000
|
unkown
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C80315A000
|
heap
|
page read and write
|
||
18A5000
|
heap
|
page read and write
|
||
AB4007C4000
|
trusted library allocation
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400D80000
|
trusted library allocation
|
page read and write
|
||
32971FA000
|
stack
|
page read and write
|
||
AB400380000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
AB400EF4000
|
trusted library allocation
|
page read and write
|
||
AB400412000
|
trusted library allocation
|
page read and write
|
||
AB40020C000
|
trusted library allocation
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
1C8018D0000
|
trusted library section
|
page readonly
|
||
AB400AD8000
|
trusted library allocation
|
page read and write
|
||
62240035C000
|
trusted library allocation
|
page read and write
|
||
AB4001E0000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803159000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
3C55000
|
heap
|
page read and write
|
||
AB400CEC000
|
trusted library allocation
|
page read and write
|
||
AB400378000
|
trusted library allocation
|
page read and write
|
||
AB4002B8000
|
trusted library allocation
|
page read and write
|
||
1C809F80000
|
trusted library section
|
page read and write
|
||
1908002A0000
|
trusted library allocation
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
AB400201000
|
trusted library allocation
|
page read and write
|
||
6C39F000
|
unkown
|
page readonly
|
||
AB400764000
|
trusted library allocation
|
page read and write
|
||
1C8036D5000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
32B61FA000
|
stack
|
page read and write
|
||
AB400B48000
|
trusted library allocation
|
page read and write
|
||
190800274000
|
trusted library allocation
|
page read and write
|
||
328A1EF000
|
stack
|
page read and write
|
||
32AE1FE000
|
stack
|
page read and write
|
||
441800284000
|
direct allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
441800201000
|
direct allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB40021C000
|
trusted library allocation
|
page read and write
|
||
1C801983000
|
heap
|
page read and write
|
||
1C80314C000
|
heap
|
page read and write
|
||
622400754000
|
trusted library allocation
|
page read and write
|
||
18A4000
|
heap
|
page read and write
|
||
1908002A0000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB40079B000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
unkown
|
page write copy
|
||
AB40001C000
|
trusted library allocation
|
page read and write
|
||
DA000
|
stack
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C8036B5000
|
heap
|
page read and write
|
||
32A69FE000
|
unkown
|
page readonly
|
||
44180023C000
|
direct allocation
|
page read and write
|
||
441800215000
|
direct allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
622400210000
|
trusted library allocation
|
page read and write
|
||
AB400E50000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
AB4001B4000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
198A000
|
heap
|
page read and write
|
||
1C803140000
|
heap
|
page read and write
|
||
AB4002B4000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
3C57000
|
heap
|
page read and write
|
||
AB400340000
|
trusted library allocation
|
page read and write
|
||
AB4000EC000
|
trusted library allocation
|
page read and write
|
||
1C80A046000
|
trusted library section
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
3E30000
|
heap
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803158000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400F70000
|
trusted library allocation
|
page read and write
|
||
3DBA000
|
heap
|
page read and write
|
||
AB400210000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
441800303000
|
direct allocation
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
1C803130000
|
heap
|
page read and write
|
||
622400310000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
4418002EC000
|
direct allocation
|
page read and write
|
||
32A39FE000
|
unkown
|
page readonly
|
||
62240035C000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C809270000
|
heap
|
page read and write
|
||
1C803645000
|
heap
|
page read and write
|
||
AB4001A0000
|
trusted library allocation
|
page read and write
|
||
AB400CA4000
|
trusted library allocation
|
page read and write
|
||
32919FE000
|
unkown
|
page readonly
|
||
1C875CD7000
|
heap
|
page read and write
|
||
AB400900000
|
trusted library allocation
|
page read and write
|
||
622400248000
|
trusted library allocation
|
page read and write
|
||
1C8036D9000
|
heap
|
page read and write
|
||
1C803134000
|
heap
|
page read and write
|
||
6224007CC000
|
trusted library allocation
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
1C80314C000
|
heap
|
page read and write
|
||
AB400C01000
|
trusted library allocation
|
page read and write
|
||
1C803146000
|
heap
|
page read and write
|
||
AB400D34000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
4418002AC000
|
direct allocation
|
page read and write
|
||
3C5D000
|
heap
|
page read and write
|
||
622400408000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4001E4000
|
trusted library allocation
|
page read and write
|
||
32A31FC000
|
stack
|
page read and write
|
||
AB4004EC000
|
trusted library allocation
|
page read and write
|
||
3E24000
|
heap
|
page read and write
|
||
622400698000
|
trusted library allocation
|
page read and write
|
||
1C80368E000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400228000
|
trusted library allocation
|
page read and write
|
||
1C807352000
|
trusted library allocation
|
page read and write
|
||
AB400A68000
|
trusted library allocation
|
page read and write
|
||
18A8000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1518000
