Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9xNI7vE1XO.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9xNI7vE1XO.exe_c06fa4b91387f416a53f72b421d9ec613c20fbc9_e96a7e40_8a9a4df9-0459-43c7-ab06-e3790a96dc66\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8746.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Oct 28 18:07:27 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER894B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89F8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gAyLaylSYmFkGzQujoEc.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\9xNI7vE1XO.exe
|
"C:\Users\user\Desktop\9xNI7vE1XO.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2412,i,8244738278220938971,4279238056225373594,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 548
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://thirtjo13vt.top/v1/upload.php
|
46.173.214.92
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/3832;
|
unknown
|
||
http://anglebug.com/3965;
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/4836;
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://anglebug.com/7488;
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/3586;
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
http://anglebug.com/6048;
|
unknown
|
||
http://anglebug.com/8229;
|
unknown
|
||
http://anglebug.com/5371;
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://issuetracker.google.com/issues/1664752735
|
unknown
|
||
http://anglebug.com/4551;
|
unknown
|
||
http://anglebug.com/6439;
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5055;
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
http://anglebug.com/3584;
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icoK
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
http://anglebug.com/5421;
|
unknown
|
||
http://anglebug.com/5881;
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://anglebug.com/6141;
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
thirtjo13vt.top
|
46.173.214.92
|
||
home.thirtjo13vt.top
|
46.173.214.92
|
||
www.google.com
|
142.250.184.228
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.173.214.92
|
thirtjo13vt.top
|
Russian Federation
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.184.228
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
ProgramId
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
FileId
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
LowerCaseLongPath
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
LongPathHash
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Name
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
OriginalFileName
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Publisher
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Version
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
BinFileVersion
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
BinaryType
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
ProductName
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
ProductVersion
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
LinkDate
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
BinProductVersion
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
AppxPackageFullName
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Size
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Language
|
||
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DF37000
|
heap
|
page read and write
|
||
4BB0001B4000
|
trusted library allocation
|
page read and write
|
||
4BB0002A4000
|
trusted library allocation
|
page read and write
|
||
3508006D4000
|
trusted library allocation
|
page read and write
|
||
327A000
|
stack
|
page read and write
|
||
4BB000D58000
|
trusted library allocation
|
page read and write
|
||
2429D383000
|
heap
|
page read and write
|
||
4BB000ECC000
|
trusted library allocation
|
page read and write
|
||
4BB000719000
|
trusted library allocation
|
page read and write
|
||
35080025C000
|
trusted library allocation
|
page read and write
|
||
2429CDB3000
|
heap
|
page read and write
|
||
4BB000CB4000
|
trusted library allocation
|
page read and write
|
||
584E000
|
heap
|
page read and write
|
||
4BB000850000
|
trusted library allocation
|
page read and write
|
||
4BB000F8C000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3B3B000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
4BB000C78000
|
trusted library allocation
|
page read and write
|
||
3A79000
|
heap
|
page read and write
|
||
4BB0001E4000
|
trusted library allocation
|
page read and write
|
||
4BB000E10000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
4BB000310000
|
trusted library allocation
|
page read and write
|
||
4BB00106C000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
4BB000C74000
|
trusted library allocation
|
page read and write
|
||
4BB000B78000
|
trusted library allocation
|
page read and write
|
||
3508006B4000
|
trusted library allocation
|
page read and write
|
||
7A5EFFE000
|
unkown
|
page readonly
|
||
7A427FE000
|
stack
|
page read and write
|
||
3994000
|
heap
|
page read and write
|
||
4BB0002CC000
|
trusted library allocation
|
page read and write
|
||
2429993C000
|
heap
|
page read and write
|
||
242A1470000
|
trusted library section
|
page read and write
|
||
399C000
|
heap
|
page read and write
|
||
4BB000801000
|
trusted library allocation
|
page read and write
|
||
242A3A4E000
|
trusted library section
|
page read and write
|
||
1A6C000
|
heap
|
page read and write
|
||
7A5FFFE000
|
unkown
|
page readonly
|
||
7A5DFFE000
|
unkown
|
page readonly
|
||
350800354000
|
trusted library allocation
|
page read and write
|
||
7A527FC000
|
stack
|
page read and write
|
||
2429D33D000
|
heap
|
page read and write
|
||
3B5C000
|
heap
|
page read and write
|
||
7A397FE000
|
stack
|
page read and write
|
||
350800248000
|
trusted library allocation
|
page read and write
|
||
7A39FFE000
|
unkown
|
page readonly
|
||
4BB000370000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
4BB000830000
|
trusted library allocation
|
page read and write
|
||
4BB00063C000
|
trusted library allocation
|
page read and write
|
||
242A1AB7000
|
unclassified section
|
page read and write
|
||
7A387FE000
|
stack
|
page read and write
|
||
4BB00020C000
|
trusted library allocation
|
page read and write
|
||
350800784000
|
trusted library allocation
|
page read and write
|
||
4BB000710000
|
trusted library allocation
|
page read and write
|
||
350800648000
|
trusted library allocation
|
page read and write
|
||
4BB000C0C000
|
trusted library allocation
|
page read and write
|
||
5D44002C0000
|
