Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_a51a8195-1db9-4f6b-a339-8e7aa23c1c20\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER187.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Nov 21 17:22:32 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER514.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2480,i,2786554931970826557,11658264274216271163,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1796
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bP
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
http://anglebug.com/4324;
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/x
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyP
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en3
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/29706
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
||
http://issuetracker.google.com/200067929
|
unknown
|
||
https://anglebug.com/7847
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
ProgramId
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
FileId
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
LowerCaseLongPath
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
LongPathHash
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Name
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
OriginalFileName
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Publisher
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Version
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
BinFileVersion
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
BinaryType
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
ProductName
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
ProductVersion
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
LinkDate
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
BinProductVersion
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
AppxPackageFullName
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Size
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Language
|
||
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5C4000230000
|
direct allocation
|
page read and write
|
||
724C002A0000
|
trusted library allocation
|
page read and write
|
||
501C02580000
|
trusted library allocation
|
page read and write
|
||
501C023E0000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
7125000
|
heap
|
page read and write
|
||
501C0297C000
|
trusted library allocation
|
page read and write
|
||
46C000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
7256000
|
heap
|
page read and write
|
||
7275000
|
heap
|
page read and write
|
||
9E727FE000
|
stack
|
page read and write
|
||
501C031A0000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
9E08FFE000
|
unkown
|
page readonly
|
||
7353000
|
heap
|
page read and write
|
||
501C023DC000
|
trusted library allocation
|
page read and write
|
||
501C02C50000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
501C02324000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
146C000
|
stack
|
page read and write
|
||
501C02E8C000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
78C800330000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
724C00260000
|
trusted library allocation
|
page read and write
|
||
501C0278C000
|
trusted library allocation
|
page read and write
|
||
78C80027C000
|
trusted library allocation
|
page read and write
|
||
501C0340C000
|
trusted library allocation
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
78C800310000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
501C02FD0000
|
trusted library allocation
|
page read and write
|
||
501C032D4000
|
trusted library allocation
|
page read and write
|
||
501C03401000
|
trusted library allocation
|
page read and write
|
||
9E7FFFE000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1B810A58000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
501C03564000
|
trusted library allocation
|
page read and write
|
||
9E06FFE000
|
unkown
|
page readonly
|
||
501C02510000
|
trusted library allocation
|
page read and write
|
||
78C800320000
|
trusted library allocation
|
page read and write
|
||
9E68FFE000
|
unkown
|
page readonly
|
||
724C00250000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
724C002C0000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
stack
|
page read and write
|
||
1B812890000
|
heap
|
page read and write
|
||
7238000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0293D000
|
trusted library allocation
|
page read and write
|
||
724C002C0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
501C023B4000
|
trusted library allocation
|
page read and write
|
||
501C0308C000
|
trusted library allocation
|
page read and write
|
||
724C00278000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
72D8000
|
heap
|
page read and write
|
||
1B814041000
|
heap
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
501C024F0000
|
trusted library allocation
|
page read and write
|
||
1B814041000
|
heap
|
page read and write
|
||
501C030C8000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C02E8C000
|
trusted library allocation
|
page read and write
|
||
71C1000
|
heap
|
page read and write
|
||
78C8006B8000
|
trusted library allocation
|
page read and write
|
||
501C023F0000
|
trusted library allocation
|
page read and write
|
||
78C800770000
|
trusted library allocation
|
page read and write
|
||
501C00A01000
|
trusted library allocation
|
page read and write
|
||
501C02F1C000
|
trusted library allocation
|
page read and write
|
||
501C02F18000
|
trusted library allocation
|
page read and write
|
||
1B81B1E6000
|
trusted library section
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C032DC000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
7124000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
1B812893000
|
heap
|
page read and write
|
||
501C02EC0000
|
trusted library allocation
|
page read and write
|
||
501C0240C000
|
trusted library allocation
|
page read and write
|
||
1B81459E000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
501C02990000
|
trusted library allocation
|
page read and write
|
||
9E6F7FE000
|
stack
|
page read and write
|
||
501C0241C000
|
trusted library allocation
|
page read and write
|
||
9E667FB000
|
stack
|
page read and write
|
||
501C03264000
|
trusted library allocation
|
page read and write
|
||
501C02C34000
|
trusted library allocation
|
page read and write
|
||
7227000
|
heap
|
page read and write
|
||
6E10000
|
direct allocation
|
page execute and read and write
|
||
5C400023C000
|
direct allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
F04000
|
unkown
|
page execute and write copy
|
||
712E000
|
heap
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
173F000
|
stack
|
page read and write
|
||
501C03238000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
501C031E8000
|
trusted library allocation