|
unkown
|
page readonly
|
||
1C80312C000
|
heap
|
page read and write
|
||
1908002C8000
|
trusted library allocation
|
page read and write
|
||
AB400078000
|
trusted library allocation
|
page read and write
|
||
441800234000
|
direct allocation
|
page read and write
|
||
329C1FE000
|
stack
|
page read and write
|
||
1C803621000
|
heap
|
page read and write
|
||
32AB9FE000
|
unkown
|
page readonly
|
||
1C80312C000
|
heap
|
page read and write
|
||
6224002C4000
|
trusted library allocation
|
page read and write
|
||
1908002C0000
|
trusted library allocation
|
page read and write
|
||
3DD3000
|
heap
|
page read and write
|
||
AB400C38000
|
trusted library allocation
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
622400640000
|
trusted library allocation
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
622400724000
|
trusted library allocation
|
page read and write
|
||
1C8036B6000
|
heap
|
page read and write
|
||
622400620000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB400E84000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
441800230000
|
direct allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
AB400E98000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
32A19FE000
|
unkown
|
page readonly
|
||
1C80312C000
|
heap
|
page read and write
|
||
32A61FC000
|
stack
|
page read and write
|
||
32A29FE000
|
unkown
|
page readonly
|
||
AB4000FC000
|
trusted library allocation
|
page read and write
|
||
32949FE000
|
unkown
|
page readonly
|
||
6224002F2000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
622400770000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
32B19FE000
|
unkown
|
page readonly
|
||
AB400390000
|
trusted library allocation
|
page read and write
|
||
32AD1FE000
|
stack
|
page read and write
|
||
1C80313D000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
62240078C000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
190800264000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
1C803150000
|
heap
|
page read and write
|
||
AB400CEC000
|
trusted library allocation
|
page read and write
|
||
AB400D4C000
|
trusted library allocation
|
page read and write
|
||
622400644000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
622400744000
|
trusted library allocation
|
page read and write
|
||
3E5F000
|
heap
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
32A99FE000
|
unkown
|
page readonly
|
||
1C8035B0000
|
trusted library section
|
page read and write
|
||
32959FE000
|
unkown
|
page readonly
|
||
32A89FE000
|
unkown
|
page readonly
|
||
1C875C40000
|
heap
|
page read and write
|
||
32B79FE000
|
unkown
|
page readonly
|
||
622400760000
|
trusted library allocation
|
page read and write
|
||
62240080C000
|
trusted library allocation
|
page read and write
|
||
AB40022C000
|
trusted library allocation
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4002A8000
|
trusted library allocation
|
page read and write
|
||
AB400E60000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
32941FB000
|
stack
|
page read and write
|
||
AB4000B4000
|
trusted library allocation
|
page read and write
|
||
AB400788000
|
trusted library allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
1C803672000
|
heap
|
page read and write
|
||
1C803158000
|
heap
|
page read and write
|
||
AB400C0C000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
3C5A000
|
heap
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
1C803146000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
441800290000
|
direct allocation
|
page read and write
|
||
AB400EBC000
|
trusted library allocation
|
page read and write
|
||
6224006F0000
|
trusted library allocation
|
page read and write
|
||
1C80313D000
|
heap
|
page read and write
|
||
62240033C000
|
trusted library allocation
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
3D61000
|
heap
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
3C56000
|
heap
|
page read and write
|
||
AB400708000
|
trusted library allocation
|
page read and write
|
||
622400430000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
190800235000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
622400348000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400A40000
|
trusted library allocation
|
page read and write
|
||
AB400BDC000
|
trusted library allocation
|
page read and write
|
||
1C875D90000
|
trusted library allocation
|
page read and write
|
||
1C80368D000
|
heap
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
3C58000
|
heap
|
page read and write
|
||
AB400EE4000
|
trusted library allocation
|
page read and write
|
||
1C809C30000
|
trusted library section
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
AB4001AC000
|
trusted library allocation
|
page read and write
|
||
3F6C000
|
heap
|
page read and write
|
||
1C809C17000
|
unclassified section
|
page read and write
|
||
AB400690000
|
trusted library allocation
|
page read and write
|
||
1C803300000
|
heap
|
page read and write
|
||
AB400310000
|
trusted library allocation
|
page read and write
|
||
AB4001AC000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C8036AB000
|
heap
|
page read and write
|
||
AB4000AC000
|
trusted library allocation
|
page read and write
|
||
6224006D0000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
32B11FE000
|
stack
|
page read and write
|
||
622400714000
|
trusted library allocation
|
page read and write
|
||
AB400F58000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803144000
|
heap
|
page read and write
|
||
622400601000
|
trusted library allocation
|
page read and write
|
||
AB400E70000
|
trusted library allocation
|
page read and write
|
||
622400368000
|
trusted library allocation
|
page read and write
|
||
1651000
|
unkown
|
page readonly
|
||
BBE000
|
heap
|
