Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_3357012b-afc2-4ce1-8a80-97b8a19367d5\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9493.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Nov 20 06:43:42 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96D6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9715.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2344 --field-trial-handle=2288,i,13659262306711728506,10044416239289748957,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7152 -s 1828
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/82295
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://www.google.com/es-USx(
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
http://anglebug.com/6876)
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en/
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/35022
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.185.196
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.196
|
www.google.com
|
United States
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6E31000
|
heap
|
page read and write
|
||
7AAD000
|
heap
|
page read and write
|
||
62300023C000
|
direct allocation
|
page read and write
|
||
70477FE000
|
unkown
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
6E31000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
12F0000
|
heap
|
page read and write
|
||
197C02420000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
7C29000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
17358F4C000
|
heap
|
page read and write
|
||
197C022E0000
|
trusted library allocation
|
page read and write
|
||
197C031F4000
|
trusted library allocation
|
page read and write
|
||
197C02C24000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
1735F356000
|
trusted library section
|
page read and write
|
||
7862000
|
direct allocation
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
706FFFE000
|
unkown
|
page readonly
|
||
197C02410000
|
trusted library allocation
|
page read and write
|
||
173578C0000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
67A000
|
stack
|
page read and write
|
||
197C02550000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C03250000
|
trusted library allocation
|
page read and write
|
||
70487FF000
|
stack
|
page read and write
|
||
17355840000
|
heap
|
page read and write
|
||
7AA9000
|
heap
|
page read and write
|
||
197C023C4000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
17358F52000
|
heap
|
page read and write
|
||
7AA1000
|
heap
|
page read and write
|
||
7D4B000
|
heap
|
page read and write
|
||
197C00C01000
|
trusted library allocation
|
page read and write
|
||
17358F6C000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
17358F6C000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
704FFFE000
|
unkown
|
page readonly
|
||
6E31000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
31C800664000
|
trusted library allocation
|
page read and write
|
||
197C02613000
|
trusted library allocation
|
page read and write
|
||
17358F6C000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
17355978000
|
heap
|
page read and write
|
||
7884002C0000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
788400201000
|
trusted library allocation
|
page read and write
|
||
197C02DB0000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
7059FFE000
|
unkown
|
page readonly
|
||
7AA8000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
705CFFE000
|
unkown
|
page readonly
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
197C02BDB000
|
trusted library allocation
|
page read and write
|
||
197C03150000
|
trusted library allocation
|
page read and write
|
||
31C800320000
|
trusted library allocation
|
page read and write
|
||
7068FFE000
|
unkown
|
page readonly
|
||
6E31000
|
heap
|
page read and write
|
||
197C0238C000
|
trusted library allocation
|
page read and write
|
||
197C02F3C000
|
trusted library allocation
|
page read and write
|
||
1735F3BE000
|
trusted library section
|
page read and write
|
||
705D7FB000
|
stack
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
7B84000
|
heap
|
page read and write
|
||
197C025EC000
|
trusted library allocation
|
page read and write
|
||
197C02FE0000
|
trusted library allocation
|
page read and write
|
||
31C800754000
|
trusted library allocation
|
page read and write
|
||
197C023E8000
|
trusted library allocation
|
page read and write
|
||
31C800390000
|
trusted library allocation
|
page read and write
|
||
7BB3000
|
heap
|
page read and write
|
||
17358F49000
|
heap
|
page read and write
|
||
17358F4A000
|
heap
|
page read and write
|
||
70617FC000
|
stack
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
173559B3000
|
heap
|
page read and write
|
||
31C800784000
|
trusted library allocation
|
page read and write
|
||
7E76000
|
heap
|
page read and write
|
||
197C02BE4000
|
trusted library allocation
|
page read and write
|
||
17358F97000
|
heap
|
page read and write
|
||
197C02CC8000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1735FE51000
|
trusted library section
|
page read and write
|
||
7064FFE000
|
unkown
|
page readonly
|
||
17358F69000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
1735F2BE000
|
trusted library section
|
page read and write
|
||
31C800750000
|
trusted library allocation
|
page read and write
|
||
197C02A0F000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F64000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C031E0000
|
trusted library allocation
|
page read and write
|
||
17359650000
|
trusted library section
|
page read and write
|
||
197C023B4000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
79BB000
|
direct allocation
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
7B68000
|
heap
|
page read and write
|
||
197C0328C000
|
trusted library allocation
|
page read and write
|
||
197C03150000
|
trusted library allocation
|
page read and write
|
||
197C0315C000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
7C68000
|
heap
|
page read and write
|
||
7BCA000
|
heap
|
page read and write
|
||
197C02801000
|
trusted library allocation
|
page read and write
|
||
31C8006D0000
|
trusted library allocation
|
page read and write
|
||
31C800320000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C03108000
|
trusted library allocation
|
page read and write
|
||
7884002B0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
17359474000
|
heap
|
page read and write
|
||
17358F70000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
197C02C68000
|
trusted library allocation
|
page read and write
|
||
17358F4A000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
1735FB0E000
|
trusted library section
|
page read and write
|
||
17358F20000
|
heap
|
page read and write
|
||
197C02864000
|
trusted library allocation
|
page read and write
|
||
788400270000
|
trusted library allocation
|
page read and write
|
||
197C02F08000
|
trusted library allocation
|
page read and write
|
||
7884002A0000
|
trusted library allocation
|
page read and write
|
||
70537FE000
|
stack
|
page read and write
|
||
197C02240000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C028E4000
|
trusted library allocation
|
page read and write
|
||
197C032B8000