|
page read and write
|
||
9E7DFFE000
|
unkown
|
page readonly
|
||
9E60FFE000
|
unkown
|
page readonly
|
||
6731000
|
heap
|
page read and write
|
||
9E057FD000
|
stack
|
page read and write
|
||
1B81404E000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
8B7000
|
heap
|
page read and write
|
||
9E72FFE000
|
unkown
|
page readonly
|
||
501C034B4000
|
trusted library allocation
|
page read and write
|
||
501C0253C000
|
trusted library allocation
|
page read and write
|
||
501C02690000
|
trusted library allocation
|
page read and write
|
||
501C0261C000
|
trusted library allocation
|
page read and write
|
||
5C4000303000
|
direct allocation
|
page read and write
|
||
19DF000
|
stack
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1B81AA50000
|
trusted library section
|
page read and write
|
||
501C02922000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
5C40002DC000
|
direct allocation
|
page read and write
|
||
5C400026C000
|
direct allocation
|
page read and write
|
||
1B81AAD0000
|
trusted library section
|
page read and write
|
||
6E30000
|
direct allocation
|
page execute and read and write
|
||
9E0FFFE000
|
unkown
|
page readonly
|
||
760000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
501C0271B000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
78C800368000
|
trusted library allocation
|
page read and write
|
||
501C03578000
|
trusted library allocation
|
page read and write
|
||
78C8007CC000
|
trusted library allocation
|
page read and write
|
||
9E747FE000
|
stack
|
page read and write
|
||
501C024B4000
|
trusted library allocation
|
page read and write
|
||
5C4000215000
|
direct allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
501C00180000
|
trusted library allocation
|
page read and write
|
||
78C800714000
|
trusted library allocation
|
page read and write
|
||
501C02880000
|
trusted library allocation
|
page read and write
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
501C02504000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
9E78FFE000
|
unkown
|
page readonly
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
5C40002A8000
|
direct allocation
|
page read and write
|
||
71FA000
|
heap
|
page read and write
|
||
501C03248000
|
trusted library allocation
|
page read and write
|
||
1B81876D000
|
heap
|
page read and write
|
||
501C023D4000
|
trusted library allocation
|
page read and write
|
||
501C02EA4000
|
trusted library allocation
|
page read and write
|
||
9E6C7FB000
|
stack
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
78C800648000
|
trusted library allocation
|
page read and write
|
||
9E697FB000
|
stack
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
1B81A0E7000
|
unclassified section
|
page read and write
|
||
1B810C45000
|
heap
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
1B8109A0000
|
heap
|
page read and write
|
||
72D5000
|
heap
|
page read and write
|
||
724C002F0000
|
trusted library allocation
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
501C00FCC000
|
trusted library allocation
|
page read and write
|
||
501C023EC000
|
trusted library allocation
|
page read and write
|
||
9E7E7FD000
|
stack
|
page read and write
|
||
1B81ACA0000
|
trusted library section
|
page read and write
|
||
9E02FFE000
|
unkown
|
page readonly
|
||
501C02334000
|
trusted library allocation
|
page read and write
|
||
1B81ABF0000
|
trusted library section
|
page read and write
|
||
501C03310000
|
trusted library allocation
|
page read and write
|
||
78C80075C000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
9E07FFE000
|
unkown
|
page readonly
|
||
501C032AC000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
481000
|
unkown
|
page execute and write copy
|
||
501C02504000
|
trusted library allocation
|
page read and write
|
||
9E097FE000
|
stack
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
9E00FFE000
|
unkown
|
page readonly
|
||
78C80060C000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
1B81AAC0000
|
trusted library section
|
page read and write
|
||
501C0300C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
1B814589000
|
heap
|
page read and write
|
||
501C02908000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
501C03140000
|
trusted library allocation
|
page read and write
|
||
745E000
|
heap
|
page read and write
|
||
72CD000
|
heap
|
page read and write
|
||
78C8002B8000
|
trusted library allocation
|
page read and write
|
||
712B000
|
heap
|
page read and write
|
||
9E657FD000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
9E047FE000
|
stack
|
page read and write
|
||
72BC000
|
heap
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
9E04FFE000
|
unkown
|
page readonly
|
||
9E74FFE000
|
unkown
|
page readonly
|
||
501C026FC000
|
trusted library allocation
|
page read and write
|
||
501C03028000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
5C40002EC000
|
direct allocation
|
page read and write
|
||
501C02528000
|
trusted library allocation
|
page read and write
|
||
501C025D8000
|
trusted library allocation
|
page read and write
|
||
501C03238000
|
trusted library allocation
|
page read and write
|
||
501C02908000
|
trusted library allocation
|
page read and write
|
||
78C800620000
|
trusted library allocation
|
page read and write
|
||
1B81B14E000
|
trusted library section
|
page read and write
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
1B814038000
|
heap
|
page read and write
|
||
1B81ABBD000
|
trusted library section
|
page read and write
|
||
78C800630000
|
trusted library allocation
|
page read and write
|
||
78C8002FC000
|
trusted library allocation
|
page read and write
|
||
501C02D24000
|
trusted library allocation
|
page read and write
|
||
501C023C4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
9E69FFE000
|
unkown
|
page readonly
|
||
78C800698000
|
trusted library allocation
|
page read and write
|
||
1B81404D000
|
heap
|
page read and write
|
||
501C02410000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
1B81AC87000
|
unclassified section
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
1B814500000
|
heap
|
page read and write
|
||
730C000
|
heap
|
page read and write
|
||
501C00E01000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
724C002C8000
|
trusted library allocation
|
page read and write
|
||
1B8109C0000
|
heap
|
page read and write
|
||
1B810A7E000
|
heap
|
page read and write
|
||
724C00238000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C0242C000
|
trusted library allocation
|
page read and write
|
||
9E71FFE000
|
unkown
|
page readonly
|
||
9E6FFFE000
|
unkown
|
page readonly
|
||
7416000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
501C00816000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
7248000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0249A000
|
trusted library allocation
|
page read and write
|
||
1B81452B000
|
heap
|
page read and write