page read and write
|
||
1989000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4003EC000
|
trusted library allocation
|
page read and write
|
||
622400320000
|
trusted library allocation
|
page read and write
|
||
32B09FE000
|
unkown
|
page readonly
|
||
3C5D000
|
heap
|
page read and write
|
||
622400354000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400884000
|
trusted library allocation
|
page read and write
|
||
AB400BC4000
|
trusted library allocation
|
page read and write
|
||
AB400F34000
|
trusted library allocation
|
page read and write
|
||
AB4001D8000
|
trusted library allocation
|
page read and write
|
||
AB400E34000
|
trusted library allocation
|
page read and write
|
||
622400418000
|
trusted library allocation
|
page read and write
|
||
198C000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4002AC000
|
trusted library allocation
|
page read and write
|
||
622400730000
|
trusted library allocation
|
page read and write
|
||
AB40020C000
|
trusted library allocation
|
page read and write
|
||
1908002B0000
|
trusted library allocation
|
page read and write
|
||
190800288000
|
trusted library allocation
|
page read and write
|
||
6224007B4000
|
trusted library allocation
|
page read and write
|
||
AB40050A000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
183F000
|
stack
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
AB4006A0000
|
trusted library allocation
|
page read and write
|
||
AB400354000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
3C59000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
AB400290000
|
trusted library allocation
|
page read and write
|
||
AB400C5C000
|
trusted library allocation
|
page read and write
|
||
1C80314C000
|
heap
|
page read and write
|
||
AB40015C000
|
trusted library allocation
|
page read and write
|
||
328C1FF000
|
stack
|
page read and write
|
||
1C80314D000
|
heap
|
page read and write
|
||
1C875CFE000
|
heap
|
page read and write
|
||
6224006E0000
|
trusted library allocation
|
page read and write
|
||
1908002C0000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
32A91FC000
|
stack
|
page read and write
|
||
622400424000
|
trusted library allocation
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
6224006E4000
|
trusted library allocation
|
page read and write
|
||
3DDB000
|
heap
|
page read and write
|
||
32B21FE000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
AB4003EC000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
6224002EC000
|
trusted library allocation
|
page read and write
|
||
AB40065C000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
AB4007E0000
|
trusted library allocation
|
page read and write
|
||
3C5A000
|
heap
|
page read and write
|
||
3E38000
|
heap
|
page read and write
|
||
AB4007A0000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
32B99FE000
|
unkown
|
page readonly
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803156000
|
heap
|
page read and write
|
||
AB400AFC000
|
trusted library allocation
|
page read and write
|
||
AB400770000
|
trusted library allocation
|
page read and write
|
||
32AE9FE000
|
unkown
|
page readonly
|
||
622400758000
|
trusted library allocation
|
page read and write
|
||
622400248000
|
trusted library allocation
|
page read and write
|
||
3C5D000
|
heap
|
page read and write
|
||
622400320000
|
trusted library allocation
|
page read and write
|
||
622400320000
|
trusted library allocation
|
page read and write
|
||
3C5B000
|
heap
|
page read and write
|
||
AB400794000
|
trusted library allocation
|
page read and write
|
||
AB400B18000
|
trusted library allocation
|
page read and write
|
||
1C80313A000
|
heap
|
page read and write
|
||
1C803150000
|
heap
|
page read and write
|
||
62240033C000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
unkown
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
1C803628000
|
heap
|
page read and write
|
||
AB4001E8000
|
trusted library allocation
|
page read and write
|
||
AB400FBC000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
heap
|
page read and write
|
||
6224002CC000
|
trusted library allocation
|
page read and write
|
||
AB400505000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB400B38000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
19080020C000
|
trusted library allocation
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
329A9FE000
|
unkown
|
page readonly
|
||
AB40063C000
|
trusted library allocation
|
page read and write
|
||
AB4002C4000
|
trusted library allocation
|
page read and write
|
||
1C8036AB000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
328D9FE000
|
unkown
|
page readonly
|
||
AB4004E0000
|
trusted library allocation
|
page read and write
|
||
AB4001D0000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
AB400DE0000
|
trusted library allocation
|
page read and write
|
||
18A8000
|
heap
|
page read and write
|
||
AB400304000
|
trusted library allocation
|
page read and write
|
||
32AC9FE000
|
unkown
|
page readonly
|
||
F60000
|
heap
|
page read and write
|
||
32999FE000
|
unkown
|
page readonly
|
||
328F1FE000
|
stack
|
page read and write
|
||
1C809F70000
|
trusted library section
|
page read and write
|
||
1C807334000
|
trusted library allocation
|
page read and write
|
||
1C809F32000
|
trusted library section
|
page read and write
|
||
4056000
|
heap
|
page read and write
|
||
AB400CA0000
|
trusted library allocation
|
page read and write
|
||
AB4009A8000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803134000
|
heap
|
page read and write
|
||
1908002C0000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB40080C000
|
trusted library allocation
|
page read and write
|
||
1C803158000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1C8036B5000
|
heap
|
page read and write
|
||