|
trusted library allocation
|
page read and write
|
||
7AA6000
|
heap
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
197C02278000
|
trusted library allocation
|
page read and write
|
||
1735F2A0000
|
trusted library section
|
page read and write
|
||
197C02283000
|
trusted library allocation
|
page read and write
|
||
62300020C000
|
direct allocation
|
page read and write
|
||
7C3D000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F4D000
|
heap
|
page read and write
|
||
31C8002CC000
|
trusted library allocation
|
page read and write
|
||
197C03234000
|
trusted library allocation
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
197C02418000
|
trusted library allocation
|
page read and write
|
||
7884002B0000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02E44000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7AAF000
|
heap
|
page read and write
|
||
17358F4E000
|
heap
|
page read and write
|
||
197C03218000
|
trusted library allocation
|
page read and write
|
||
31C800730000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
17358F5B000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C02CE8000
|
trusted library allocation
|
page read and write
|
||
70697FD000
|
stack
|
page read and write
|
||
197C02550000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
1735FDC0000
|
trusted library section
|
page read and write
|
||
197C02894000
|
trusted library allocation
|
page read and write
|
||
31C800238000
|
trusted library allocation
|
page read and write
|
||
197C023B4000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C026E0000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
31C800374000
|
trusted library allocation
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C023B4000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
197C02D34000
|
trusted library allocation
|
page read and write
|
||
197C030A3000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F9F000
|
heap
|
page read and write
|
||
197C02230000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
F40000
|
direct allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C02510000
|
trusted library allocation
|
page read and write
|
||
197C02AD8000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02EA8000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
197C02684000
|
trusted library allocation
|
page read and write
|
||
7067FFE000
|
unkown
|
page readonly
|
||
197C029A4000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C028C5000
|
trusted library allocation
|
page read and write
|
||
197C03044000
|
trusted library allocation
|
page read and write
|
||
17358F6C000
|
heap
|
page read and write
|
||
31C8006D4000
|
trusted library allocation
|
page read and write
|
||
31C8003EC000
|
trusted library allocation
|
page read and write
|
||
17359390000
|
trusted library section
|
page read and write
|
||
17358F30000
|
heap
|
page read and write
|
||
7884002C8000
|
trusted library allocation
|
page read and write
|
||
197C02F68000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7BBB000
|
heap
|
page read and write
|
||
197C024F3000
|
trusted library allocation
|
page read and write
|
||
197C02544000
|
trusted library allocation
|
page read and write
|
||
197C02C98000
|
trusted library allocation
|
page read and write
|
||
70567FD000
|
stack
|
page read and write
|
||
704E7FB000
|
stack
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C023EC000
|
trusted library allocation
|
page read and write
|
||
788400260000
|
trusted library allocation
|
page read and write
|
||
7C0E000
|
heap
|
page read and write
|
||
70737FE000
|
stack
|
page read and write
|
||
197C03058000
|
trusted library allocation
|
page read and write
|
||
7AA6000
|
heap
|
page read and write
|
||
17358FB0000
|
heap
|
page read and write
|
||
197C03224000
|
trusted library allocation
|
page read and write
|
||
7BE4000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02DC4000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
623000210000
|
direct allocation
|
page read and write
|
||
623000274000
|
direct allocation
|
page read and write
|
||
7B35000
|
heap
|
page read and write
|
||
197C02910000
|
trusted library allocation
|
page read and write
|
||
6230002E4000
|
direct allocation
|
page read and write
|
||
31C8002D4000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02F08000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
6C20C000
|
unkown
|
page readonly
|
||
1735FB00000
|
trusted library section
|
page read and write
|
||
1CC0000
|
direct allocation
|
page execute and read and write
|
||
197C0227E000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
197C02C3C000
|
trusted library allocation
|
page read and write
|
||
705B7FB000
|
stack
|
page read and write
|
||
1735F157000
|
unclassified section
|
page read and write
|
||
31C8002FC000
|
trusted library allocation
|
page read and write
|
||
623000230000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
197C02B94000
|
trusted library allocation
|
page read and write
|
||
705DFFE000
|
unkown
|
page readonly
|
||
7AAE000
|
heap
|
page read and write
|
||
7884002F0000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
31C800401000
|
trusted library allocation
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
623000217000
|
direct allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C0300C000
|
trusted library allocation
|
page read and write
|
||
197C0255C000
|
trusted library allocation
|
page read and write
|
||
7E97000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
173558E0000
|
heap
|
page read and write
|
||
1735F7B0000
|
trusted library section
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
197C02BA0000
|
trusted library allocation
|
page read and write
|
||
70467EF000
|
stack
|
page read and write
|
||
197C02FF8000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F69000
|
heap
|
page read and write
|
||
7B43000
|
heap
|
page read and write
|
||
70637FD000
|
stack
|
page read and write
|
||
1735FE40000
|
trusted library section
|
page read and write
|
||
705EFFE000
|
unkown
|
page readonly
|
||
7B5A000
|
heap
|
page read and write
|
||
7C0C000
|
heap
|
page read and write
|
||
197C027DC000
|
trusted library allocation
|
page read and write
|
||
7B6A000
|
heap
|
page read and write
|
||
197C03030000
|
trusted library allocation
|
page read and write
|
||
197C02FC0000
|
trusted library allocation
|
page read and write
|
||
7884002A0000
|
trusted library allocation
|
page read and write
|
||
31C800644000
|
trusted library allocation
|
page read and write
|
||
7C4D000
|
heap
|
page read and write
|
||
31C800640000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
31C8007D0000
|
trusted library allocation
|
page read and write
|
||
706AFFE000
|
unkown
|
page readonly
|
||
173594A6000
|
heap
|
page read and write
|
||
17358F7B000
|
heap
|
page read and write
|
||
7075FFE000
|
unkown
|
page readonly
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
8F4000
|
heap
|
page read and write
|
||
17358F64000
|
heap
|
page read and write
|
||
197C03201000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
7DD5000
|
heap
|
page read and write
|
||
1735F120000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