trusted library allocation
|
page read and write
|
||
350800250000
|
trusted library allocation
|
page read and write
|
||
4BB0007C8000
|
trusted library allocation
|
page read and write
|
||
2429D313000
|
heap
|
page read and write
|
||
4BB000EB4000
|
trusted library allocation
|
page read and write
|
||
4BB00033C000
|
trusted library allocation
|
page read and write
|
||
242999A0000
|
heap
|
page read and write
|
||
7A49FFE000
|
unkown
|
page readonly
|
||
1650000
|
heap
|
page read and write
|
||
4BB000D80000
|
trusted library allocation
|
page read and write
|
||
4BB000DC4000
|
trusted library allocation
|
page read and write
|
||
350800668000
|
trusted library allocation
|
page read and write
|
||
4BB0002A8000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
2429D3BA000
|
heap
|
page read and write
|
||
4BB000B38000
|
trusted library allocation
|
page read and write
|
||
4BB0002AC000
|
trusted library allocation
|
page read and write
|
||
4BB0007B4000
|
trusted library allocation
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
3996000
|
heap
|
page read and write
|
||
4BB000690000
|
trusted library allocation
|
page read and write
|
||
4BB000201000
|
trusted library allocation
|
page read and write
|
||
2429CDC0000
|
heap
|
page read and write
|
||
350800620000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
4BB00097C000
|
trusted library allocation
|
page read and write
|
||
7A4FFFE000
|
unkown
|
page readonly
|
||
2429D327000
|
heap
|
page read and write
|
||
4BB0004B0000
|
trusted library allocation
|
page read and write
|
||
242A1578000
|
heap
|
page read and write
|
||
4BB00035C000
|
trusted library allocation
|
page read and write
|
||
7A38FFE000
|
unkown
|
page readonly
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
4BB0004B0000
|
trusted library allocation
|
page read and write
|
||
4BB00000C000
|
trusted library allocation
|
page read and write
|
||
4BB000EC0000
|
trusted library allocation
|
page read and write
|
||
788000290000
|
direct allocation
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
5D44002A0000
|
trusted library allocation
|
page read and write
|
||
4BB000224000
|
trusted library allocation
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
788000230000
|
direct allocation
|
page read and write
|
||
E1C000
|
stack
|
page read and write
|
||
4BB00061C000
|
trusted library allocation
|
page read and write
|
||
242A2EE2000
|
trusted library section
|
page read and write
|
||
7A40FFE000
|
unkown
|
page readonly
|
||
7A377FF000
|
stack
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
4BB000924000
|
trusted library allocation
|
page read and write
|
||
350800610000
|
trusted library allocation
|
page read and write
|
||
4BB0004A4000
|
trusted library allocation
|
page read and write
|
||
4BB000B9C000
|
trusted library allocation
|
page read and write
|
||
350800320000
|
trusted library allocation
|
page read and write
|
||
4BB00054C000
|
trusted library allocation
|
page read and write
|
||
4BB000C24000
|
trusted library allocation
|
page read and write
|
||
4BB00087C000
|
trusted library allocation
|
page read and write
|
||
4BB0001B4000
|
trusted library allocation
|
page read and write
|
||
5D44002C0000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
2429CDBE000
|
heap
|
page read and write
|
||
7A64FFE000
|
unkown
|
page readonly
|
||
7A3D7FC000
|
stack
|
page read and write
|
||
4BB000BC0000
|
trusted library allocation
|
page read and write
|
||
4BB000074000
|
trusted library allocation
|
page read and write
|
||
6C81F000
|
unkown
|
page readonly
|
||
3B2F000
|
heap
|
page read and write
|
||
78800024C000
|
direct allocation
|
page read and write
|
||
2429D34B000
|
heap
|
page read and write
|
||
3AD6000
|
heap
|
page read and write
|
||
350800237000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
5D44002F8000
|
trusted library allocation
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
242A2FE2000
|
trusted library section
|
page read and write
|
||
3B00000
|
heap
|
page read and write
|
||
4BB0001D4000
|
trusted library allocation
|
page read and write
|
||
3508006EC000
|
trusted library allocation
|
page read and write
|
||
7A497FE000
|
stack
|
page read and write
|
||
4BB000544000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
24299895000
|
heap
|
page read and write
|
||
3C99000
|
heap
|
page read and write
|
||
788000220000
|
direct allocation
|
page read and write
|
||
7A55FFE000
|
unkown
|
page readonly
|
||
350800744000
|
trusted library allocation
|
page read and write
|
||
242A380E000
|
trusted library section
|
page read and write
|
||
4BB000FE0000
|
trusted library allocation
|
page read and write
|
||
4BB000E78000
|
trusted library allocation
|
page read and write
|
||
4BB00080C000
|
trusted library allocation
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
242A3CD1000
|
trusted library section
|
page read and write
|
||
7A647FE000
|
stack
|
page read and write
|
||
4BB001030000
|
trusted library allocation
|
page read and write
|
||
4BB000D14000
|
trusted library allocation
|
page read and write
|
||
4BB000454000
|
trusted library allocation
|
page read and write
|
||
4BB0002A4000
|
trusted library allocation
|
page read and write
|
||
4BB000787000
|
trusted library allocation
|
page read and write
|
||
4BB0009D8000
|
trusted library allocation
|
page read and write
|
||
4BB000C20000
|
trusted library allocation
|
page read and write
|
||
3998000
|
heap
|
page read and write
|
||
24299AB0000
|
heap
|
page read and write
|
||
7A4BFFE000
|
unkown
|
page readonly
|
||
4BB000DAC000
|
trusted library allocation
|
page read and write
|
||
7A597FD000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
4BB000B34000
|
trusted library allocation
|
page read and write
|
||
3B2A000
|
heap
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
3508002C4000
|
trusted library allocation
|
page read and write
|
||
4BB0001E0000
|
trusted library allocation
|
page read and write
|
||
7A457FD000
|
stack
|
page read and write
|
||
4BB0002C4000
|
trusted library allocation
|
page read and write
|
||
2429CD80000
|
heap
|
page read and write
|
||
5D4400270000
|
trusted library allocation
|
page read and write
|
||
78800025C000
|
direct allocation
|
page read and write
|
||
7A63FFE000
|
unkown
|
page readonly
|
||
4BB000F48000
|
trusted library allocation
|
page read and write
|
||
4BB000740000
|
trusted library allocation
|
page read and write
|
||
4BB000BF8000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
7A517FC000
|
stack
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
4BB00109C000
|
trusted library allocation
|