1C80365D000
|
heap
|
page read and write
|
||
1C809157000
|
unclassified section
|
page read and write
|
||
1C8058A0000
|
trusted library section
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
3C52000
|
heap
|
page read and write
|
||
622400658000
|
trusted library allocation
|
page read and write
|
||
AB400BA4000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
190800260000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
3C57000
|
heap
|
page read and write
|
||
AB40100C000
|
trusted library allocation
|
page read and write
|
||
190800278000
|
trusted library allocation
|
page read and write
|
||
AB40018C000
|
trusted library allocation
|
page read and write
|
||
3C5D000
|
heap
|
page read and write
|
||
622400668000
|
trusted library allocation
|
page read and write
|
||
6224006B0000
|
trusted library allocation
|
page read and write
|
||
329F9FE000
|
unkown
|
page readonly
|
||
1C803137000
|
heap
|
page read and write
|
||
32981FE000
|
stack
|
page read and write
|
||
AB400584000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
3DB4000
|
heap
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
AB4002B8000
|
trusted library allocation
|
page read and write
|
||
AB400724000
|
trusted library allocation
|
page read and write
|
||
1C8091A7000
|
unclassified section
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400E5C000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1908002F0000
|
trusted library allocation
|
page read and write
|
||
AB400B2C000
|
trusted library allocation
|
page read and write
|
||
AB400060000
|
trusted library allocation
|
page read and write
|
||
1C875C20000
|
heap
|
page readonly
|
||
AB400E0C000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB400D04000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803146000
|
heap
|
page read and write
|
||
AB4002AE000
|
trusted library allocation
|
page read and write
|
||
329D9FE000
|
unkown
|
page readonly
|
||
AB4002F0000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB40067C000
|
trusted library allocation
|
page read and write
|
||
AB400A94000
|
trusted library allocation
|
page read and write
|
||
AB4002A8000
|
trusted library allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
441800210000
|
direct allocation
|
page read and write
|
||
AB4002C4000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
329F1FE000
|
stack
|
page read and write
|
||
3E1D000
|
heap
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
AB400CD4000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80A0A0000
|
trusted library section
|
page read and write
|
||
6C3EC000
|
unkown
|
page readonly
|
||
1908002A0000
|
trusted library allocation
|
page read and write
|
||
1C8023D0000
|
unkown
|
page read and write
|
||
1C803161000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C8098F0000
|
trusted library section
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803158000
|
heap
|
page read and write
|
||
4418002A8000
|
direct allocation
|
page read and write
|
||
AB4000A0000
|
trusted library allocation
|
page read and write
|
||
AB4001DC000
|
trusted library allocation
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
AB4003A4000
|
trusted library allocation
|
page read and write
|
||
622400404000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB40036C000
|
trusted library allocation
|
page read and write
|
||
441800250000
|
direct allocation
|
page read and write
|
||
AB400B90000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
unkown
|
page write copy
|
||
1C8096A0000
|
trusted library section
|
page read and write
|
||
AB400BE8000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
heap
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C80A0FE000
|
trusted library section
|
page read and write
|
||
62240020C000
|
trusted library allocation
|
page read and write
|
||
3C5D000
|
heap
|
page read and write
|
||
AB4004A4000
|
trusted library allocation
|
page read and write
|
||
6224002B8000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
328F9FE000
|
unkown
|
page readonly
|
||
622400288000
|
trusted library allocation
|
page read and write
|
||
1C803150000
|
heap
|
page read and write
|
||
AB4001EC000
|
trusted library allocation
|
page read and write
|
||
AB400134000
|
trusted library allocation
|
page read and write
|
||
AB400198000
|
trusted library allocation
|
page read and write
|
||
622400654000
|
trusted library allocation
|
page read and write
|
||
3C54000
|
heap
|
page read and write
|
||
1C875D40000
|
heap
|
page read and write
|
||
AB400214000
|
trusted library allocation
|
page read and write
|
||
32989FE000
|
unkown
|
page readonly
|
||
AB400ED4000
|
trusted library allocation
|
page read and write
|
||
441800280000
|
direct allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803150000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
32B41FE000
|
stack
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400F48000
|
trusted library allocation
|
page read and write
|
||
AB400D9C000
|
trusted library allocation
|
page read and write
|
||
32AA9FE000
|
unkown
|
page readonly
|
||
190800238000
|
trusted library allocation
|
page read and write
|
||
402D000
|
heap
|
page read and write
|
||
3C52000
|
heap
|
page read and write
|
||
1C803600000
|
heap
|
page read and write
|
||
6224006CC000
|
trusted library allocation
|
page read and write
|
||
1C80363A000
|
heap
|
page read and write
|
||
AB400B88000
|
trusted library allocation
|
page read and write
|
||
329B9FE000
|
unkown
|
page readonly
|
||
AB400F24000
|
trusted library allocation
|
page read and write
|
||
AB400C4C000
|
trusted library allocation
|
page read and write
|
||
AB400ABC000
|
trusted library allocation
|
page read and write
|
||
1908002E4000
|
trusted library allocation
|