197C02F08000
|
trusted library allocation
|
page read and write
|
||
173559CF000
|
heap
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
197C02D20000
|
trusted library allocation
|
page read and write
|
||
197C0229F000
|
trusted library allocation
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
17358F4D000
|
heap
|
page read and write
|
||
197C0234C000
|
trusted library allocation
|
page read and write
|
||
7B71000
|
heap
|
page read and write
|
||
7AA1000
|
heap
|
page read and write
|
||
7AA1000
|
heap
|
page read and write
|
||
31C800380000
|
trusted library allocation
|
page read and write
|
||
197C0276C000
|
trusted library allocation
|
page read and write
|
||
31C80039C000
|
trusted library allocation
|
page read and write
|
||
197C02570000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C02A7C000
|
trusted library allocation
|
page read and write
|
||
197C02580000
|
trusted library allocation
|
page read and write
|
||
173594C7000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C0301C000
|
trusted library allocation
|
page read and write
|
||
623000303000
|
direct allocation
|
page read and write
|
||
197C0260C000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02530000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
17358F69000
|
heap
|
page read and write
|
||
31C80078C000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
7058FFE000
|
unkown
|
page readonly
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F4D000
|
heap
|
page read and write
|
||
197C027B8000
|
trusted library allocation
|
page read and write
|
||
1735FFBE000
|
trusted library section
|
page read and write
|
||
197C024B4000
|
trusted library allocation
|
page read and write
|
||
7AA9000
|
heap
|
page read and write
|
||
31C8006E0000
|
trusted library allocation
|
page read and write
|
||
17355810000
|
heap
|
page read and write
|
||
197C02F2C000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
7B93000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
17358F69000
|
heap
|
page read and write
|
||
704AFFE000
|
unkown
|
page readonly
|
||
197C02FA4000
|
trusted library allocation
|
page read and write
|
||
197C031B4000
|
trusted library allocation
|
page read and write
|
||
1735F372000
|
trusted library section
|
page read and write
|
||
197C026BC000
|
trusted library allocation
|
page read and write
|
||
31C800418000
|
trusted library allocation
|
page read and write
|
||
197C02EF8000
|
trusted library allocation
|
page read and write
|
||
197C02288000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
173594FC000
|
heap
|
page read and write
|
||
197C0280C000
|
trusted library allocation
|
page read and write
|
||
17358F51000
|
heap
|
page read and write
|
||
31C80060C000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7D72000
|
heap
|
page read and write
|
||
197C00A01000
|
trusted library allocation
|
page read and write
|
||
197C032C8000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
31C800678000
|
trusted library allocation
|
page read and write
|
||
31C800288000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
17358F97000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C02494000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C0315C000
|
trusted library allocation
|
page read and write
|
||
197C02318000
|
trusted library allocation
|
page read and write
|
||
706F7FD000
|
stack
|
page read and write
|
||
17358F4D000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
31C8006B4000
|
trusted library allocation
|
page read and write
|
||
31C8006F0000
|
trusted library allocation
|
page read and write
|
||
F61000
|
unkown
|
page execute and write copy
|
||
197C02528000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
31C8002B8000
|
trusted library allocation
|
page read and write
|
||
173558C0000
|
trusted library section
|
page readonly
|
||
197C0306C000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
7884002C0000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
31C800601000
|
trusted library allocation
|
page read and write
|
||
7DAE000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C02A54000
|
trusted library allocation
|
page read and write
|
||
197C02ECC000
|
trusted library allocation
|
page read and write
|
||
1D33000
|
heap
|
page read and write
|
||
31C8006E8000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C028DC000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C03150000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F69000
|
heap
|
page read and write
|
||
7AA9000
|
heap
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
1CD0000
|
direct allocation
|
page execute and read and write
|
||
7AAA000
|
heap
|
page read and write
|
||
197C02628000
|
trusted library allocation
|
page read and write
|
||
7AAF000
|
heap
|
page read and write
|
||
788400230000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
173592F0000
|
trusted library section
|
page read and write
|
||
19F4000
|
unkown
|
page execute and write copy
|
||
173594E3000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C031BC000
|
trusted library allocation
|
page read and write
|
||
197C024A4000
|
trusted library allocation
|
page read and write
|
||
7C44000
|
heap
|
page read and write
|
||
7884002E4000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
17358F54000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
197C028C8000
|
trusted library allocation
|
page read and write
|
||
197C02F48000
|
trusted library allocation
|
page read and write
|
||
197C03090000
|
trusted library allocation
|
page read and write
|
||
197C02498000
|
trusted library allocation
|
page read and write
|
||
7AAB000
|
heap
|
page read and write
|
||
197C02E90000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C0253C000
|
trusted library allocation
|
page read and write
|
||
197C023B4000
|
trusted library allocation
|
page read and write
|
||
31C800220000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
623000220000
|
direct allocation
|
page read and write
|
||
17358F6E000
|
heap
|
page read and write
|
||
706D7FE000
|
stack
|
page read and write
|
||
197C026F0000
|
trusted library allocation
|
page read and write
|
||
173594CF000
|
heap
|
page read and write
|
||
7AAA000
|
heap
|
page read and write
|
||
17355880000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
197C02EF8000
|
trusted library allocation
|
page read and write
|
||
7AA7000
|
heap
|
page read and write
|
||
197C02C2C000
|
trusted library allocation
|
page read and write
|
||
1CB0000
|
direct allocation
|
page read and write
|
||
197C0220C000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358FB1000
|
heap
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
1735D94E000
|
heap
|
page read and write
|
||
31C800734000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F62000
|
heap
|
page read and write
|
||
7DFD000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
197C027EC000
|
trusted library allocation
|
page read and write
|
||
70717FC000
|
stack
|
page read and write
|
||
6C1BF000
|
unkown
|
page readonly
|
||
7AA4000
|
heap
|
page read and write
|
||
197C02394000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C03050000
|
trusted library allocation