page read and write
|
||
7A58FFE000
|
unkown
|
page readonly
|
||
7A487FE000
|
stack
|
page read and write
|
||
7A5BFFE000
|
unkown
|
page readonly
|
||
3B3B000
|
heap
|
page read and write
|
||
3508002B0000
|
trusted library allocation
|
page read and write
|
||
35080027C000
|
trusted library allocation
|
page read and write
|
||
4BB000C35000
|
trusted library allocation
|
page read and write
|
||
6C81D000
|
unkown
|
page read and write
|
||
4BB000E01000
|
trusted library allocation
|
page read and write
|
||
4BB0002B8000
|
trusted library allocation
|
page read and write
|
||
4BB000454000
|
trusted library allocation
|
page read and write
|
||
7A3CFFE000
|
unkown
|
page readonly
|
||
4BB000D6C000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
16D0000
|
heap
|
page read and write
|
||
5D4400260000
|
trusted library allocation
|
page read and write
|
||
4BB0002A4000
|
trusted library allocation
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
350800750000
|
trusted library allocation
|
page read and write
|
||
4BB000304000
|
trusted library allocation
|
page read and write
|
||
4BB00033C000
|
trusted library allocation
|
page read and write
|
||
2429D336000
|
heap
|
page read and write
|
||
7A52FFE000
|
unkown
|
page readonly
|
||
16A0000
|
heap
|
page read and write
|
||
7A43FFE000
|
unkown
|
page readonly
|
||
5D4400264000
|
trusted library allocation
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
7A46FFE000
|
unkown
|
page readonly
|
||
4BB000690000
|
trusted library allocation
|
page read and write
|
||
4BB000FB8000
|
trusted library allocation
|
page read and write
|
||
4BB000AFC000
|
trusted library allocation
|
page read and write
|
||
4BB000F3C000
|
trusted library allocation
|
page read and write
|
||
4BB00103C000
|
trusted library allocation
|
page read and write
|
||
4BB00018C000
|
trusted library allocation
|
page read and write
|
||
350800704000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
7A59FFE000
|
unkown
|
page readonly
|
||
4BB0000EC000
|
trusted library allocation
|
page read and write
|
||
4BB000782000
|
trusted library allocation
|
page read and write
|
||
242A1B33000
|
heap
|
page read and write
|
||
4BB000B88000
|
trusted library allocation
|
page read and write
|
||
5D4400238000
|
trusted library allocation
|
page read and write
|
||
5D44002C0000
|
trusted library allocation
|
page read and write
|
||
1BCF000
|
stack
|
page read and write
|
||
4BB000A28000
|
trusted library allocation
|
page read and write
|
||
4BB000194000
|
trusted library allocation
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
4BB000494000
|
trusted library allocation
|
page read and write
|
||
4BB000210000
|
trusted library allocation
|
page read and write
|
||
4BB0000B4000
|
trusted library allocation
|
page read and write
|
||
350800418000
|
trusted library allocation
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
242A2F86000
|
trusted library section
|
page read and write
|
||
242A2EEE000
|
trusted library section
|
page read and write
|
||
242A2FED000
|
trusted library section
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
4BB000C6C000
|
trusted library allocation
|
page read and write
|
||
DA1000
|
unkown
|
page write copy
|
||
4BB000304000
|
trusted library allocation
|
page read and write
|
||
350800288000
|
trusted library allocation
|
page read and write
|
||
7A61FFE000
|
unkown
|
page readonly
|
||
3B3A000
|
heap
|
page read and write
|
||
4BB0009D3000
|
trusted library allocation
|
page read and write
|
||
7A3AFFE000
|
unkown
|
page readonly
|
||
4BB0000DC000
|
trusted library allocation
|
page read and write
|
||
4BB000938000
|
trusted library allocation
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
2429CDAE000
|
heap
|
page read and write
|
||
3508003EC000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
4BB00069C000
|
trusted library allocation
|
page read and write
|
||
2429D2E0000
|
heap
|
page read and write
|
||
3AB1000
|
heap
|
page read and write
|
||
7A3EFFE000
|
unkown
|
page readonly
|
||
DD26000
|
heap
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
788000294000
|
direct allocation
|
page read and write
|
||
5D44002F4000
|
trusted library allocation
|
page read and write
|
||
4BB000DF0000
|
trusted library allocation
|
page read and write
|
||
3B8E000
|
heap
|
page read and write
|
||
350800310000
|
trusted library allocation
|
page read and write
|
||
E7A8000
|
heap
|
page read and write
|
||
4BB000E58000
|
trusted library allocation
|
page read and write
|
||
2429D398000
|
heap
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
5D4400248000
|
trusted library allocation
|
page read and write
|
||
7A437FE000
|
stack
|
page read and write
|
||
7A557FB000
|
stack
|
page read and write
|
||
2429D389000
|
heap
|
page read and write
|
||
4BB000FB8000
|
trusted library allocation
|
page read and write
|
||
2429CDAE000
|
heap
|
page read and write
|
||
4BB0002F7000
|
trusted library allocation
|
page read and write
|
||
242A2EB0000
|
heap
|
page read and write
|
||
4BB000FC8000
|
trusted library allocation
|
page read and write
|
||
4BB0007E8000
|
trusted library allocation
|
page read and write
|
||
350800684000
|
trusted library allocation
|
page read and write
|
||
350800730000
|
trusted library allocation
|
page read and write
|
||
1B0D000
|
heap
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
350800380000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
7A44FFE000
|
unkown
|
page readonly
|
||
4BB00017C000
|
trusted library allocation
|
page read and write
|
||
4BB0003A0000
|
trusted library allocation
|
page read and write
|
||
4BB001104000
|
trusted library allocation
|
page read and write
|
||
4BB00021C000
|
trusted library allocation
|
page read and write
|
||
35080035C000
|
trusted library allocation
|
page read and write
|
||
4BB0002C4000
|
trusted library allocation
|
page read and write
|
||
D46000
|
unkown
|
page write copy
|
||
7A3A7FE000
|
stack
|
page read and write
|
||
F0E000
|
unkown
|
page write copy
|
||
4E4E000
|
heap
|
page read and write
|
||
3508007D0000
|
trusted library allocation
|
page read and write
|
||
788000234000
|
direct allocation
|
page read and write
|
||
7A5C7FE000
|
stack
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
4BB000ECC000
|
trusted library allocation
|
page read and write
|
||
2429F550000
|
trusted library allocation
|
page read and write
|
||
5D44002F0000
|
trusted library allocation
|
page read and write
|
||
242A3DAD000
|
trusted library section
|
page read and write
|
||
350800320000
|
trusted library allocation
|
page read and write
|
||
3508006F0000
|
trusted library allocation