page read and write
|
||
AB400488000
|
trusted library allocation
|
page read and write
|
||
1908002C0000
|
trusted library allocation
|
page read and write
|
||
AB400001000
|
trusted library allocation
|
page read and write
|
||
32AF1FE000
|
stack
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1908002B0000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
622400684000
|
trusted library allocation
|
page read and write
|
||
3DA4000
|
heap
|
page read and write
|
||
622400718000
|
trusted library allocation
|
page read and write
|
||
AB4006F8000
|
trusted library allocation
|
page read and write
|
||
1C803146000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
3E7F000
|
heap
|
page read and write
|
||
32B91FE000
|
stack
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
AB400390000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
AB40017C000
|
trusted library allocation
|
page read and write
|
||
AB400354000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
1C80314B000
|
heap
|
page read and write
|
||
3C57000
|
heap
|
page read and write
|
||
166B000
|
unkown
|
page readonly
|
||
1C803132000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
32A59FE000
|
unkown
|
page readonly
|
||
1CE000
|
unkown
|
page read and write
|
||
AB400E3C000
|
trusted library allocation
|
page read and write
|
||
190800220000
|
trusted library allocation
|
page read and write
|
||
1C80314A000
|
heap
|
page read and write
|
||
32961FD000
|
stack
|
page read and write
|
||
6224002FC000
|
trusted library allocation
|
page read and write
|
||
1C875B40000
|
heap
|
page read and write
|
||
AB400220000
|
trusted library allocation
|
page read and write
|
||
441800217000
|
direct allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
622400310000
|
trusted library allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
AB400DA8000
|
trusted library allocation
|
page read and write
|
||
AB400740000
|
trusted library allocation
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
AB4005A8000
|
trusted library allocation
|
page read and write
|
||
AB400F04000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C807A8B000
|
heap
|
page read and write
|
||
3D81000
|
heap
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
1C803700000
|
trusted library section
|
page read and write
|
||
32951FB000
|
stack
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803156000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400D24000
|
trusted library allocation
|
page read and write
|
||
AB4008B0000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
32B59FE000
|
unkown
|
page readonly
|
||
1C803645000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB40060C000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB4001F4000
|
trusted library allocation
|
page read and write
|
||
1908002A0000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
AB40091C000
|
trusted library allocation
|
page read and write
|
||
3E55000
|
heap
|
page read and write
|
||
1C803152000
|
heap
|
page read and write
|
||
198C000
|
heap
|
page read and write
|
||
AB400FC0000
|
trusted library allocation
|
page read and write
|
||
AB400360000
|
trusted library allocation
|
page read and write
|
||
1C80313C000
|
heap
|
page read and write
|
||
AB40034C000
|
trusted library allocation
|
page read and write
|
||
AB400098000
|
trusted library allocation
|
page read and write
|
||
32A81FB000
|
stack
|
page read and write
|
||
1908002C0000
|
trusted library allocation
|
page read and write
|
||
AB400CB4000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
441800270000
|
direct allocation
|
page read and write
|
||
AB400224000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400601000
|
trusted library allocation
|
page read and write
|
||
AB4005CC000
|
trusted library allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
AB400714000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB4007BB000
|
trusted library allocation
|
page read and write
|
||
1C8036C5000
|
heap
|
page read and write
|
||
AB400858000
|
trusted library allocation
|
page read and write
|
||
32AD9FE000
|
unkown
|
page readonly
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB4001C4000
|
trusted library allocation
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
1C8036A7000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
32B81FE000
|
stack
|
page read and write
|
||
6224007C8000
|
trusted library allocation
|
page read and write
|
||
1C875CDB000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
AB400650000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400ACC000
|
trusted library allocation
|
page read and write
|
||
441800274000
|
direct allocation
|
page read and write
|
||
AB4003EC000
|
trusted library allocation
|
page read and write
|
||
622400614000
|
trusted library allocation
|
page read and write
|
||
622400624000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
AB4001AC000
|
trusted library allocation
|
page read and write
|
||
62240060C000
|
trusted library allocation
|
page read and write
|
||
AB400418000
|
trusted library allocation
|
page read and write
|
||
622400610000
|
trusted library allocation
|
page read and write
|
||
1C809193000
|
heap
|
page read and write
|
||
AB400E6C000
|
trusted library allocation
|
page read and write
|
||
32AF9FE000
|
unkown
|
page readonly
|
||
AB40096C000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
AB400234000
|
trusted library allocation
|
page read and write
|
||
6C2C0000
|
unkown
|
page readonly
|
||
1C809F00000
|
trusted library section
|
page read and write
|
||
32929FE000
|
unkown
|
page readonly
|
||
1C803151000
|
heap
|
page read and write
|
||
622400788000
|
trusted library allocation
|
page read and write
|
||