|
page read and write
|
||
197C031C8000
|
trusted library allocation
|
page read and write
|
||
704BFFE000
|
unkown
|
page readonly
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C0253C000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
17358F56000
|
heap
|
page read and write
|
||
17359499000
|
heap
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
17355890000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page readonly
|
||
197C023AC000
|
trusted library allocation
|
page read and write
|
||
7BD7000
|
heap
|
page read and write
|
||
7C8A000
|
heap
|
page read and write
|
||
197C028D0000
|
trusted library allocation
|
page read and write
|
||
197C032B4000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
197C026E8000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
unkown
|
page write copy
|
||
173594B6000
|
heap
|
page read and write
|
||
1735FF22000
|
trusted library section
|
page read and write
|
||
623000280000
|
direct allocation
|
page read and write
|
||
197C02CB4000
|
trusted library allocation
|
page read and write
|
||
197C03118000
|
trusted library allocation
|
page read and write
|
||
1735FE63000
|
trusted library section
|
page read and write
|
||
17358F5E000
|
heap
|
page read and write
|
||
6C1BD000
|
unkown
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
197C02500000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
197C030BC000
|
trusted library allocation
|
page read and write
|
||
17358F5C000
|
heap
|
page read and write
|
||
31C800620000
|
trusted library allocation
|
page read and write
|
||
197C023D8000
|
trusted library allocation
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C02544000
|
trusted library allocation
|
page read and write
|
||
31C8002B0000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
31C800718000
|
trusted library allocation
|
page read and write
|
||
197C02EBC000
|
trusted library allocation
|
page read and write
|
||
31C800320000
|
trusted library allocation
|
page read and write
|
||
31C800201000
|
trusted library allocation
|
page read and write
|
||
62300024C000
|
direct allocation
|
page read and write
|
||
7070FFE000
|
unkown
|
page readonly
|
||
197C023AC000
|
trusted library allocation
|
page read and write
|
||
197C028F8000
|
trusted library allocation
|
page read and write
|
||
197C02E01000
|
trusted library allocation
|
page read and write
|
||
7051FFE000
|
unkown
|
page readonly
|
||
1735F313000
|
trusted library section
|
page read and write
|
||
6230002D0000
|
direct allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
7C6D000
|
heap
|
page read and write
|
||
1735F3F3000
|
trusted library section
|
page read and write
|
||
7056FFE000
|
unkown
|
page readonly
|
||
17358F5C000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
197C0291C000
|
trusted library allocation
|
page read and write
|
||
17358F6C000
|
heap
|
page read and write
|
||
17358F6E000
|
heap
|
page read and write
|
||
72B0000
|
direct allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
197C02401000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
31C800684000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
70757FE000
|
stack
|
page read and write
|
||
17355820000
|
heap
|
page readonly
|
||
31C800424000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
197C02F60000
|
trusted library allocation
|
page read and write
|
||
197C030A4000
|
trusted library allocation
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
1735F2B2000
|
trusted library section
|
page read and write
|
||
70527FC000
|
stack
|
page read and write
|
||
17358F5C000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C0315C000
|
trusted library allocation
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
31C8006FC000
|
trusted library allocation
|
page read and write
|
||
7B6B000
|
heap
|
page read and write
|
||
197C02878000
|
trusted library allocation
|
page read and write
|
||
31C800310000
|
trusted library allocation
|
page read and write
|
||
704CFFE000
|
unkown
|
page readonly
|
||
17358F73000
|
heap
|
page read and write
|
||
197C029B8000
|
trusted library allocation
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
197C0288C000
|
trusted library allocation
|
page read and write
|
||
7060FFE000
|
unkown
|
page readonly
|
||
197C024BA000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C0281C000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
6230002AC000
|
direct allocation
|
page read and write
|
||
704B7FE000
|
stack
|
page read and write
|
||
197C02BD0000
|
trusted library allocation
|
page read and write
|
||
197C02414000
|
trusted library allocation
|
page read and write
|
||
788400220000
|
trusted library allocation
|
page read and write
|
||
17358F97000
|
heap
|
page read and write
|
||
197C028E1000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
9FE000
|
unkown
|
page write copy
|
||
7B3E000
|
heap
|
page read and write
|
||
197C02E80000
|
trusted library allocation
|
page read and write
|
||
7049FFE000
|
unkown
|
page readonly
|
||
7055FFE000
|
unkown
|
page readonly
|
||
788400278000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
17358F77000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C02530000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
31C800248000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F62000
|
heap
|
page read and write
|
||
78840020C000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7062FFE000
|
unkown
|
page readonly
|
||
188F000
|
stack
|
page read and write
|
||
197C00001000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1735F3B2000
|
trusted library section
|
page read and write
|
||
7AAC000
|
heap
|
page read and write
|
||
705A7FC000
|
stack
|
page read and write
|
||
197C02E1C000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C023C8000
|
trusted library allocation
|
page read and write
|
||
1735FDD1000
|
trusted library section
|
page read and write
|
||
17358F69000
|
heap
|
page read and write
|
||
7884002C0000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
1735F0D0000
|
heap
|
page read and write
|
||
623000201000
|
direct allocation
|
page read and write
|
||
31C800624000
|
trusted library allocation
|
page read and write
|
||
197C023F8000
|
trusted library allocation
|
page read and write
|
||
1735FAB7000
|
unclassified section
|
page read and write
|
||
31C800760000
|
trusted library allocation
|
page read and write
|
||
197C02CD8000
|
trusted library allocation
|
page read and write
|
||
7065FFE000
|
unkown
|
page readonly
|
||
197C0220C000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C02E80000
|
trusted library allocation
|
page read and write
|
||
197C024E0000
|
trusted library allocation
|
page read and write
|
||
197C02A0C000
|
trusted library allocation
|
page read and write
|
||
197C02328000
|
trusted library allocation
|
page read and write
|
||
6C0E0000
|
unkown
|
page readonly
|
||
75E000
|
stack
|
page read and write
|
||
788400264000
|
trusted library allocation
|
page read and write
|
||
17358F5A000
|
heap
|
page read and write
|
||
197C0296C000
|
trusted library allocation
|
page read and write
|
||
173559C9000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page write copy
|
||
840000
|