|
page read and write
|
||
4BB000EC0000
|
trusted library allocation
|
page read and write
|
||
350800788000
|
trusted library allocation
|
page read and write
|
||
350800201000
|
trusted library allocation
|
page read and write
|
||
350800368000
|
trusted library allocation
|
page read and write
|
||
4BB0001E8000
|
trusted library allocation
|
page read and write
|
||
4BB001080000
|
trusted library allocation
|
page read and write
|
||
4BB000A0C000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
4BB000DE0000
|
trusted library allocation
|
page read and write
|
||
3508006E4000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
3AE9000
|
heap
|
page read and write
|
||
350800364000
|
trusted library allocation
|
page read and write
|
||
2429B723000
|
heap
|
page read and write
|
||
242A1B30000
|
heap
|
page read and write
|
||
5D44002E4000
|
trusted library allocation
|
page read and write
|
||
4BB000EAC000
|
trusted library allocation
|
page read and write
|
||
5D44002C8000
|
trusted library allocation
|
page read and write
|
||
7A45FFE000
|
unkown
|
page readonly
|
||
4BB00078C000
|
trusted library allocation
|
page read and write
|
||
4BB000E0C000
|
trusted library allocation
|
page read and write
|
||
350800390000
|
trusted library allocation
|
page read and write
|
||
788000303000
|
direct allocation
|
page read and write
|
||
3996000
|
heap
|
page read and write
|
||
4BB000954000
|
trusted library allocation
|
page read and write
|
||
4BB000CE0000
|
trusted library allocation
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
5D4400220000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page read and write
|
||
242A3C51000
|
trusted library section
|
page read and write
|
||
4BB000A30000
|
trusted library allocation
|
page read and write
|
||
4BB000218000
|
trusted library allocation
|
page read and write
|
||
2429D387000
|
heap
|
page read and write
|
||
788000270000
|
direct allocation
|
page read and write
|
||
350800310000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page write copy
|
||
4BB00040C000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
4BB000B14000
|
trusted library allocation
|
page read and write
|
||
7A567FB000
|
stack
|
page read and write
|
||
4BB0007D8000
|
trusted library allocation
|
page read and write
|
||
4BB000CB4000
|
trusted library allocation
|
page read and write
|
||
7A5A7FD000
|
stack
|
page read and write
|
||
7A65FFE000
|
unkown
|
page readonly
|
||
4BB000EEC000
|
trusted library allocation
|
page read and write
|
||
350800694000
|
trusted library allocation
|
page read and write
|
||
7A4D7FC000
|
stack
|
page read and write
|
||
35080020C000
|
trusted library allocation
|
page read and write
|
||
4BB000CB4000
|
trusted library allocation
|
page read and write
|
||
5D4400294000
|
trusted library allocation
|
page read and write
|
||
3AA1000
|
heap
|
page read and write
|
||
4BB000E44000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
4BB000D48000
|
trusted library allocation
|
page read and write
|
||
4BB000330000
|
trusted library allocation
|
page read and write
|
||
4BB000C40000
|
trusted library allocation
|
page read and write
|
||
4BB000E6D000
|
trusted library allocation
|
page read and write
|
||
4BB0010B8000
|
trusted library allocation
|
page read and write
|
||
788000250000
|
direct allocation
|
page read and write
|
||
5D44002BD000
|
trusted library allocation
|
page read and write
|
||
4BB0009CB000
|
trusted library allocation
|
page read and write
|
||
4BB000E68000
|
trusted library allocation
|
page read and write
|
||
2429D3E0000
|
trusted library section
|
page read and write
|
||
5D44002A0000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
stack
|
page read and write
|
||
4BB0001AC000
|
trusted library allocation
|
page read and write
|
||
4BB00031C000
|
trusted library allocation
|
page read and write
|
||
7A367FE000
|
unkown
|
page read and write
|
||
1A01000
|
heap
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
4BB000228000
|
trusted library allocation
|
page read and write
|
||
7A5B7FD000
|
stack
|
page read and write
|
||
4BB000044000
|
trusted library allocation
|
page read and write
|
||
7A48FFE000
|
unkown
|
page readonly
|
||
4BB000FE4000
|
trusted library allocation
|
page read and write
|
||
399C000
|
heap
|
page read and write
|
||
3508006AC000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
6C868000
|
unkown
|
page readonly
|
||
7880002AC000
|
direct allocation
|
page read and write
|
||
3508002B8000
|
trusted library allocation
|
page read and write
|
||
4BB000D17000
|
trusted library allocation
|
page read and write
|
||
4BB001044000
|
trusted library allocation
|
page read and write
|
||
4BB000BC8000
|
trusted library allocation
|
page read and write
|
||
4BB000785000
|
trusted library allocation
|
page read and write
|
||
7A417FC000
|
stack
|
page read and write
|
||
7A4C7FD000
|
stack
|
page read and write
|
||
4BB000988000
|
trusted library allocation
|
page read and write
|
||
4BB000908000
|
trusted library allocation
|
page read and write
|
||
4BB0004C0000
|
trusted library allocation
|
page read and write
|
||
4BB000E3C000
|
trusted library allocation
|
page read and write
|
||
3508007E0000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
7880002EC000
|
direct allocation
|
page read and write
|
||
5D4400235000
|
trusted library allocation
|
page read and write
|
||
4BB0001C4000
|
trusted library allocation
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
4BB0002F3000
|
trusted library allocation
|
page read and write
|
||
7A53FFE000
|
unkown
|
page readonly
|
||
3A5F000
|
heap
|
page read and write
|
||
4BB0005D8000
|
trusted library allocation
|
page read and write
|
||
4BB000454000
|
trusted library allocation
|
page read and write
|
||
5D4400274000
|
trusted library allocation
|
page read and write
|
||
4BB000D3C000
|
trusted library allocation
|
page read and write
|
||
4BB000380000
|
trusted library allocation
|
page read and write
|
||
350800330000
|
trusted library allocation
|
page read and write
|
||
242A3800000
|
trusted library section
|
page read and write
|
||
4BB000F0C000
|
trusted library allocation
|
page read and write
|
||
7A407FB000
|
stack
|
page read and write
|
||
4BB000CF8000
|
trusted library allocation
|
page read and write
|
||
3AE2000
|
heap
|
page read and write
|
||
2429D430000
|
trusted library section
|
page read and write
|
||
4BB000F2C000
|
trusted library allocation
|
page read and write
|
||
4BB0002D0000
|
trusted library allocation
|
page read and write
|
||
242A3C7E000
|
trusted library section
|
page read and write
|
||
4BB000658000