|
||
501C026F0000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
9E0EFFE000
|
unkown
|
page readonly
|
||
501C006F0000
|
trusted library allocation
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
1B814564000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
71FA000
|
heap
|
page read and write
|
||
501C02AE0000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
7268000
|
heap
|
page read and write
|
||
501C02690000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
1B818202000
|
trusted library allocation
|
page read and write
|
||
1B81AF4E000
|
trusted library section
|
page read and write
|
||
1B816730000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
78C800380000
|
trusted library allocation
|
page read and write
|
||
712D000
|
heap
|
page read and write
|
||
501C02401000
|
trusted library allocation
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
9E7F7FB000
|
stack
|
page read and write
|
||
501C02A1C000
|
trusted library allocation
|
page read and write
|
||
1B81A1E7000
|
unclassified section
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
78C80035C000
|
trusted library allocation
|
page read and write
|
||
9E617FE000
|
stack
|
page read and write
|
||
1B810C20000
|
trusted library section
|
page readonly
|
||
5C4000201000
|
direct allocation
|
page read and write
|
||
1B814010000
|
heap
|
page read and write
|
||
9E627FE000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C024F0000
|
trusted library allocation
|
page read and write
|
||
724C002F8000
|
trusted library allocation
|
page read and write
|
||
501C033A8000
|
trusted library allocation
|
page read and write
|
||
501C026CC000
|
trusted library allocation
|
page read and write
|
||
501C02E0C000
|
trusted library allocation
|
page read and write
|
||
1B81459C000
|
heap
|
page read and write
|
||
501C03420000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
712A000
|
heap
|
page read and write
|
||
501C02B30000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
9E62FFE000
|
unkown
|
page readonly
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
501C027C4000
|
trusted library allocation
|
page read and write
|
||
733F000
|
heap
|
page read and write
|
||
7305000
|
heap
|
page read and write
|
||
1B81403C000
|
heap
|
page read and write
|
||
1B8145BD000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
501C03068000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C024B0000
|
trusted library allocation
|
page read and write
|
||
722C000
|
heap
|
page read and write
|
||
9E007FE000
|
stack
|
page read and write
|
||
501C03254000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
501C0225F000
|
trusted library allocation
|
page read and write
|
||
501C0237C000
|
trusted library allocation
|
page read and write
|
||
9E647FE000
|
stack
|
page read and write
|
||
7307000
|
heap
|
page read and write
|
||
9E0D7FC000
|
stack
|
page read and write
|
||
9E6EFFE000
|
unkown
|
page readonly
|
||
501C02FBC000
|
trusted library allocation
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0292C000
|
trusted library allocation
|
page read and write
|
||
78C8002F4000
|
trusted library allocation
|
page read and write
|
||
78C800320000
|
trusted library allocation
|
page read and write
|
||
7296000
|
heap
|
page read and write
|
||
1B810BF0000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
12A000
|
stack
|
page read and write
|
||
501C02ED4000
|
trusted library allocation
|
page read and write
|
||
724C00274000
|
trusted library allocation
|
page read and write
|
||
501C0312C000
|
trusted library allocation
|
page read and write
|
||
501C03201000
|
trusted library allocation
|
page read and write
|
||
7124000
|
heap
|
page read and write
|
||
78C800430000
|
trusted library allocation
|
page read and write
|
||
5C4000280000
|
direct allocation
|
page read and write
|
||
501C03228000
|
trusted library allocation
|
page read and write
|
||
1B8109CB000
|
heap
|
page read and write
|
||
7127000
|
heap
|
page read and write
|
||
501C02D08000
|
trusted library allocation
|
page read and write
|
||
501C02C24000
|
trusted library allocation
|
page read and write
|
||
501C02430000
|
trusted library allocation
|
page read and write
|
||
78C800238000
|
trusted library allocation
|
page read and write
|
||
78C8006F0000
|
trusted library allocation
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
EEC000
|
stack
|
page read and write
|
||
9E0C7FB000
|
stack
|
page read and write
|
||
78C800348000
|
trusted library allocation
|
page read and write
|
||
73B8000
|
heap
|
page read and write
|
||
501C034C0000
|
trusted library allocation
|
page read and write
|
||
501C0319C000
|
trusted library allocation
|
page read and write
|
||
501C02714000
|
trusted library allocation
|
page read and write
|
||
78C800668000
|
trusted library allocation
|
page read and write
|
||
501C03104000
|
trusted library allocation
|
page read and write
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
724C0020C000
|
trusted library allocation
|
page read and write
|
||
9E6D7FD000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
501C02720000
|
trusted library allocation
|
page read and write
|
||
78C8007B4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
9E717FA000
|
stack
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
501C02FDC000
|
trusted library allocation
|
page read and write
|
||
78C80033C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0282C000
|
trusted library allocation
|
page read and write
|
||
5C40002E4000
|
direct allocation
|
page read and write
|
||
501C024E0000
|
trusted library allocation
|
page read and write
|
||
78C800390000
|
trusted library allocation
|
page read and write
|
||
501C02D14000
|
trusted library allocation
|
page read and write
|
||
78C800424000
|
trusted library allocation
|
page read and write
|
||
501C023AC000
|
trusted library allocation
|
page read and write
|
||
5C400020C000
|
direct allocation
|
page read and write
|
||
78C800248000
|
trusted library allocation
|
page read and write
|
||
78C8006B4000
|
trusted library allocation
|
page read and write
|
||
501C03078000
|
trusted library allocation
|
page read and write
|
||
72B2000
|
heap
|
page read and write
|
||
724C002B0000
|
trusted library allocation
|
page read and write
|
||
1B8145A0000
|
heap
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
739F000
|
heap
|
page read and write
|
||
501C0341C000
|
trusted library allocation
|
page read and write
|
||
1B810AB5000
|
heap
|
page read and write
|
||
501C02A0C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C031D4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
501C03264000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
501C0317C000
|
trusted library allocation
|
page read and write
|
||
740E000
|
heap
|
page read and write
|
||
501C02580000
|
trusted library allocation
|
page read and write
|
||
501C03120000