heap
|
page read and write
|
||
197C02B14000
|
trusted library allocation
|
page read and write
|
||
7071FFE000
|
unkown
|
page readonly
|
||
6E31000
|
heap
|
page read and write
|
||
197C022D0000
|
trusted library allocation
|
page read and write
|
||
623000250000
|
direct allocation
|
page read and write
|
||
197C032A4000
|
trusted library allocation
|
page read and write
|
||
197C024FB000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
197C02C78000
|
trusted library allocation
|
page read and write
|
||
706EFFE000
|
unkown
|
page readonly
|
||
B10000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
8F4000
|
heap
|
page read and write
|
||
7AA6000
|
heap
|
page read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
197C0249C000
|
trusted library allocation
|
page read and write
|
||
7C9F000
|
heap
|
page read and write
|
||
7B84000
|
heap
|
page read and write
|
||
70597FE000
|
stack
|
page read and write
|
||
197C022F0000
|
trusted library allocation
|
page read and write
|
||
197C027A4000
|
trusted library allocation
|
page read and write
|
||
7047FFE000
|
unkown
|
page readonly
|
||
197C023F4000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
7884002B0000
|
trusted library allocation
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
31C800310000
|
trusted library allocation
|
page read and write
|
||
197C02DB8000
|
trusted library allocation
|
page read and write
|
||
1CB0000
|
direct allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
197C024F0000
|
trusted library allocation
|
page read and write
|
||
197C02E75000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
31C80069C000
|
trusted library allocation
|
page read and write
|
||
7884002F4000
|
trusted library allocation
|
page read and write
|
||
17358F58000
|
heap
|
page read and write
|
||
197C02D94000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
7884002A0000
|
trusted library allocation
|
page read and write
|
||
197C02B34000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
7074FFE000
|
unkown
|
page readonly
|
||
70517FB000
|
stack
|
page read and write
|
||
197C0316C000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
788400250000
|
trusted library allocation
|
page read and write
|
||
173559C9000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
704C7FD000
|
stack
|
page read and write
|
||
197C0277C000
|
trusted library allocation
|
page read and write
|
||
197C0226C000
|
trusted library allocation
|
page read and write
|
||
31C800714000
|
trusted library allocation
|
page read and write
|
||
7BC6000
|
heap
|
page read and write
|
||
197C00E01000
|
trusted library allocation
|
page read and write
|
||
78A1000
|
heap
|
page read and write
|
||
1735D4D0000
|
trusted library allocation
|
page read and write
|
||
197C02858000
|
trusted library allocation
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
197C0309C000
|
trusted library allocation
|
page read and write
|
||
7B6A000
|
heap
|
page read and write
|
||
197C02201000
|
trusted library allocation
|
page read and write
|
||
197C02D9C000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
7061FFE000
|
unkown
|
page readonly
|
||
197C02C0C000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C02D44000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
623000294000
|
direct allocation
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
31C8006B0000
|
trusted library allocation
|
page read and write
|
||
706E7FE000
|
stack
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02504000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C023F0000
|
trusted library allocation
|
page read and write
|
||
7884002A0000
|
trusted library allocation
|
page read and write
|
||
197C0251C000
|
trusted library allocation
|
page read and write
|
||
623000260000
|
direct allocation
|
page read and write
|
||
7C37000
|
heap
|
page read and write
|
||
31C800320000
|
trusted library allocation
|
page read and write
|
||
31C800354000
|
trusted library allocation
|
page read and write
|
||
17358F76000
|
heap
|
page read and write
|
||
17358F4E000
|
heap
|
page read and write
|
||
706DFFE000
|
unkown
|
page readonly
|
||
197C03084000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7AAB000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
705F7FB000
|
stack
|
page read and write
|
||
623000270000
|
direct allocation
|
page read and write
|
||
197C03001000
|
trusted library allocation
|
page read and write
|
||
1735950E000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
31C80027C000
|
trusted library allocation
|
page read and write
|
||
31C800610000
|
trusted library allocation
|
page read and write
|
||
6230002A8000
|
direct allocation
|
page read and write
|
||
197C03140000
|
trusted library allocation
|
page read and write
|
||
1735FAF7000
|
unclassified section
|
page read and write
|
||
197C030B0000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
31C8006E4000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
1735B064000
|
trusted library allocation
|
page read and write
|
||
197C02B20000
|
trusted library allocation
|
page read and write
|
||
7C3F000
|
heap
|
page read and write
|
||
31C8006AC000
|
trusted library allocation
|
page read and write
|
||
197C03100000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
70707FA000
|
stack
|
page read and write
|
||
70727FE000
|
stack
|
page read and write
|
||
197C02FF0000
|
trusted library allocation
|
page read and write
|
||
31C80080C000
|
trusted library allocation
|
page read and write
|
||
17358F4B000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C02E44000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
197C0260F000
|
trusted library allocation
|
page read and write
|
||
197C0235C000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
17358F4F000
|
heap
|
page read and write
|
||
7AAF000
|
heap
|
page read and write
|
||
17358F4E000
|
heap
|
page read and write
|
||
197C02B54000
|
trusted library allocation
|
page read and write
|
||
70627FE000
|
stack
|
page read and write
|
||
31C80025C000
|
trusted library allocation
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
1735D98D000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
197C02790000
|
trusted library allocation
|
page read and write
|
||
1735FFB0000
|
trusted library section
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
1735FE30000
|
trusted library section
|
page read and write
|
||
31C800698000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
623000290000
|
direct allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
1735FDE0000
|
trusted library section
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
704F7FE000
|
stack
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
1D37000
|
heap
|
page read and write
|
||
1735FF60000
|
trusted library section
|
page read and write
|
||
197C02E8C000
|
trusted library allocation
|
page read and write
|
||
6C0E1000
|
unkown
|
page execute read
|
||
197C02F20000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
704D7FB000
|
stack
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02580000
|
trusted library allocation
|
page read and write
|
||
197C02EE0000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