|
trusted library allocation
|
page read and write
|
||
3BD6000
|
heap
|
page read and write
|
||
4BB000DC8000
|
trusted library allocation
|
page read and write
|
||
350800330000
|
trusted library allocation
|
page read and write
|
||
16DE000
|
heap
|
page read and write
|
||
4BB000AE0000
|
trusted library allocation
|
page read and write
|
||
3BBD000
|
heap
|
page read and write
|
||
242A156B000
|
heap
|
page read and write
|
||
5D4400250000
|
trusted library allocation
|
page read and write
|
||
4BB000124000
|
trusted library allocation
|
page read and write
|
||
350800248000
|
trusted library allocation
|
page read and write
|
||
350800770000
|
trusted library allocation
|
page read and write
|
||
350800348000
|
trusted library allocation
|
page read and write
|
||
4BB0008B4000
|
trusted library allocation
|
page read and write
|
||
5D4400201000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page write copy
|
||
8D0000
|
unkown
|
page readonly
|
||
4BB000DC8000
|
trusted library allocation
|
page read and write
|
||
335F000
|
unkown
|
page read and write
|
||
7A3E7FD000
|
stack
|
page read and write
|
||
5D44002B0000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
4BB000F8C000
|
trusted library allocation
|
page read and write
|
||
78800026C000
|
direct allocation
|
page read and write
|
||
EF8000
|
unkown
|
page write copy
|
||
6C741000
|
unkown
|
page execute read
|
||
3508006D0000
|
trusted library allocation
|
page read and write
|
||
24299888000
|
heap
|
page read and write
|
||
7A507FC000
|
stack
|
page read and write
|
||
350800688000
|
trusted library allocation
|
page read and write
|
||
4BB0001EC000
|
trusted library allocation
|
page read and write
|
||
4BB000B78000
|
trusted library allocation
|
page read and write
|
||
4BB000DD4000
|
trusted library allocation
|
page read and write
|
||
4BB000C01000
|
trusted library allocation
|
page read and write
|
||
4BB000FB8000
|
trusted library allocation
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
242A3C72000
|
trusted library section
|
page read and write
|
||
4BB0008E0000
|
trusted library allocation
|
page read and write
|
||
24299860000
|
heap
|
page readonly
|
||
350800624000
|
trusted library allocation
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
4BB000F8C000
|
trusted library allocation
|
page read and write
|
||
7A47FFE000
|
unkown
|
page readonly
|
||
7A4F7FD000
|
stack
|
page read and write
|
||
4BB0001AC000
|
trusted library allocation
|
page read and write
|
||
4BB0001F0000
|
trusted library allocation
|
page read and write
|
||
4BB000484000
|
trusted library allocation
|
page read and write
|
||
3A78000
|
heap
|
page read and write
|
||
7A60FFE000
|
unkown
|
page readonly
|
||
7A3FFFE000
|
unkown
|
page readonly
|
||
F00000
|
unkown
|
page readonly
|
||
350800754000
|
trusted library allocation
|
page read and write
|
||
4BB000AB0000
|
trusted library allocation
|
page read and write
|
||
4BB000344000
|
trusted library allocation
|
page read and write
|
||
4BB0006D0000
|
trusted library allocation
|
page read and write
|
||
4BB00031C000
|
trusted library allocation
|
page read and write
|
||
3508002F2000
|
trusted library allocation
|
page read and write
|
||
7A4AFFE000
|
unkown
|
page readonly
|
||
4BB000EA0000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
399A000
|
heap
|
page read and write
|
||
4BB000001000
|
trusted library allocation
|
page read and write
|
||
5D44002D8000
|
trusted library allocation
|
page read and write
|
||
4BB000E72000
|
trusted library allocation
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
1692000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
7A537FB000
|
stack
|
page read and write
|
||
2429D374000
|
heap
|
page read and write
|
||
242A3C40000
|
trusted library section
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
4BB000ECC000
|
trusted library allocation
|
page read and write
|
||
3AF4000
|
heap
|
page read and write
|
||
4BB000798000
|
trusted library allocation
|
page read and write
|
||
350800714000
|
trusted library allocation
|
page read and write
|
||
4BB000401000
|
trusted library allocation
|
page read and write
|
||
4BB00038C000
|
trusted library allocation
|
page read and write
|
||
242A3A17000
|
unclassified section
|
page read and write
|
||
4BB0000FC000
|
trusted library allocation
|
page read and write
|
||
4BB0001B4000
|
trusted library allocation
|
page read and write
|
||
350800644000
|
trusted library allocation
|
page read and write
|
||
4BB000A38000
|
trusted library allocation
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
4BB0006AC000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
4BB000F18000
|
trusted library allocation
|
page read and write
|
||
4BB000EC0000
|
trusted library allocation
|
page read and write
|
||
350800630000
|
trusted library allocation
|
page read and write
|
||
4BB0006DC000
|
trusted library allocation
|
page read and write
|
||
35080075C000
|
trusted library allocation
|
page read and write
|
||
4BB000080000
|
trusted library allocation
|
page read and write
|
||
399A000
|
heap
|
page read and write
|
||
24299880000
|
heap
|
page read and write
|
||
3508007CC000
|
trusted library allocation
|
page read and write
|
||
3508006E0000
|
trusted library allocation
|
page read and write
|
||
3508007B4000
|
trusted library allocation
|
page read and write
|
||
4BB000CCC000
|
trusted library allocation
|
page read and write
|
||
4BB00100C000
|
trusted library allocation
|
page read and write
|
||
4BB0003BD000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
350800368000
|
trusted library allocation
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
24299980000
|
heap
|
page read and write
|
||
350800640000
|
trusted library allocation
|
page read and write
|
||
7A41FFE000
|
unkown
|
page readonly
|
||
3AB4000
|
heap
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
2429D390000
|
heap
|
page read and write
|
||
4BB000E48000
|
trusted library allocation
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
7A447FE000
|
stack
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
4BB000D90000
|
trusted library allocation
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
2429D030000
|
heap
|
page read and write
|
||
2429CDBF000
|
heap
|
page read and write
|
||
3508006E8000
|
trusted library allocation
|
page read and write
|
||
350800354000
|
trusted library allocation
|
page read and write
|
||
4BB00092C000
|
trusted library allocation
|
page read and write
|
||
2429D36C000
|
heap
|
page read and write
|
||
4BB0000AC000
|
trusted library allocation
|
page read and write
|
||
4BB00005F000