622400330000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
32A51FC000
|
stack
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400230000
|
trusted library allocation
|
page read and write
|
||
622400401000
|
trusted library allocation
|
page read and write
|
||
AB400EB4000
|
trusted library allocation
|
page read and write
|
||
4418002DC000
|
direct allocation
|
page read and write
|
||
1C809F11000
|
trusted library section
|
page read and write
|
||
622400220000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400DC8000
|
trusted library allocation
|
page read and write
|
||
3C59000
|
heap
|
page read and write
|
||
1C801980000
|
heap
|
page read and write
|
||
32921FA000
|
stack
|
page read and write
|
||
32B49FE000
|
unkown
|
page readonly
|
||
AB40000C000
|
trusted library allocation
|
page read and write
|
||
1C803648000
|
heap
|
page read and write
|
||
622400734000
|
trusted library allocation
|
page read and write
|
||
622400700000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
190800294000
|
trusted library allocation
|
page read and write
|
||
622400237000
|
trusted library allocation
|
page read and write
|
||
329E9FE000
|
unkown
|
page readonly
|
||
AB400E18000
|
trusted library allocation
|
page read and write
|
||
622400750000
|
trusted library allocation
|
page read and write
|
||
AB400E10000
|
trusted library allocation
|
page read and write
|
||
AB40008F000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
AB400DBC000
|
trusted library allocation
|
page read and write
|
||
AB400D70000
|
trusted library allocation
|
page read and write
|
||
AB4006C0000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB40081C000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
18A6000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
622400330000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
62240027C000
|
trusted library allocation
|
page read and write
|
||
622400364000
|
trusted library allocation
|
page read and write
|
||
6224007D0000
|
trusted library allocation
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
AB400719000
|
trusted library allocation
|
page read and write
|
||
622400694000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1C803150000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
32AA1FD000
|
stack
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
32A49FE000
|
unkown
|
page readonly
|
||
3D8F000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB400340000
|
trusted library allocation
|
page read and write
|
||
AB400930000
|
trusted library allocation
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
190800230000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
32B31FE000
|
stack
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
50E000
|
stack
|
page read and write
|
||
1C8036EE000
|
heap
|
page read and write
|
||
62240075C000
|
trusted library allocation
|
page read and write
|
||
622400784000
|
trusted library allocation
|
page read and write
|
||
AB400D5C000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB4002FB000
|
trusted library allocation
|
page read and write
|
||
1C803655000
|
heap
|
page read and write
|
||
1C875C48000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page read and write
|
||
1C8036A1000
|
heap
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
3D6F000
|
heap
|
page read and write
|
||
3F1B000
|
heap
|
page read and write
|
||
AB400C70000
|
trusted library allocation
|
page read and write
|
||
AB4001F0000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C8036DF000
|
heap
|
page read and write
|
||
1C803144000
|
heap
|
page read and write
|
||
AB400390000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB400FCC000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
1C875D26000
|
heap
|
page read and write
|
||
3C5B000
|
heap
|
page read and write
|
||
AB4004BC000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
AB4009CC000
|
trusted library allocation
|
page read and write
|
||
3E0C000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
6224006C8000
|
trusted library allocation
|
page read and write
|
||
32A01FB000
|
stack
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB40075C000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB4002D0000
|
trusted library allocation
|
page read and write
|
||
3E28000
|
heap
|
page read and write
|
||
6C3E8000
|
unkown
|
page readonly
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80A062000
|
trusted library section
|
page read and write
|
||
32AC1FE000
|
stack
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
3C57000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400510000
|
trusted library allocation
|
page read and write
|
||
6224006B4000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
1C809FA3000
|
trusted library section
|
page read and write
|
||
1908002B0000
|
trusted library allocation
|
page read and write
|
||
AB400401000
|
trusted library allocation
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
328B9FE000
|
unkown
|
page readonly
|
||
AB4000DC000
|
trusted library allocation
|
page read and write
|
||
AB400EA8000
|
trusted library allocation
|
page read and write
|
||
190800270000
|
trusted library allocation
|
page read and write
|
||
32979FE000
|
unkown
|
page readonly
|
||
1630000
|
heap
|
page read and write
|
||
3D94000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
3DF5000
|
heap
|
page read and write
|
||
1908002F4000
|
trusted library allocation
|
page read and write
|
||
32A09FE000
|
unkown
|
page readonly
|
||
AB400A1C000
|
trusted library allocation
|
page read and write
|
||
1426000
|
unkown
|
page write copy
|
||
3EFF000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
32939FE000
|
unkown
|
page readonly
|
||
329D1FE000
|
stack
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