17358F4C000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C02494000
|
trusted library allocation
|
page read and write
|
||
788400248000
|
trusted library allocation
|
page read and write
|
||
197C02550000
|
trusted library allocation
|
page read and write
|
||
17358FB1000
|
heap
|
page read and write
|
||
7AA6000
|
heap
|
page read and write
|
||
197C02D88000
|
trusted library allocation
|
page read and write
|
||
197C03284000
|
trusted library allocation
|
page read and write
|
||
197C02910000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
197C0302C000
|
trusted library allocation
|
page read and write
|
||
7AAE000
|
heap
|
page read and write
|
||
1735947F000
|
heap
|
page read and write
|
||
6C209000
|
unkown
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
197C02BAC000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
706BFFE000
|
unkown
|
page readonly
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1735F37D000
|
trusted library section
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
197C0253C000
|
trusted library allocation
|
page read and write
|
||
17358F6A000
|
heap
|
page read and write
|
||
706C7FE000
|
stack
|
page read and write
|
||
706CFFE000
|
unkown
|
page readonly
|
||
705FFFE000
|
unkown
|
page readonly
|
||
197C029AC000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C02E40000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
31C8002E4000
|
trusted library allocation
|
page read and write
|
||
197C02494000
|
trusted library allocation
|
page read and write
|
||
17358F75000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02AEC000
|
trusted library allocation
|
page read and write
|
||
70497FE000
|
stack
|
page read and write
|
||
197C02550000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
70647FB000
|
stack
|
page read and write
|
||
197C02494000
|
trusted library allocation
|
page read and write
|
||
70577FA000
|
stack
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C030C0000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02A40000
|
trusted library allocation
|
page read and write
|
||
197C02EBC000
|
trusted library allocation
|
page read and write
|
||
31C8006B8000
|
trusted library allocation
|
page read and write
|
||
197C02490000
|
trusted library allocation
|
page read and write
|
||
197C02504000
|
trusted library allocation
|
page read and write
|
||
17358F76000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
788400288000
|
trusted library allocation
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
17358F5D000
|
heap
|
page read and write
|
||
7052FFE000
|
unkown
|
page readonly
|
||
197C029F8000
|
trusted library allocation
|
page read and write
|
||
17358F6A000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
197C03078000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
31C800700000
|
trusted library allocation
|
page read and write
|
||
197C02580000
|
trusted library allocation
|
page read and write
|
||
197C02334000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
31C800694000
|
trusted library allocation
|
page read and write
|
||
197C023E0000
|
trusted library allocation
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
197C0242C000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
7C7D000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
788400274000
|
trusted library allocation
|
page read and write
|
||
80E000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
31C800801000
|
trusted library allocation
|
page read and write
|
||
7066FFE000
|
unkown
|
page readonly
|
||
17358F6A000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
623000234000
|
direct allocation
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
1735D985000
|
heap
|
page read and write
|
||
197C03190000
|
trusted library allocation
|
page read and write
|
||
17355C35000
|
heap
|
page read and write
|
||
197C02938000
|
trusted library allocation
|
page read and write
|
||
70587FE000
|
stack
|
page read and write
|
||
197C024F0000
|
trusted library allocation
|
page read and write
|
||
17358F6A000
|
heap
|
page read and write
|
||
31C800368000
|
trusted library allocation
|
page read and write
|
||
31C8006CC000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F7F000
|
heap
|
page read and write
|
||
7C61000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
197C01001000
|
trusted library allocation
|
page read and write
|
||
197C023D4000
|
trusted library allocation
|
page read and write
|
||
197C02C01000
|
trusted library allocation
|
page read and write
|
||
7063FFE000
|
unkown
|
page readonly
|
||
197C028EC000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
17358F54000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C029C8000
|
trusted library allocation
|
page read and write
|
||
17358F49000
|
heap
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C0289C000
|
trusted library allocation
|
page read and write
|
||
31C800330000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
7B5D000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C0320C000
|
trusted library allocation
|
page read and write
|
||
197C00801000
|
trusted library allocation
|
page read and write
|
||
197C02580000
|
trusted library allocation
|
page read and write
|
||
197C02F10000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
31C8002F4000
|
trusted library allocation
|
page read and write
|
||
197C022A8000
|
trusted library allocation
|
page read and write
|
||
31C800364000
|
trusted library allocation
|
page read and write
|
||
31C800404000
|
trusted library allocation
|
page read and write
|
||
7BF7000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
197C024A8000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
31C80075C000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
1735FDFE000
|
trusted library section
|
page read and write
|
||
623000284000
|
direct allocation
|
page read and write
|
||
197C0288D000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
17355985000
|
heap
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
197C023DC000
|
trusted library allocation
|
page read and write
|
||
31C8007C8000
|
trusted library allocation
|
page read and write
|
||
197C02B78000
|
trusted library allocation
|
page read and write
|
||
7AA4000
|
heap
|
page read and write
|
||
197C02564000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
31C800330000
|
trusted library allocation
|
page read and write
|
||
197C02494000
|
trusted library allocation
|
page read and write
|
||
7AA7000
|
heap
|
page read and write
|
||
17355BE0000
|
heap
|
page read and write
|
||
31C800408000
|
trusted library allocation
|
page read and write
|
||
31C800614000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
1735F137000
|
unclassified section
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
70507FB000
|
stack
|
page read and write
|
||
7E5E000
|
heap
|
page read and write
|
||
31C80033C000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7AA9000
|
heap
|
page read and write
|
||
31C800430000
|
trusted library allocation
|
page read and write
|
||
197C02B00000
|
trusted library allocation
|
page read and write
|
||
7C81000
|
heap
|
page read and write
|
||
31C800210000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