|
trusted library allocation
|
page read and write
|
||
1A9F000
|
stack
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
181F000
|
stack
|
page read and write
|
||
1B818640000
|
trusted library section
|
page read and write
|
||
501C02EC4000
|
trusted library allocation
|
page read and write
|
||
5C4000294000
|
direct allocation
|
page read and write
|
||
501C025A4000
|
trusted library allocation
|
page read and write
|
||
501C03248000
|
trusted library allocation
|
page read and write
|
||
501C02424000
|
trusted library allocation
|
page read and write
|
||
729F000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
9E7EFFE000
|
unkown
|
page readonly
|
||
CEE000
|
unkown
|
page write copy
|
||
1B814583000
|
heap
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
501C03488000
|
trusted library allocation
|
page read and write
|
||
1B81B20D000
|
trusted library section
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
78C80020C000
|
trusted library allocation
|
page read and write
|
||
501C02CE8000
|
trusted library allocation
|
page read and write
|
||
9E777FD000
|
stack
|
page read and write
|
||
501C023AC000
|
trusted library allocation
|
page read and write
|
||
1B8132E0000
|
unkown
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
501C0292C000
|
trusted library allocation
|
page read and write
|
||
501C02498000
|
trusted library allocation
|
page read and write
|
||
501C02280000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
5C4000270000
|
direct allocation
|
page read and write
|
||
1B81B142000
|
trusted library section
|
page read and write
|
||
501C02F1C000
|
trusted library allocation
|
page read and write
|
||
9E64FFE000
|
unkown
|
page readonly
|
||
CF1000
|
unkown
|
page readonly
|
||
9E0B7FD000
|
stack
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
5C40002D0000
|
direct allocation
|
page read and write
|
||
501C03324000
|
trusted library allocation
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
501C030AC000
|
trusted library allocation
|
page read and write
|
||
724C00264000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C00601000
|
trusted library allocation
|
page read and write
|
||
501C03584000
|
trusted library allocation
|
page read and write
|
||
501C02C70000
|
trusted library allocation
|
page read and write
|
||
501C02A70000
|
trusted library allocation
|
page read and write
|
||
9E6AFFE000
|
unkown
|
page readonly
|
||
CE1000
|
unkown
|
page execute read
|
||
501C02F3C000
|
trusted library allocation
|
page read and write
|
||
9E65FFE000
|
unkown
|
page readonly
|
||
6731000
|
heap
|
page read and write
|
||
501C0249A000
|
trusted library allocation
|
page read and write
|
||
9E607FE000
|
unkown
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
1B8186D7000
|
unclassified section
|
page read and write
|
||
501C02B7C000
|
trusted library allocation
|
page read and write
|
||
1B81B202000
|
trusted library section
|
page read and write
|
||
501C0328C000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
1440000
|
heap
|
page read and write
|
||
9E0F7FE000
|
stack
|
page read and write
|
||
501C00401000
|
trusted library allocation
|
page read and write
|
||
78C8006BC000
|
trusted library allocation
|
page read and write
|
||
9E73FFE000
|
unkown
|
page readonly
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
72CB000
|
direct allocation
|
page read and write
|
||
7235000
|
heap
|
page read and write
|
||
501C023D8000
|
trusted library allocation
|
page read and write
|
||
501C023AC000
|
trusted library allocation
|
page read and write
|
||
78C8007E0000
|
trusted library allocation
|
page read and write
|
||
1B814567000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
9E7B7FD000
|
stack
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
7172000
|
direct allocation
|
page read and write
|
||
501C028B0000
|
trusted library allocation
|
page read and write
|
||
501C02D40000
|
trusted library allocation
|
page read and write
|
||
1B814599000
|
heap
|
page read and write
|
||
501C02E01000
|
trusted library allocation
|
page read and write
|
||
501C022DC000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
501C03170000
|
trusted library allocation
|
page read and write
|
||
78C800614000
|
trusted library allocation
|
page read and write
|
||
78C800700000
|
trusted library allocation
|
page read and write
|
||
501C0328C000
|
trusted library allocation
|
page read and write
|
||
501C0240C000
|
trusted library allocation
|
page read and write
|
||
501C027B0000
|
trusted library allocation
|
page read and write
|
||
501C02B14000
|
trusted library allocation
|
page read and write
|
||
501C03248000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
501C03374000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
1B81AB96000
|
trusted library section
|
page read and write
|
||
501C02C48000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
72E6000
|
heap
|
page read and write
|
||
78C800704000
|
trusted library allocation
|
page read and write
|
||
501C02C34000
|
trusted library allocation
|
page read and write
|
||
501C0220C000
|
trusted library allocation
|
page read and write
|
||
501C03190000
|
trusted library allocation
|
page read and write
|
||
78C8006EC000
|
trusted library allocation
|
page read and write
|
||
1B81AEA0000
|
trusted library section
|
page read and write
|
||
7280000
|
heap
|
page read and write
|
||
7258000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
78C800788000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
1B81404A000
|
heap
|
page read and write
|
||
724C00220000
|
trusted library allocation
|
page read and write
|
||
501C02AAB000
|
trusted library allocation
|
page read and write
|
||
5C4000284000
|
direct allocation
|
page read and write
|
||
72AE000
|
heap
|
page read and write
|
||
1B81AA70000
|
trusted library section
|
page read and write
|
||
501C02B54000
|
trusted library allocation
|
page read and write
|
||
78C800734000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
501C02428000
|
trusted library allocation
|
page read and write
|
||
724C00235000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
6731000
|
heap
|
page read and write
|
||
501C03094000
|
trusted library allocation
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0229C000
|
trusted library allocation
|
page read and write
|
||
78C800601000
|
trusted library allocation
|
page read and write
|
||
78C800658000
|
trusted library allocation
|
page read and write
|
||
78C800784000
|
trusted library allocation
|
page read and write
|
||
501C024BA000
|
trusted library allocation
|
page read and write
|
||
501C00001000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
501C03060000
|
trusted library allocation
|
page read and write
|
||
1B814650000
|
trusted library section
|
page read and write
|
||
501C030E0000
|
trusted library allocation
|
page read and write
|
||