|
trusted library allocation
|
page read and write
|
||
4BB000BB4000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
heap
|
page read and write
|
||
168D000
|
heap
|
page read and write
|
||
242A0FE2000
|
trusted library allocation
|
page read and write
|
||
7A51FFE000
|
unkown
|
page readonly
|
||
F01000
|
unkown
|
page execute read
|
||
5D4400278000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
2429CDBB000
|
heap
|
page read and write
|
||
4BB001090000
|
trusted library allocation
|
page read and write
|
||
2429CDB6000
|
heap
|
page read and write
|
||
2429D300000
|
heap
|
page read and write
|
||
4BB000E34000
|
trusted library allocation
|
page read and write
|
||
6C869000
|
unkown
|
page read and write
|
||
4BB000310000
|
trusted library allocation
|
page read and write
|
||
7A4DFFC000
|
stack
|
page read and write
|
||
788000280000
|
direct allocation
|
page read and write
|
||
4BB000CBC000
|
trusted library allocation
|
page read and write
|
||
242A34C0000
|
trusted library allocation
|
page read and write
|
||
4BB0004E8000
|
trusted library allocation
|
page read and write
|
||
4BB000FD4000
|
trusted library allocation
|
page read and write
|
||
4BB0002B4000
|
trusted library allocation
|
page read and write
|
||
3994000
|
heap
|
page read and write
|
||
4BB000C8C000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page execute read
|
||
7A3B7FD000
|
stack
|
page read and write
|
||
2429D304000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4BB001030000
|
trusted library allocation
|
page read and write
|
||
4BB0002F0000
|
trusted library allocation
|
page read and write
|
||
2429CD90000
|
heap
|
page read and write
|
||
4BB000F94000
|
trusted library allocation
|
page read and write
|
||
350800720000
|
trusted library allocation
|
page read and write
|
||
7880002A8000
|
direct allocation
|
page read and write
|
||
4BB000A01000
|
trusted library allocation
|
page read and write
|
||
3C4A000
|
heap
|
page read and write
|
||
35080069C000
|
trusted library allocation
|
page read and write
|
||
4BB000EDC000
|
trusted library allocation
|
page read and write
|
||
350800374000
|
trusted library allocation
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
5D44002A0000
|
trusted library allocation
|
page read and write
|
||
399D000
|
heap
|
page read and write
|
||
3508002CC000
|
trusted library allocation
|
page read and write
|
||
4BB0005C8000
|
trusted library allocation
|
page read and write
|
||
35080040C000
|
trusted library allocation
|
page read and write
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
3A55000
|
heap
|
page read and write
|
||
35080035C000
|
trusted library allocation
|
page read and write
|
||
35080033C000
|
trusted library allocation
|
page read and write
|
||
4BB000CB4000
|
trusted library allocation
|
page read and write
|
||
242A3DA2000
|
trusted library section
|
page read and write
|
||
4BB000304000
|
trusted library allocation
|
page read and write
|
||
350800320000
|
trusted library allocation
|
page read and write
|
||
350800404000
|
trusted library allocation
|
page read and write
|
||
242A3020000
|
trusted library section
|
page read and write
|
||
4BB0002A4000
|
trusted library allocation
|
page read and write
|
||
4BB000DB8000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page read and write
|
||
7880002E4000
|
direct allocation
|
page read and write
|
||
788000217000
|
direct allocation
|
page read and write
|
||
7880002D0000
|
direct allocation
|
page read and write
|
||
4BB0009AC000
|
trusted library allocation
|
page read and write
|
||
4BB000330000
|
trusted library allocation
|
page read and write
|
||
350800424000
|
trusted library allocation
|
page read and write
|
||
3996000
|
heap
|
page read and write
|
||
5D4400230000
|
trusted library allocation
|
page read and write
|
||
4BB0001DC000
|
trusted library allocation
|
page read and write
|
||
4BB000550000
|
trusted library allocation
|
page read and write
|
||
4BB0004DC000
|
trusted library allocation
|
page read and write
|
||
3508002DC000
|
trusted library allocation
|
page read and write
|
||
7880002DC000
|
direct allocation
|
page read and write
|
||
2429D31A000
|
heap
|
page read and write
|
||
3508006CC000
|
trusted library allocation
|
page read and write
|
||
4BB000D10000
|
trusted library allocation
|
page read and write
|
||
4BB0002A4000
|
trusted library allocation
|
page read and write
|
||
4BB000F08000
|
trusted library allocation
|
page read and write
|
||
4BB00052C000
|
trusted library allocation
|
page read and write
|
||
4BB0010EC000
|
trusted library allocation
|
page read and write
|
||
4BB000220000
|
trusted library allocation
|
page read and write
|
||
4BB00022C000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
2429991E000
|
heap
|
page read and write
|
||
2429991A000
|
heap
|
page read and write
|
||
350800230000
|
trusted library allocation
|
page read and write
|
||
4BB00015C000
|
trusted library allocation
|
page read and write
|
||
4BB0001AC000
|
trusted library allocation
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
4BB000E20000
|
trusted library allocation
|
page read and write
|
||
2429CE80000
|
trusted library section
|
page readonly
|
||
350800401000
|
trusted library allocation
|
page read and write
|
||
4BB00008C000
|
trusted library allocation
|
page read and write
|
||
788000210000
|
direct allocation
|
page read and write
|
||
35080033C000
|
trusted library allocation
|
page read and write
|
||
350800210000
|
trusted library allocation
|
page read and write
|
||
4BB001060000
|
trusted library allocation
|
page read and write
|
||
4BB000454000
|
trusted library allocation
|
page read and write
|
||
4BB000C50000
|
trusted library allocation
|
page read and write
|
||
35080060C000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4BB000E90000
|
trusted library allocation
|
page read and write
|
||
350800614000
|
trusted library allocation
|
page read and write
|
||
7A587FE000
|
stack
|
page read and write
|
||
4BB0003B1000
|
trusted library allocation
|
page read and write
|
||
242A3CC0000
|
trusted library section
|
page read and write
|
||
7A57FFE000
|
unkown
|
page readonly
|
||
242A1AE7000
|
unclassified section
|
page read and write
|
||
4BB000D24000
|
trusted library allocation
|
page read and write
|
||
4BB000750000
|
trusted library allocation
|
page read and write
|
||
7A62FFE000
|
unkown
|
page readonly
|
||
2429D341000
|
heap
|
page read and write
|
||
3CE4000
|
heap
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
4BB000520000
|
trusted library allocation
|
page read and write
|
||
4BB0001F4000
|
trusted library allocation