190800250000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB4002CA000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4001F8000
|
trusted library allocation
|
page read and write
|
||
1C80314A000
|
heap
|
page read and write
|
||
62240039C000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB400894000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
190800201000
|
trusted library allocation
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
3FDD000
|
heap
|
page read and write
|
||
1C809C27000
|
unclassified section
|
page read and write
|
||
622400320000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
3E33000
|
heap
|
page read and write
|
||
AB400550000
|
trusted library allocation
|
page read and write
|
||
AB400A34000
|
trusted library allocation
|
page read and write
|
||
AB400304000
|
trusted library allocation
|
page read and write
|
||
1C875D03000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
622400230000
|
trusted library allocation
|
page read and write
|
||
3C54000
|
heap
|
page read and write
|
||
150F000
|
unkown
|
page write copy
|
||
328B1FE000
|
unkown
|
page read and write
|
||
AB400E24000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB400F18000
|
trusted library allocation
|
page read and write
|
||
3F5D000
|
heap
|
page read and write
|
||
62240069C000
|
trusted library allocation
|
page read and write
|
||
1C809C3E000
|
trusted library section
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C80314D000
|
heap
|
page read and write
|
||
32B01FE000
|
stack
|
page read and write
|
||
AB400910000
|
trusted library allocation
|
page read and write
|
||
AB400B88000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
AB40006C000
|
trusted library allocation
|
page read and write
|
||
AB400801000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
1C80312C000
|
heap
|
page read and write
|
||
32A21FC000
|
stack
|
page read and write
|
||
AB400E90000
|
trusted library allocation
|
page read and write
|
||
6224006EC000
|
trusted library allocation
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C807A80000
|
heap
|
page read and write
|
||
AB4006CA000
|
trusted library allocation
|
page read and write
|
||
AB400300000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
1C809F91000
|
trusted library section
|
page read and write
|
||
32991FE000
|
stack
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C80314C000
|
heap
|
page read and write
|
||
329C9FE000
|
unkown
|
page readonly
|
||
AB400DD4000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB4002C4000
|
trusted library allocation
|
page read and write
|
||
AB400DC4000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB40034C000
|
trusted library allocation
|
page read and write
|
||
622400688000
|
trusted library allocation
|
page read and write
|
||
18E000
|
unkown
|
page read and write
|
||
1C803155000
|
heap
|
page read and write
|
||
AB4001CC000
|
trusted library allocation
|
page read and write
|
||
329E1FE000
|
stack
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB4001B4000
|
trusted library allocation
|
page read and write
|
||
AB4006C5000
|
trusted library allocation
|
page read and write
|
||
32A71FC000
|
stack
|
page read and write
|
||
AB40086C000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400320000
|
trusted library allocation
|
page read and write
|
||
AB40032C000
|
trusted library allocation
|
page read and write
|
||
AB4008CC000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
441800220000
|
direct allocation
|
page read and write
|
||
AB400FD8000
|
trusted library allocation
|
page read and write
|
||
1C8036A1000
|
heap
|
page read and write
|
||
4418002D0000
|
direct allocation
|
page read and write
|
||
198D000
|
heap
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
AB400C68000
|
trusted library allocation
|
page read and write
|
||
32A41FC000
|
stack
|
page read and write
|
||
6224006FC000
|
trusted library allocation
|
page read and write
|
||
AB400CEC000
|
trusted library allocation
|
page read and write
|
||
198C000
|
heap
|
page read and write
|
||
44180024C000
|
direct allocation
|
page read and write
|
||
AB400320000
|
trusted library allocation
|
page read and write
|
||
622400678000
|
trusted library allocation
|
page read and write
|
||
AB400428000
|
trusted library allocation
|
page read and write
|
||
622400250000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400F98000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
32B39FE000
|
unkown
|
page readonly
|
||
9D000
|
stack
|
page read and write
|
||
6224002F4000
|
trusted library allocation
|
page read and write
|
||
AB400CC0000
|
trusted library allocation
|
page read and write
|
||
AB400F60000
|
trusted library allocation
|
page read and write
|
||
1C80313C000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB40034C000
|
trusted library allocation
|
page read and write
|
||
AB4004A0000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB4007B1000
|
trusted library allocation
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
32B51FE000
|
stack
|
page read and write
|
||
4418002E4000
|
direct allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
32909FE000
|
unkown
|
page readonly
|
||
AB400338000
|
trusted library allocation
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
1C875F55000
|
heap
|
page read and write
|
||
AB400FE4000
|
trusted library allocation
|
page read and write
|
||
32A79FE000
|
unkown
|
page readonly
|
||
328E1FE000
|
stack
|
page read and write
|
||
1986000
|
heap
|
page read and write
|
||
3C53000
|
heap
|
page read and write
|
||
3DD8000
|
heap
|
page read and write
|
||
AB400054000
|
trusted library allocation
|
page read and write
|
||
AB400844000
|
trusted library allocation