501C03158000
|
trusted library allocation
|
page read and write
|
||
501C023F8000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C031C0000
|
trusted library allocation
|
page read and write
|
||
78C800724000
|
trusted library allocation
|
page read and write
|
||
9E637FE000
|
stack
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
724C002C0000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
78C800401000
|
trusted library allocation
|
page read and write
|
||
501C025F9000
|
trusted library allocation
|
page read and write
|
||
726B000
|
heap
|
page read and write
|
||
1B81B1A3000
|
trusted library section
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
9E5F7EF000
|
stack
|
page read and write
|
||
712B000
|
heap
|
page read and write
|
||
9E6E7FD000
|
stack
|
page read and write
|
||
501C02F6C000
|
trusted library allocation
|
page read and write
|
||
78C800364000
|
trusted library allocation
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
9E707FE000
|
stack
|
page read and write
|
||
501C0281C000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
78C800330000
|
trusted library allocation
|
page read and write
|
||
9E7CFFE000
|
unkown
|
page readonly
|
||
1B814042000
|
heap
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
501C03184000
|
trusted library allocation
|
page read and write
|
||
1B810A5C000
|
heap
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
501C02EE8000
|
trusted library allocation
|
page read and write
|
||
501C023B4000
|
trusted library allocation
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
501C026AC000
|
trusted library allocation
|
page read and write
|
||
501C02544000
|
trusted library allocation
|
page read and write
|
||
74FD000
|
heap
|
page read and write
|
||
9E037FE000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
1B814591000
|
heap
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
78C8006FC000
|
trusted library allocation
|
page read and write
|
||
501C028F4000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
7120000
|
heap
|
page read and write
|
||
501C02564000
|
trusted library allocation
|
page read and write
|
||
724C002C0000
|
trusted library allocation
|
page read and write
|
||
501C029A9000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C023A0000
|
trusted library allocation
|
page read and write
|
||
501C02498000
|
trusted library allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
78C800201000
|
trusted library allocation
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C030A0000
|
trusted library allocation
|
page read and write
|
||
501C00801000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
78C800310000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
1B8145A2000
|
heap
|
page read and write
|
||
727C000
|
heap
|
page read and write
|
||
501C02778000
|
trusted library allocation
|
page read and write
|
||
78C8006D0000
|
trusted library allocation
|
page read and write
|
||
1B81456C000
|
heap
|
page read and write
|
||
501C0234C000
|
trusted library allocation
|
page read and write
|
||
9E70FFE000
|
unkown
|
page readonly
|
||
501C03330000
|
trusted library allocation
|
page read and write
|
||
501C02BCC000
|
trusted library allocation
|
page read and write
|
||
1B81A113000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
72FD000
|
heap
|
page read and write
|
||
730F000
|
heap
|
page read and write
|
||
78C800320000
|
trusted library allocation
|
page read and write
|
||
501C02420000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
501C029DC000
|
trusted library allocation
|
page read and write
|
||
501C02CD8000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
724C002B0000
|
trusted library allocation
|
page read and write
|
||
501C02680000
|
trusted library allocation
|
page read and write
|
||
7437000
|
heap
|
page read and write
|
||
501C02274000
|
trusted library allocation
|
page read and write
|
||
501C024A4000
|
trusted library allocation
|
page read and write
|
||
78C800688000
|
trusted library allocation
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
501C02AF8000
|
trusted library allocation
|
page read and write
|
||
5C400024C000
|
direct allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
501C03044000
|
trusted library allocation
|
page read and write
|
||
9E0A7FE000
|
stack
|
page read and write
|
||
1B81A640000
|
trusted library section
|
page read and write
|
||
78C800418000
|
trusted library allocation
|
page read and write
|
||
1B81AAF3000
|
trusted library section
|
page read and write
|
||
9E7C7FB000
|
stack
|
page read and write
|
||
501C02F3F000
|
trusted library allocation
|
page read and write
|
||
501C024C0000
|
trusted library allocation
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
78C8002E4000
|
trusted library allocation
|
page read and write
|
||
1B814559000
|
heap
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
501C02670000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
78C800210000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
501C02390000
|
trusted library allocation
|
page read and write
|
||
501C028A0000
|
trusted library allocation
|
page read and write
|
||
9E027FE000
|
stack
|
page read and write
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
78C800730000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
501C02544000
|
trusted library allocation
|
page read and write
|
||
724C00294000
|
trusted library allocation
|
page read and write
|
||
1B8145A4000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
9E6BFFE000
|
unkown
|
page readonly
|
||
9E077FD000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
1CAF000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
5C4000217000
|
direct allocation
|
page read and write
|
||
78C800320000
|
trusted library allocation
|
page read and write
|
||
501C02FA8000
|
trusted library allocation
|
page read and write
|
||
501C02F8C000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
501C032C8000
|
trusted library allocation
|
page read and write
|
||
712B000
|
heap
|
page read and write
|
||
1B8145AB000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
78C800248000
|
trusted library allocation
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
501C03478000
|
trusted library allocation
|
page read and write
|
||
501C02230000
|
trusted library allocation
|
page read and write
|
||
712D000
|
heap
|
page read and write
|
||
78C8002B0000
|
trusted library allocation
|
page read and write
|
||
501C03164000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
501C02988000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
78C8006D4000
|
trusted library allocation
|
page read and write
|
||
501C0319C000
|
trusted library allocation
|
page read and write
|
||
73D7000
|
heap
|
page read and write
|
||
9E05FFE000
|
unkown
|
page readonly
|
||
501C03494000
|
trusted library allocation
|
page read and write
|
||