|
page read and write
|
||
2429989D000
|
heap
|
page read and write
|
||
7A617FA000
|
stack
|
page read and write
|
||
2429D311000
|
heap
|
page read and write
|
||
1B06000
|
heap
|
page read and write
|
||
2429B720000
|
heap
|
page read and write
|
||
3B17000
|
heap
|
page read and write
|
||
4BB000BCC000
|
trusted library allocation
|
page read and write
|
||
4BB000746000
|
trusted library allocation
|
page read and write
|
||
5D440020C000
|
trusted library allocation
|
page read and write
|
||
4BB000350000
|
trusted library allocation
|
page read and write
|
||
4BB0005B4000
|
trusted library allocation
|
page read and write
|
||
7A5AFFE000
|
unkown
|
page readonly
|
||
5D44002A0000
|
trusted library allocation
|
page read and write
|
||
350800320000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
242A3A40000
|
trusted library section
|
page read and write
|
||
4BB0001D8000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
unkown
|
page readonly
|
||
7A4EFFE000
|
unkown
|
page readonly
|
||
4BB00020C000
|
trusted library allocation
|
page read and write
|
||
3BFB000
|
heap
|
page read and write
|
||
4BB0005EC000
|
trusted library allocation
|
page read and write
|
||
3B63000
|
heap
|
page read and write
|
||
350800724000
|
trusted library allocation
|
page read and write
|
||
4BB0001B4000
|
trusted library allocation
|
page read and write
|
||
4BB00009F000
|
trusted library allocation
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
4BB000690000
|
trusted library allocation
|
page read and write
|
||
3C79000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
4BB000F64000
|
trusted library allocation
|
page read and write
|
||
4BB000300000
|
trusted library allocation
|
page read and write
|
||
4BB000454000
|
trusted library allocation
|
page read and write
|
||
7A467FA000
|
stack
|
page read and write
|
||
2429D385000
|
heap
|
page read and write
|
||
4BB000601000
|
trusted library allocation
|
page read and write
|
||
4BB000E84000
|
trusted library allocation
|
page read and write
|
||
4BB000ABC000
|
trusted library allocation
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
4BB00038C000
|
trusted library allocation
|
page read and write
|
||
3AC1000
|
heap
|
page read and write
|
||
4BB000D60000
|
trusted library allocation
|
page read and write
|
||
4BB000C74000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
24299937000
|
heap
|
page read and write
|
||
4BB00033C000
|
trusted library allocation
|
page read and write
|
||
4BB0006F0000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
4BB000CF0000
|
trusted library allocation
|
page read and write
|
||
3999000
|
heap
|
page read and write
|
||
4BB0002A8000
|
trusted library allocation
|
page read and write
|
||
4BB000F20000
|
trusted library allocation
|
page read and write
|
||
4BB00038C000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
unkown
|
page readonly
|
||
4BB000CE8000
|
trusted library allocation
|
page read and write
|
||
4BB000304000
|
trusted library allocation
|
page read and write
|
||
3992000
|
heap
|
page read and write
|
||
4BB0001F8000
|
trusted library allocation
|
page read and write
|
||
3998000
|
heap
|
page read and write
|
||
4BB000214000
|
trusted library allocation
|
page read and write
|
||
2429D2F7000
|
heap
|
page read and write
|
||
4BB00001C000
|
trusted library allocation
|
page read and write
|
||
4BB000344000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page readonly
|
||
2429CDB2000
|
heap
|
page read and write
|
||
4BB000328000
|
trusted library allocation
|
page read and write
|
||
4BB0004E0000
|
trusted library allocation
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
3A3A000
|
heap
|
page read and write
|
||
6C86C000
|
unkown
|
page readonly
|
||
16DA000
|
heap
|
page read and write
|
||
788000284000
|
direct allocation
|
page read and write
|
||
399B000
|
heap
|
page read and write
|
||
2429C170000
|
unkown
|
page read and write
|
||
4BB000EFC000
|
trusted library allocation
|
page read and write
|
||
4BB00060C000
|
trusted library allocation
|
page read and write
|
||
788000201000
|
direct allocation
|
page read and write
|
||
4BB000068000
|
trusted library allocation
|
page read and write
|
||
4BB0002B8000
|
trusted library allocation
|
page read and write
|
||
24299780000
|
heap
|
page read and write
|
||
4BB000680000
|
trusted library allocation
|
page read and write
|
||
4BB0001CC000
|
trusted library allocation
|
page read and write
|
||
35080080C000
|
trusted library allocation
|
page read and write
|
||
350800220000
|
trusted library allocation
|
page read and write
|
||
242A13F0000
|
trusted library section
|
page read and write
|
||
4BB000A6C000
|
trusted library allocation
|
page read and write
|
||
4BB0004B0000
|
trusted library allocation
|
page read and write
|
||
4BB0004B0000
|
trusted library allocation
|
page read and write
|
||
350800700000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
5D44002C0000
|
trusted library allocation
|
page read and write
|
||
7A50FFE000
|
unkown
|
page readonly
|
||
24299AB5000
|
heap
|
page read and write
|
||
5D44002BC000
|
trusted library allocation
|
page read and write
|
||
350800698000
|
trusted library allocation
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
4BB0001A0000
|
trusted library allocation
|
page read and write
|
||
242A3DE0000
|
trusted library section
|
page read and write
|
||
3AF6000
|
heap
|
page read and write
|
||
4BB000547000
|
trusted library allocation
|
page read and write
|
||
350800734000
|
trusted library allocation
|
page read and write
|
||
4BB001050000
|
trusted library allocation
|
page read and write
|
||
3ADE000
|
heap
|
page read and write
|
||
4BB00016C000
|
trusted library allocation
|
page read and write
|
||
4BB0004B0000
|
trusted library allocation
|
page read and write
|
||
5D44002C0000
|
trusted library allocation
|
page read and write
|
||
4BB00074C000
|
trusted library allocation
|
page read and write
|
||
3508007C8000
|
trusted library allocation
|
page read and write
|
||
3C2B000
|
heap
|
page read and write
|
||
3B00000
|
heap
|
page read and write
|
||
4BB000B94000
|
trusted library allocation
|
page read and write
|
||
4BB000890000
|
trusted library allocation
|
page read and write
|
||
3508002FC000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
3A53000
|
heap
|
page read and write
|
||
7A577FE000
|
stack
|
page read and write
|
||
3BAA000
|
heap
|
page read and write
|
||
3508006B8000
|
trusted library allocation
|
page read and write
|
||
4BB0005A0000
|
trusted library allocation
|
page read and write
|
||
4BB000C24000
|
trusted library allocation