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
44180020C000
|
direct allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
AB400E01000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
AB400B0C000
|
trusted library allocation
|
page read and write
|
||
AB4001D4000
|
trusted library allocation
|
page read and write
|
||
AB400AEC000
|
trusted library allocation
|
page read and write
|
||
AB400D54000
|
trusted library allocation
|
page read and write
|
||
622400330000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
unkown
|
page readonly
|
||
18A5000
|
heap
|
page read and write
|
||
198B000
|
heap
|
page read and write
|
||
329A1FE000
|
stack
|
page read and write
|
||
1C803110000
|
heap
|
page read and write
|
||
AB400EC8000
|
trusted library allocation
|
page read and write
|
||
1666000
|
unkown
|
page write copy
|
||
6224006B8000
|
trusted library allocation
|
page read and write
|
||
6224006E8000
|
trusted library allocation
|
page read and write
|
||
AB400C3C000
|
trusted library allocation
|
page read and write
|
||
AB4003F8000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
AB400E70000
|
trusted library allocation
|
page read and write
|
||
441800294000
|
direct allocation
|
page read and write
|
||
1C803134000
|
heap
|
page read and write
|
||
AB40014C000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
62240025C000
|
trusted library allocation
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
622400374000
|
trusted library allocation
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C8036DD000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB40101C000
|
trusted library allocation
|
page read and write
|
||
1C803144000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803155000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803154000
|
heap
|
page read and write
|
||
6224006D4000
|
trusted library allocation
|
page read and write
|
||
32AB1FB000
|
stack
|
page read and write
|
||
6C2C1000
|
unkown
|
page execute read
|
||
1C803154000
|
heap
|
page read and write
|
||
AB400DE8000
|
trusted library allocation
|
page read and write
|
||
1C80314C000
|
heap
|
page read and write
|
||
AB400944000
|
trusted library allocation
|
page read and write
|
||
AB400BAC000
|
trusted library allocation
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
AB400594000
|
trusted library allocation
|
page read and write
|
||
AB400870000
|
trusted library allocation
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1C8036E7000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
1C875F50000
|
heap
|
page read and write
|
||
99C000
|
stack
|
page read and write
|
||
1C803133000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
AB400DD4000
|
trusted library allocation
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
1C803143000
|
heap
|
page read and write
|
||
1C80312C000
|
heap
|
page read and write
|
||
AB400D78000
|
trusted library allocation
|
page read and write
|
||
1C875D3D000
|
heap
|
page read and write
|
||
6C39D000
|
unkown
|
page read and write
|
||
AB400A01000
|
trusted library allocation
|
page read and write
|
||
1C80A0F0000
|
trusted library section
|
page read and write
|
||
AB4002A4000
|
trusted library allocation
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
AB400C64000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
6224006C4000
|
trusted library allocation
|
page read and write
|
||
1C809F20000
|
trusted library section
|
page read and write
|
||
1C80368B000
|
heap
|
page read and write
|
||
18A7000
|
heap
|
page read and write
|
||
54F000
|
stack
|
page read and write
|
||
AB40032C000
|
trusted library allocation
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
622400664000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1D1000
|
unkown
|
page readonly
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB400304000
|
trusted library allocation
|
page read and write
|
||
AB4002F0000
|
trusted library allocation
|
page read and write
|
||
AB40040C000
|
trusted library allocation
|
page read and write
|
||
1C805990000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
AB400A78000
|
trusted library allocation
|
page read and write
|
||
AB400D44000
|
trusted library allocation
|
page read and write
|
||
622400390000
|
trusted library allocation
|
page read and write
|
||
1C807AA5000
|
heap
|
page read and write
|
||
1C80313D000
|
heap
|
page read and write
|
||
18AA000
|
heap
|
page read and write
|
||
1C803137000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
3C57000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page write copy
|
||
AB400C8C000
|
trusted library allocation
|
page read and write
|
||
1C803151000
|
heap
|
page read and write
|
||
328D1FE000
|
stack
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
AB4001B4000
|
trusted library allocation
|
page read and write
|
||
198B000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803132000
|
heap
|
page read and write
|
||
32A11FD000
|
stack
|
page read and write
|
||
AB4003EC000
|
trusted library allocation
|
page read and write
|
||
3F9B000
|
heap
|
page read and write
|
||
1908002BC000
|
trusted library allocation
|
page read and write
|
||
1C803138000
|
heap
|
page read and write
|
||
3C5D000
|
heap
|
page read and write
|
||
622400380000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB40016C000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
AB400F38000
|
trusted library allocation
|
page read and write
|
||
1C80313E000
|
heap
|
page read and write
|
||
1C80314B000
|
heap
|
page read and write
|
||
6224002DC000
|
trusted library allocation
|
page read and write
|
||
1C80312A000
|
heap
|
page read and write
|
||
1C803642000
|
heap
|
page read and write
|
There are 1148 hidden memdumps, click here to show them.