78C800624000
|
trusted library allocation
|
page read and write
|
||
1B818744000
|
heap
|
page read and write
|
||
501C0253C000
|
trusted library allocation
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
1B814600000
|
trusted library section
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C023F4000
|
trusted library allocation
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
78C800684000
|
trusted library allocation
|
page read and write
|
||
9E7D7FC000
|
stack
|
page read and write
|
||
501C031A0000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C023E4000
|
trusted library allocation
|
page read and write
|
||
501C027A0000
|
trusted library allocation
|
page read and write
|
||
501C02ECC000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
724C002B0000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
501C02BD3000
|
trusted library allocation
|
page read and write
|
||
78C8006E8000
|
trusted library allocation
|
page read and write
|
||
501C00B08000
|
trusted library allocation
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
501C02A40000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
78C800758000
|
trusted library allocation
|
page read and write
|
||
724C002A0000
|
trusted library allocation
|
page read and write
|
||
1B81AAE1000
|
trusted library section
|
page read and write
|
||
501C0246C000
|
trusted library allocation
|
page read and write
|
||
501C02F74000
|
trusted library allocation
|
page read and write
|
||
9E6A7FB000
|
stack
|
page read and write
|
||
501C0253C000
|
trusted library allocation
|
page read and write
|
||
501C02B3C000
|
trusted library allocation
|
page read and write
|
||
501C034AC000
|
trusted library allocation
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
501C033BC000
|
trusted library allocation
|
page read and write
|
||
501C023E8000
|
trusted library allocation
|
page read and write
|
||
501C03118000
|
trusted library allocation
|
page read and write
|
||
74B6000
|
heap
|
page read and write
|
||
78C8006C8000
|
trusted library allocation
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
1B810A78000
|
heap
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
501C0280C000
|
trusted library allocation
|
page read and write
|
||
1B81A1C0000
|
heap
|
page read and write
|
||
501C02434000
|
trusted library allocation
|
page read and write
|
||
72E1000
|
heap
|
page read and write
|
||
501C0235C000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
501C022EC000
|
trusted library allocation
|
page read and write
|
||
501C0225A000
|
trusted library allocation
|
page read and write
|
||
501C0292C000
|
trusted library allocation
|
page read and write
|
||
9E767FB000
|
stack
|
page read and write
|
||
501C02580000
|
trusted library allocation
|
page read and write
|
||
501C02C0C000
|
trusted library allocation
|
page read and write
|
||
501C0328C000
|
trusted library allocation
|
page read and write
|
||
1B814560000
|
heap
|
page read and write
|
||
501C02530000
|
trusted library allocation
|
page read and write
|
||
9E087FE000
|
stack
|
page read and write
|
||
78C800678000
|
trusted library allocation
|
page read and write
|
||
78C800374000
|
trusted library allocation
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
78C800368000
|
trusted library allocation
|
page read and write
|
||
501C022C4000
|
trusted library allocation
|
page read and write
|
||
501C0329C000
|
trusted library allocation
|
page read and write
|
||
1B810A90000
|
heap
|
page read and write
|
||
501C02926000
|
trusted library allocation
|
page read and write
|
||
724C00248000
|
trusted library allocation
|
page read and write
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
724C00288000
|
trusted library allocation
|
page read and write
|
||
501C02EAC000
|
trusted library allocation
|
page read and write
|
||
78C800694000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
71B5000
|
heap
|
page read and write
|
||
9E6CFFE000
|
unkown
|
page readonly
|
||
501C03138000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
58F000
|
stack
|
page read and write
|
||
501C034C8000
|
trusted library allocation
|
page read and write
|
||
724C002E4000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
78C800230000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C03478000
|
trusted library allocation
|
page read and write
|
||
501C02580000
|
trusted library allocation
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
501C02C01000
|
trusted library allocation
|
page read and write
|
||
501C03348000
|
trusted library allocation
|
page read and write
|
||
71D5000
|
heap
|
page read and write
|
||
501C02948000
|
trusted library allocation
|
page read and write
|
||
1B814045000
|
heap
|
page read and write
|
||
78C800354000
|
trusted library allocation
|
page read and write
|
||
9E01FFE000
|
unkown
|
page readonly
|
||
501C02490000
|
trusted library allocation
|
page read and write
|
||
501C02FF0000
|
trusted library allocation
|
page read and write
|
||
724C00230000
|
trusted library allocation
|
page read and write
|
||
501C02504000
|
trusted library allocation
|
page read and write
|
||
9E017FE000
|
stack
|
page read and write
|
||
501C025CD000
|
trusted library allocation
|
page read and write
|
||
9E677FC000
|
stack
|
page read and write
|
||
72C9000
|
direct allocation
|
page read and write
|
||
501C02601000
|
trusted library allocation
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
501C03248000
|
trusted library allocation
|
page read and write
|
||
5C4000234000
|
direct allocation
|
page read and write
|
||
501C03220000
|
trusted library allocation
|
page read and write
|
||
501C029E8000
|
trusted library allocation
|
page read and write
|
||
501C0320C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C032DC000
|
trusted library allocation
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
501C02961000
|
trusted library allocation
|
page read and write
|
||
ED000
|
stack
|
page read and write
|
||
712D000
|
heap
|
page read and write
|
||
7348000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C02914000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
1B810C40000
|
heap
|
page read and write
|
||
501C00C01000
|
trusted library allocation
|
page read and write
|
||
501C02544000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1B81877A000
|
heap
|
page read and write
|
||
78C80069C000
|
trusted library allocation
|
page read and write
|
||
9E7BFFE000
|
unkown
|
page readonly
|
||
501C0255C000
|
trusted library allocation
|
page read and write
|
||
501C02240000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
6731000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
501C03254000
|
trusted library allocation
|
page read and write
|
||
501C03044000
|
trusted library allocation
|
page read and write
|
||
1B81AA8E000
|
trusted library section
|
page read and write
|
||