|
page read and write
|
||
242A3D86000
|
trusted library section
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
3BCD000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
4BB000F64000
|
trusted library allocation
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
7A4A7FE000
|
stack
|
page read and write
|
||
4BB000CA8000
|
trusted library allocation
|
page read and write
|
||
242999D0000
|
trusted library allocation
|
page read and write
|
||
4BB000230000
|
trusted library allocation
|
page read and write
|
||
350800658000
|
trusted library allocation
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
1B00000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
4BB000D2C000
|
trusted library allocation
|
page read and write
|
||
4BB000AD0000
|
trusted library allocation
|
page read and write
|
||
350800408000
|
trusted library allocation
|
page read and write
|
||
4BB000B08000
|
trusted library allocation
|
page read and write
|
||
2429D318000
|
heap
|
page read and write
|
||
7A4CFFE000
|
unkown
|
page readonly
|
||
2429D37C000
|
heap
|
page read and write
|
||
4BB000734000
|
trusted library allocation
|
page read and write
|
||
7A56FFE000
|
unkown
|
page readonly
|
||
1727000
|
heap
|
page read and write
|
||
242999C0000
|
trusted library allocation
|
page read and write
|
||
7A5E7FE000
|
stack
|
page read and write
|
||
4BB000A90000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
4BB000134000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page readonly
|
||
4BB00033C000
|
trusted library allocation
|
page read and write
|
||
7A3BFFE000
|
unkown
|
page readonly
|
||
3508006FC000
|
trusted library allocation
|
page read and write
|
||
4BB001001000
|
trusted library allocation
|
page read and write
|
||
4BB0008F4000
|
trusted library allocation
|
page read and write
|
||
78800023C000
|
direct allocation
|
page read and write
|
||
242A1487000
|
unclassified section
|
page read and write
|
||
7A657FB000
|
stack
|
page read and write
|
||
35080078C000
|
trusted library allocation
|
page read and write
|
||
7A42FFE000
|
unkown
|
page readonly
|
||
350800758000
|
trusted library allocation
|
page read and write
|
||
7A54FFE000
|
unkown
|
page readonly
|
||
7A5D7FE000
|
stack
|
page read and write
|
||
4BB000724000
|
trusted library allocation
|
page read and write
|
||
4BB000E20000
|
trusted library allocation
|
page read and write
|
||
7A547FD000
|
stack
|
page read and write
|
||
4BB000AEC000
|
trusted library allocation
|
page read and write
|
||
3508006C4000
|
trusted library allocation
|
page read and write
|
||
7A4E7FE000
|
unkown
|
page readonly
|
||
4BB000044000
|
trusted library allocation
|
page read and write
|
||
4BB000CB7000
|
trusted library allocation
|
page read and write
|
||
788000215000
|
direct allocation
|
page read and write
|
||
4BB000874000
|
trusted library allocation
|
page read and write
|
||
7A357EF000
|
stack
|
page read and write
|
||
350800430000
|
trusted library allocation
|
page read and write
|
||
4BB0010F4000
|
trusted library allocation
|
page read and write
|
||
350800760000
|
trusted library allocation
|
page read and write
|
||
35080039C000
|
trusted library allocation
|
page read and write
|
||
4BB0004DC000
|
trusted library allocation
|
page read and write
|
||
4BB000DC8000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page write copy
|
||
6C740000
|
unkown
|
page readonly
|
||
3B1F000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
3508002EC000
|
trusted library allocation
|
page read and write
|
||
2429CDB2000
|
heap
|
page read and write
|
||
7A4B7FA000
|
stack
|
page read and write
|
||
3993000
|
heap
|
page read and write
|
||
3508002F4000
|
trusted library allocation
|
page read and write
|
||
7A637FE000
|
stack
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
242A2F43000
|
trusted library section
|
page read and write
|
||
3AA8000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
5D4400288000
|
trusted library allocation
|
page read and write
|
||
4BB00014C000
|
trusted library allocation
|
page read and write
|
||
7A3C7FB000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
7A5CFFE000
|
unkown
|
page readonly
|
||
7A607FE000
|
stack
|
page read and write
|
||
350800678000
|
trusted library allocation
|
page read and write
|
||
2429D381000
|
heap
|
page read and write
|
||
4BB0001D0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
242A3CB0000
|
trusted library section
|
page read and write
|
||
5D44002B0000
|
trusted library allocation
|
page read and write
|
||
242A1540000
|
heap
|
page read and write
|
||
4BB0004FC000
|
trusted library allocation
|
page read and write
|
||
350800330000
|
trusted library allocation
|
page read and write
|
||
2429CDA9000
|
heap
|
page read and write
|
||
1692000
|
heap
|
page read and write
|
||
242A3C60000
|
trusted library section
|
page read and write
|
||
7A3DFFE000
|
unkown
|
page readonly
|
||
3508006B0000
|
trusted library allocation
|
page read and write
|
||
4BB001018000
|
trusted library allocation
|
page read and write
|
||
399A000
|
heap
|
page read and write
|
||
242A35C0000
|
trusted library section
|
page read and write
|
||
4BB000364000
|
trusted library allocation
|
page read and write
|
||
399C000
|
heap
|
page read and write
|
||
4BB000290000
|
trusted library allocation
|
page read and write
|
||
350800664000
|
trusted library allocation
|
page read and write
|
||
4BB00066C000
|
trusted library allocation
|
page read and write
|
||
78800020C000
|
direct allocation
|
page read and write
|
||
7A3F7FA000
|
stack
|
page read and write
|
||
4BB000760000
|
trusted library allocation
|
page read and write
|
||
1B07000
|
heap
|
page read and write
|
||
350800601000
|
trusted library allocation
|
page read and write
|
||
7A627FC000
|
stack
|
page read and write
|
||
7A5F7FE000
|
stack
|
page read and write
|
||
3CBE000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
3B34000
|
heap
|
page read and write
|
||
242A3CE3000
|
trusted library section
|
page read and write
|
||
1BA3000
|
heap
|
page read and write
|
||
4BB00027C000
|
trusted library allocation
|
page read and write
|
||
4BB0008C4000
|
trusted library allocation
|
page read and write
|
||
330E000
|
unkown
|
page read and write
|
||
3C63000
|
heap
|
page read and write
|
||
7A477FE000
|
stack
|
page read and write
|
||
3508006C8000
|
trusted library allocation
|
page read and write
|
||
399C000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
4BB000B28000
|
trusted library allocation
|
page read and write
|
||
399D000
|
heap
|
page read and write
|
There are 901 hidden memdumps, click here to show them.