197C03140000
|
trusted library allocation
|
page read and write
|
||
704EFFE000
|
unkown
|
page readonly
|
||
197C0240C000
|
trusted library allocation
|
page read and write
|
||
197C030EC000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
31C800658000
|
trusted library allocation
|
page read and write
|
||
173594F3000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
7C27000
|
heap
|
page read and write
|
||
1735D98F000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C0247C000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
197C03038000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page write copy
|
||
7AA6000
|
heap
|
page read and write
|
||
197C02690000
|
trusted library allocation
|
page read and write
|
||
17358F66000
|
heap
|
page read and write
|
||
7884002F8000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
197C02938000
|
trusted library allocation
|
page read and write
|
||
31C8002ED000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
stack
|
page read and write
|
||
31C800770000
|
trusted library allocation
|
page read and write
|
||
197C031A0000
|
trusted library allocation
|
page read and write
|
||
197C02960000
|
trusted library allocation
|
page read and write
|
||
F4C000
|
stack
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
173594BD000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02A12000
|
trusted library allocation
|
page read and write
|
||
7C78000
|
heap
|
page read and write
|
||
197C024C0000
|
trusted library allocation
|
page read and write
|
||
7C16000
|
heap
|
page read and write
|
||
6C208000
|
unkown
|
page readonly
|
||
197C02F70000
|
trusted library allocation
|
page read and write
|
||
197C02D88000
|
trusted library allocation
|
page read and write
|
||
7057FFE000
|
unkown
|
page readonly
|
||
7CD4000
|
heap
|
page read and write
|
||
31C800788000
|
trusted library allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
31C800654000
|
trusted library allocation
|
page read and write
|
||
7BA6000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
197C02E0C000
|
trusted library allocation
|
page read and write
|
||
31C800704000
|
trusted library allocation
|
page read and write
|
||
197C03030000
|
trusted library allocation
|
page read and write
|
||
31C8006EC000
|
trusted library allocation
|
page read and write
|
||
197C02498000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7C78000
|
heap
|
page read and write
|
||
17358F74000
|
heap
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
C0D000
|
stack
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C02F84000
|
trusted library allocation
|
page read and write
|
||
197C02D48000
|
trusted library allocation
|
page read and write
|
||
7069FFE000
|
unkown
|
page readonly
|
||
17358F5C000
|
heap
|
page read and write
|
||
197C00401000
|
trusted library allocation
|
page read and write
|
||
197C03140000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
70547FE000
|
stack
|
page read and write
|
||
197C02430000
|
trusted library allocation
|
page read and write
|
||
7E3A000
|
heap
|
page read and write
|
||
197C02EAC000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02A40000
|
trusted library allocation
|
page read and write
|
||
197C02504000
|
trusted library allocation
|
page read and write
|
||
197C02994000
|
trusted library allocation
|
page read and write
|
||
6230002DC000
|
direct allocation
|
page read and write
|
||
84C000
|
stack
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
7C25000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page write copy
|
||
7073FFE000
|
unkown
|
page readonly
|
||
197C02A01000
|
trusted library allocation
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
197C030E8000
|
trusted library allocation
|
page read and write
|
||
197C03190000
|
trusted library allocation
|
page read and write
|
||
173558EB000
|
heap
|
page read and write
|
||
7CF8000
|
heap
|
page read and write
|
||
197C02260000
|
trusted library allocation
|
page read and write
|
||
197C0241C000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
7AAA000
|
heap
|
page read and write
|
||
197C026FC000
|
trusted library allocation
|
page read and write
|
||
197C02F94000
|
trusted library allocation
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
31C8007B4000
|
trusted library allocation
|
page read and write
|
||
17358F62000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
705BFFC000
|
stack
|
page read and write
|
||
197C02E6C000
|
trusted library allocation
|
page read and write
|
||
197C02A38000
|
trusted library allocation
|
page read and write
|
||
70687FE000
|
stack
|
page read and write
|
||
7C4C000
|
heap
|
page read and write
|
||
17358F7B000
|
heap
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02694000
|
trusted library allocation
|
page read and write
|
||
197C02FCC000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
197C029D8000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
31C800668000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
197C0269C000
|
trusted library allocation
|
page read and write
|
||
197C02910000
|
trusted library allocation
|
page read and write
|
||
70677FC000
|
stack
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C02428000
|
trusted library allocation
|
page read and write
|
||
17355C30000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
70747FE000
|
stack
|
page read and write
|
||
197C02CE0000
|
trusted library allocation
|
page read and write
|
||
197C00601000
|
trusted library allocation
|
page read and write
|
||
173594B4000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1D2D000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
197C0329C000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
197C02EF8000
|
trusted library allocation
|
page read and write
|
||
704A7FE000
|
stack
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
173559D3000
|
heap
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
7D37000
|
heap
|
page read and write
|
||
31C800688000
|
trusted library allocation
|
page read and write
|
||
31C800354000
|
trusted library allocation
|
page read and write
|
||
17358F46000
|
heap
|
page read and write
|
||
705E7FA000
|
stack
|
page read and write
|
||
17358F44000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
31C800250000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1735FF06000
|
trusted library section
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
6230002EC000
|
direct allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C025DC000
|
trusted library allocation
|
page read and write
|
||
70557FE000
|
stack
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
197C02AA8000
|
trusted library allocation
|
page read and write
|
||
7AA3000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
197C02EF8000
|
trusted library allocation
|
page read and write
|
||
197C0240C000
|
trusted library allocation
|
page read and write
|
||
17355974000
|
heap
|
page read and write
|
||
197C02EF8000
|
trusted library allocation
|
page read and write
|
||
197C02A5C000
|
trusted library allocation
|
page read and write
|
||
31C800630000
|
trusted library allocation
|
page read and write
|
||