78C8003EC000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C031C4000
|
trusted library allocation
|
page read and write
|
||
9E7A7FA000
|
stack
|
page read and write
|
||
78C800720000
|
trusted library allocation
|
page read and write
|
||
501C02D30000
|
trusted library allocation
|
page read and write
|
||
1B81A267000
|
unclassified section
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C02500000
|
trusted library allocation
|
page read and write
|
||
501C031DD000
|
trusted library allocation
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
501C030B8000
|
trusted library allocation
|
page read and write
|
||
501C0228F000
|
trusted library allocation
|
page read and write
|
||
7298000
|
heap
|
page read and write
|
||
501C02F4C000
|
trusted library allocation
|
page read and write
|
||
501C0296C000
|
trusted library allocation
|
page read and write
|
||
501C031B0000
|
trusted library allocation
|
page read and write
|
||
1B8145E8000
|
heap
|
page read and write
|
||
501C02801000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
5C400025C000
|
direct allocation
|
page read and write
|
||
501C02B00000
|
trusted library allocation
|
page read and write
|
||
501C0284C000
|
trusted library allocation
|
page read and write
|
||
78C800664000
|
trusted library allocation
|
page read and write
|
||
501C02570000
|
trusted library allocation
|
page read and write
|
||
501C0251C000
|
trusted library allocation
|
page read and write
|
||
78C800330000
|
trusted library allocation
|
page read and write
|
||
501C02C18000
|
trusted library allocation
|
page read and write
|
||
501C0253C000
|
trusted library allocation
|
page read and write
|
||
724C00270000
|
trusted library allocation
|
page read and write
|
||
501C00201000
|
trusted library allocation
|
page read and write
|
||
726B000
|
heap
|
page read and write
|
||
501C02BAC000
|
trusted library allocation
|
page read and write
|
||
501C024F3000
|
trusted library allocation
|
page read and write
|
||
9E0CFFE000
|
unkown
|
page readonly
|
||
CE0000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
501C024FB000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
71FF000
|
heap
|
page read and write
|
||
501C02A68000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C0314C000
|
trusted library allocation
|
page read and write
|
||
501C02938000
|
trusted library allocation
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
501C0253C000
|
trusted library allocation
|
page read and write
|
||
724C002A0000
|
trusted library allocation
|
page read and write
|
||
501C029C4000
|
trusted library allocation
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
5C4000210000
|
direct allocation
|
page read and write
|
||
D8C000
|
stack
|
page read and write
|
||
78C800744000
|
trusted library allocation
|
page read and write
|
||
9E63FFE000
|
unkown
|
page readonly
|
||
7122000
|
heap
|
page read and write
|
||
9E0DFFE000
|
unkown
|
page readonly
|
||
9E797FC000
|
stack
|
page read and write
|
||
501C025B0000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
7375000
|
heap
|
page read and write
|
||
78C8006AC000
|
trusted library allocation
|
page read and write
|
||
9E79FFE000
|
unkown
|
page readonly
|
||
9E6DFFE000
|
unkown
|
page readonly
|
||
78C80033C000
|
trusted library allocation
|
page read and write
|
||
501C02BB4000
|
trusted library allocation
|
page read and write
|
||
501C02504000
|
trusted library allocation
|
page read and write
|
||
501C02CCC000
|
trusted library allocation
|
page read and write
|
||
501C03001000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
71D9000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
7477000
|
heap
|
page read and write
|
||
78C800288000
|
trusted library allocation
|
page read and write
|
||
501C02418000
|
trusted library allocation
|
page read and write
|
||
501C02594000
|
trusted library allocation
|
page read and write
|
||
501C03254000
|
trusted library allocation
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
1B81A840000
|
trusted library section
|
page read and write
|
||
501C0261C000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
1B81A290000
|
trusted library section
|
page read and write
|
||
501C02A78000
|
trusted library allocation
|
page read and write
|
||
501C023B4000
|
trusted library allocation
|
page read and write
|
||
501C031B0000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
78C80078C000
|
trusted library allocation
|
page read and write
|
||
1B81403D000
|
heap
|
page read and write
|
||
501C01001000
|
trusted library allocation
|
page read and write
|
||
724C002D8000
|
trusted library allocation
|
page read and write
|
||
78C80080C000
|
trusted library allocation
|
page read and write
|
||
5C4000250000
|
direct allocation
|
page read and write
|
||
78C800760000
|
trusted library allocation
|
page read and write
|
||
1B81AA61000
|
trusted library section
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C02F6C000
|
trusted library allocation
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
724C002B0000
|
trusted library allocation
|
page read and write
|
||
78C800220000
|
trusted library allocation
|
page read and write
|
||
78C8006E4000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
71BA000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
7120000
|
heap
|
page read and write
|
||
748A000
|
heap
|
page read and write
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page readonly
|
||
501C00640000
|
trusted library allocation
|
page read and write
|
||
1ACF000
|
stack
|
page read and write
|
||
501C02FC0000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
78C8006E0000
|
trusted library allocation
|
page read and write
|
||
1B81A110000
|
heap
|
page read and write
|
||
724C002BC000
|
trusted library allocation
|
page read and write
|
||
501C028D4000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
9E75FFE000
|
unkown
|
page readonly
|
||
6C0000
|
heap
|
page read and write
|
||
501C028D8000
|
trusted library allocation
|
page read and write
|
||
78C8006CC000
|
trusted library allocation
|
page read and write
|
||
501C029AC000
|
trusted library allocation
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
5C4000290000
|
direct allocation
|
page read and write
|
||
9E66FFE000
|
unkown
|
page readonly
|
||
501C03038000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
501C0236C000
|
trusted library allocation
|
page read and write
|
||
501C02908000
|
trusted library allocation
|
page read and write
|
||
1B81AF40000
|
trusted library section
|
page read and write
|
||
1BEF000
|
stack
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
501C02F18000
|
trusted library allocation
|
page read and write
|
||
501C02E98000
|
trusted library allocation
|
page read and write
|
||
501C029B4000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
78C800354000
|
trusted library allocation
|
page read and write
|
||