7CAF000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1735FDF2000
|
trusted library section
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C0253C000
|
trusted library allocation
|
page read and write
|
||
197C02618000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
17358F9A000
|
heap
|
page read and write
|
||
31C8006C8000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1735F560000
|
trusted library section
|
page read and write
|
||
7B8F000
|
heap
|
page read and write
|
||
7AA4000
|
heap
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
31C800744000
|
trusted library allocation
|
page read and write
|
||
197C02601000
|
trusted library allocation
|
page read and write
|
||
31C800348000
|
trusted library allocation
|
page read and write
|
||
70607FC000
|
stack
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
17358F6D000
|
heap
|
page read and write
|
||
197C02FB9000
|
trusted library allocation
|
page read and write
|
||
197C02758000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
197C0237C000
|
trusted library allocation
|
page read and write
|
||
17358F52000
|
heap
|
page read and write
|
||
704DFFE000
|
unkown
|
page readonly
|
||
1735949D000
|
heap
|
page read and write
|
||
197C02F58000
|
trusted library allocation
|
page read and write
|
||
70657FD000
|
stack
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F73000
|
heap
|
page read and write
|
||
623000215000
|
direct allocation
|
page read and write
|
||
197C02A2D000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page readonly
|
||
7884002D8000
|
trusted library allocation
|
page read and write
|
||
1735947C000
|
heap
|
page read and write
|
||
31C800758000
|
trusted library allocation
|
page read and write
|
||
1D34000
|
heap
|
page read and write
|
||
17358F52000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
1735946E000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
705AFFE000
|
unkown
|
page readonly
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
7884002C0000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C02E64000
|
trusted library allocation
|
page read and write
|
||
17358F65000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
31C800330000
|
trusted library allocation
|
page read and write
|
||
1735F260000
|
trusted library section
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
7884002C0000
|
trusted library allocation
|
page read and write
|
||
197C02D04000
|
trusted library allocation
|
page read and write
|
||
7072FFE000
|
unkown
|
page readonly
|
||
17358F5F000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
9F0000
|
unkown
|
page readonly
|
||
7054FFE000
|
unkown
|
page readonly
|
||
197C0236C000
|
trusted library allocation
|
page read and write
|
||
197C023AC000
|
trusted library allocation
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17358F63000
|
heap
|
page read and write
|
||
788400238000
|
trusted library allocation
|
page read and write
|
||
197C023E4000
|
trusted library allocation
|
page read and write
|
||
17358F6D000
|
heap
|
page read and write
|
||
31C80020C000
|
trusted library allocation
|
page read and write
|
||
17358F7F000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
17359410000
|
heap
|
page read and write
|
||
197C02424000
|
trusted library allocation
|
page read and write
|
||
788400235000
|
trusted library allocation
|
page read and write
|
||
17358310000
|
unkown
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
31C8007CC000
|
trusted library allocation
|
page read and write
|
||
173578C3000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
197C00201000
|
trusted library allocation
|
page read and write
|
||
31C800724000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
17358F7F000
|
heap
|
page read and write
|
||
705C7FE000
|
unkown
|
page readonly
|
||
17358FB1000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
31C80040C000
|
trusted library allocation
|
page read and write
|
||
197C02F8C000
|
trusted library allocation
|
page read and write
|
||
197C02A9C000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
706A7FE000
|
stack
|
page read and write
|
||
1735FF2D000
|
trusted library section
|
page read and write
|
||
1735D940000
|
heap
|
page read and write
|
||
17358F5F000
|
heap
|
page read and write
|
||
7053FFE000
|
unkown
|
page readonly
|
||
17358F76000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
31C800248000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
1735B082000
|
trusted library allocation
|
page read and write
|
||
173594B2000
|
heap
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
197C024B4000
|
trusted library allocation
|
page read and write
|
||
197C02910000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
197C023D0000
|
trusted library allocation
|
page read and write
|
||
31C80035C000
|
trusted library allocation
|
page read and write
|
||
17358F46000
|
heap
|
page read and write
|
||
197C03028000
|
trusted library allocation
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
17358F76000
|
heap
|
page read and write
|
||
79B9000
|
direct allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
197C02510000
|
trusted library allocation
|
page read and write
|
||
788400294000
|
trusted library allocation
|
page read and write
|
||
197C02D14000
|
trusted library allocation
|
page read and write
|
||
70667FE000
|
stack
|
page read and write
|
||
197C03118000
|
trusted library allocation
|
page read and write
|
||
197C028AC000
|
trusted library allocation
|
page read and write
|
||
17358F58000
|
heap
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
197C02A18000
|
trusted library allocation
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7884002BC000
|
trusted library allocation
|
page read and write
|
||
31C80033C000
|
trusted library allocation
|
page read and write
|
||
197C02E98000
|
trusted library allocation
|
page read and write
|
||
17358F5B000
|
heap
|
page read and write
|
||
197C030CC000
|
trusted library allocation
|
page read and write
|
||
17358F4F000
|
heap
|
page read and write
|
||
1735F123000
|
heap
|
page read and write
|
||
17358F56000
|
heap
|
page read and write
|
||
7050FFE000
|
unkown
|
page readonly
|
||
31C800230000
|
trusted library allocation
|
page read and write
|
||
17355860000
|
heap
|
page read and write
|
||
17358F54000
|
heap
|
page read and write
|
||
197C023A0000
|
trusted library allocation
|
page read and write
|
||
F40000
|
direct allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
197C02594000
|
trusted library allocation
|
page read and write
|
||
17358F98000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
197C02928000
|
trusted library allocation
|
page read and write
|
||
17358F6A000
|
heap
|
page read and write
|
||
17358F59000
|
heap
|
page read and write
|
||
173594CC000
|
heap
|
page read and write
|
||
197C0251C000
|
trusted library allocation
|
page read and write
|
||
31C8006C4000
|
trusted library allocation
|
page read and write
|
||
706B7FE000
|
stack
|
page read and write
|
||
9FA000
|
unkown
|
page readonly
|
||
31C80035C000
|
trusted library allocation
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
There are 1321 hidden memdumps, click here to show them.