73EF000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
724C002A0000
|
trusted library allocation
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
501C02868000
|
trusted library allocation
|
page read and write
|
||
71C7000
|
heap
|
page read and write
|
||
501C02264000
|
trusted library allocation
|
page read and write
|
||
501C02414000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C023D0000
|
trusted library allocation
|
page read and write
|
||
501C032BC000
|
trusted library allocation
|
page read and write
|
||
1B810BE0000
|
trusted library allocation
|
page read and write
|
||
5C40002AC000
|
direct allocation
|
page read and write
|
||
501C02550000
|
trusted library allocation
|
page read and write
|
||
501C02904000
|
trusted library allocation
|
page read and write
|
||
78C80035C000
|
trusted library allocation
|
page read and write
|
||
501C02504000
|
trusted library allocation
|
page read and write
|
||
501C03254000
|
trusted library allocation
|
page read and write
|
||
78C80039C000
|
trusted library allocation
|
page read and write
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
501C03310000
|
trusted library allocation
|
page read and write
|
||
501C02CA4000
|
trusted library allocation
|
page read and write
|
||
501C02C34000
|
trusted library allocation
|
page read and write
|
||
1B810BA0000
|
heap
|
page read and write
|
||
501C03054000
|
trusted library allocation
|
page read and write
|
||
501C033CC000
|
trusted library allocation
|
page read and write
|
||
501C03588000
|
trusted library allocation
|
page read and write
|
||
1B81878E000
|
heap
|
page read and write
|
||
9E0E7FD000
|
stack
|
page read and write
|
||
9E737FE000
|
stack
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
9E0AFFE000
|
unkown
|
page readonly
|
||
501C024A4000
|
trusted library allocation
|
page read and write
|
||
501C02AC4000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
1B814020000
|
heap
|
page read and write
|
||
1B8109B0000
|
heap
|
page readonly
|
||
724C002F4000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
direct allocation
|
page execute and read and write
|
||
501C02398000
|
trusted library allocation
|
page read and write
|
||
78C800750000
|
trusted library allocation
|
page read and write
|
||
501C027D8000
|
trusted library allocation
|
page read and write
|
||
9E787FC000
|
stack
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
78C800644000
|
trusted library allocation
|
page read and write
|
||
72A7000
|
heap
|
page read and write
|
||
9E687FE000
|
stack
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
501C02201000
|
trusted library allocation
|
page read and write
|
||
1B81ACAE000
|
trusted library section
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
501C024A4000
|
trusted library allocation
|
page read and write
|
||
1B8145B3000
|
heap
|
page read and write
|
||
78C800250000
|
trusted library allocation
|
page read and write
|
||
9E6B7FC000
|
stack
|
page read and write
|
||
501C03028000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
501C03574000
|
trusted library allocation
|
page read and write
|
||
501C026A0000
|
trusted library allocation
|
page read and write
|
||
9E067FD000
|
stack
|
page read and write
|
||
724C00201000
|
trusted library allocation
|
page read and write
|
||
501C02664000
|
trusted library allocation
|
page read and write
|
||
1B812860000
|
heap
|
page read and write
|
||
9E67FFE000
|
unkown
|
page readonly
|
||
14C0000
|
heap
|
page read and write
|
||
501C03248000
|
trusted library allocation
|
page read and write
|
||
5C4000220000
|
direct allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
501C032EC000
|
trusted library allocation
|
page read and write
|
||
501C028E8000
|
trusted library allocation
|
page read and write
|
||
501C0260C000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page readonly
|
||
CE0000
|
unkown
|
page readonly
|
||
78C800754000
|
trusted library allocation
|
page read and write
|
||
9E757FE000
|
stack
|
page read and write
|
||
501C026B4000
|
trusted library allocation
|
page read and write
|
||
9E76FFE000
|
unkown
|
page readonly
|
||
501C02494000
|
trusted library allocation
|
page read and write
|
||
501C02D44000
|
trusted library allocation
|
page read and write
|
||
78C8006B0000
|
trusted library allocation
|
page read and write
|
||
720C000
|
heap
|
page read and write
|
||
78C80025C000
|
trusted library allocation
|
page read and write
|
||
501C022FC000
|
trusted library allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
78C800408000
|
trusted library allocation
|
page read and write
|
||
501C02C30000
|
trusted library allocation
|
page read and write
|
||
501C03070000
|
trusted library allocation
|
page read and write
|
||
9E77FFE000
|
unkown
|
page readonly
|
||
710000
|
heap
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
1B810BC0000
|
heap
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
9E09FFE000
|
unkown
|
page readonly
|
||
78C800610000
|
trusted library allocation
|
page read and write
|
||
501C03358000
|
trusted library allocation
|
page read and write
|
||
501C034D4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
78C800640000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C02BDC000
|
trusted library allocation
|
page read and write
|
||
1DE000
|
unkown
|
page read and write
|
||
501C03018000
|
trusted library allocation
|
page read and write
|
||
501C023B4000
|
trusted library allocation
|
page read and write
|
||
501C02A01000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
712F000
|
heap
|
page read and write
|
||
78C8002CC000
|
trusted library allocation
|
page read and write
|
||
78C8007C8000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
7122000
|
heap
|
page read and write
|
||
501C02530000
|
trusted library allocation
|
page read and write
|
||
78C8002ED000
|
trusted library allocation
|
page read and write
|
||
72E5000
|
heap
|
page read and write
|
||
1B81AA82000
|
trusted library section
|
page read and write
|
||
78C8002D4000
|
trusted library allocation
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
9E03FFE000
|
unkown
|
page readonly
|
||
501C02F5C000
|
trusted library allocation
|
page read and write
|
||
9E0BFFE000
|
unkown
|
page readonly
|
||
501C02AB8000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
78C80040C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
501C02F1C000
|
trusted library allocation
|
page read and write
|
||
78C8007D0000
|
trusted library allocation
|
page read and write
|
||
501C032EC000
|
trusted library allocation
|
page read and write
|
||
9E7AFFE000
|
unkown
|
page readonly
|
||
501C033E8000
|
trusted library allocation
|
page read and write
|
||
1B81ABB2000
|
trusted library section
|
page read and write
|
||
78C800404000
|
trusted library allocation
|
page read and write
|
There are 1111 hidden memdumps, click here to show them.