Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C65.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Nov 21 18:56:43 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9DDD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E0D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=2056,i,18354460473252266083,11797604949665790059,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1028
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://docs.google.com/document/M
|
unknown
|
||
http://anglebug.com/6048V
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/5371_
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://anglebug.com/6439X
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/4836U
|
unknown
|
||
http://anglebug.com/8162x
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/4836S
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://anglebug.com/3832e
|
unknown
|
||
http://anglebug.com/3965f
|
unknown
|
||
http://anglebug.com/5055d
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
http://anglebug.com/8229W
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.html0
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5881P
|
unknown
|
||
http://anglebug.com/6860~
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/5881R
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://anglebug.com/7308t
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://anglebug.com/7369w
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://anglebug.com/7369v
|
unknown
|
||
https://anglebug.com/7847Y
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/5430g
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{87787f65-6e2f-9592-f2a2-66f9758f18b4}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7BEC005B8000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC00E40000
|
trusted library allocation
|
page read and write
|
||
7BEC00B50000
|
trusted library allocation
|
page read and write
|
||
7BEC006F9000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7419000
|
heap
|
page read and write
|
||
737C000
|
heap
|
page read and write
|
||
7BEC009E8000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00020000
|
trusted library allocation
|
page read and write
|
||
7BEC01134000
|
trusted library allocation
|
page read and write
|
||
167800230000
|
trusted library allocation
|
page read and write
|
||
72AB000
|
heap
|
page read and write
|
||
7BEC000C8000
|
trusted library allocation
|
page read and write
|
||
7BEC00BA4000
|
trusted library allocation
|
page read and write
|
||
7BEC00D18000
|
trusted library allocation
|
page read and write
|
||
7BEC003F0000
|
trusted library allocation
|
page read and write
|
||
72AF000
|
heap
|
page read and write
|
||
7BEC00F38000
|
trusted library allocation
|
page read and write
|
||
1DBC00424000
|
trusted library allocation
|
page read and write
|
||
657F3FE000
|
stack
|
page read and write
|
||
7BEC001D0000
|
trusted library allocation
|
page read and write
|
||
7BEC00170000
|
trusted library allocation
|
page read and write
|
||
1DBC00840000
|
trusted library allocation
|
page read and write
|
||
73CC000
|
heap
|
page read and write
|
||
711400234000
|
direct allocation
|
page read and write
|
||
184529B8000
|
heap
|
page read and write
|
||
7BEC002C0000
|
trusted library allocation
|
page read and write
|
||
7BEC009D4000
|
trusted library allocation
|
page read and write
|
||
711400280000
|
direct allocation
|
page read and write
|
||
7BEC001D0000
|
trusted library allocation
|
page read and write
|
||
7BEC00180000
|
trusted library allocation
|
page read and write
|
||
657ABFE000
|
unkown
|
page readonly
|
||
7BEC00D58000
|
trusted library allocation
|
page read and write
|
||
1DBC00848000
|
trusted library allocation
|
page read and write
|
||
7BEC00DBC000
|
trusted library allocation
|
page read and write
|
||
72A1000
|
heap
|
page read and write
|
||
184591A0000
|
trusted library section
|
page read and write
|
||
7BEC012E0000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
656DBFE000
|
unkown
|
page readonly
|
||
7BEC00128000
|
trusted library allocation
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
1DBC008C4000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00364000
|
trusted library allocation
|
page read and write
|
||
6C268000
|
unkown
|
page readonly
|
||
7BEC00214000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
68F1000
|
heap
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC002BC000
|
trusted library allocation
|
page read and write
|
||
72A2000
|
heap
|
page read and write
|
||
7BEC00984000
|
trusted library allocation
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
6C269000
|
unkown
|
page read and write
|
||
72AA000
|
heap
|
page read and write
|
||
7433000
|
heap
|
page read and write
|
||
1844EFAE000
|
heap
|
page read and write
|
||
65067FE000
|
stack
|
page read and write
|
||
7BEC0061C000
|
trusted library allocation
|
page read and write
|
||
7BEC00EA8000
|
trusted library allocation
|
page read and write
|
||
7BEC0048C000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
74DF000
|
heap
|
page read and write
|
||
1DBC00844000
|
trusted library allocation
|
page read and write
|
||
7BEC00C38000
|
trusted library allocation
|
page read and write
|
||
1DBC007E4000
|
trusted library allocation
|
page read and write
|
||
1DBC006E8000
|
trusted library allocation
|
page read and write
|
||
7BEC00580000
|
trusted library allocation
|
page read and write
|
||
72A7000
|
heap
|
page read and write
|
||
18458D00000
|
trusted library section
|
page read and write
|
||
7BEC0021C000
|
trusted library allocation
|
page read and write
|
||
1DBC00918000
|
trusted library allocation
|
page read and write
|
||
7BEC00B30000
|
trusted library allocation
|
page read and write
|
||
18452403000
|
heap
|
page read and write
|
||
7BEC006CC000
|
trusted library allocation
|
page read and write
|
||
655F3FE000
|
stack
|
page read and write
|
||
7BEC0034C000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
7BEC00190000
|
trusted library allocation
|
page read and write
|
||
1845850E000
|
trusted library section
|
page read and write
|
||
7BEC00244000
|
trusted library allocation
|
page read and write
|
||
18458E6D000
|
trusted library section
|
page read and write
|
||
7BEC00210000
|
trusted library allocation
|
page read and write
|
||
7BEC00498000
|
trusted library allocation
|
page read and write
|
||
65693FE000
|
stack
|
page read and write
|
||
18452411000
|
heap
|
page read and write
|
||
7BEC01070000
|
trusted library allocation
|
page read and write
|
||
7BEC01058000
|
trusted library allocation
|
page read and write
|
||
711400303000
|
direct allocation
|
page read and write
|
||
7BEC00651000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00318000
|
trusted library allocation
|
page read and write
|
||
7BEC00EA4000
|
trusted library allocation
|
page read and write
|
||
1DBC00238000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
75A5000
|
heap
|
page read and write
|
||
7BEC003A8000
|
trusted library allocation
|
page read and write
|
||
1361000
|
unkown
|
page execute and write copy
|
||
7BEC00318000
|
trusted library allocation
|
page read and write
|
||
1DBC006BC000
|
trusted library allocation
|
page read and write
|
||
1DBC008C8000
|
trusted library allocation
|
page read and write
|
||
1DBC006C8000
|
trusted library allocation
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
6578BFE000
|
unkown
|
page readonly
|
||
7BEC00814000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC002F8000
|
trusted library allocation
|
page read and write
|
||
184588D0000
|
trusted library section
|
page read and write
|
||
1844ED90000
|
heap
|
page read and write
|
||
7BEC00480000
|
trusted library allocation
|
page read and write
|
||
184529DD000
|
heap
|
page read and write
|
||
7BEC00C40000
|
trusted library allocation
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
6C21D000
|
unkown
|
page read and write
|
||
7BEC008C0000
|
trusted library allocation
|
page read and write
|
||
7339000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
167800220000
|
trusted library allocation
|
page read and write
|
||
7BEC010C4000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
18452995000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
65087FE000
|
stack
|
page read and write
|
||
18458E46000
|
trusted library section
|
page read and write
|
||
7BEC00DC0000
|
trusted library allocation
|
page read and write
|
||
791000
|
unkown
|
page readonly
|
||
7BEC00158000
|
trusted library allocation
|
page read and write
|
||
711400284000
|
direct allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC005A4000
|
trusted library allocation
|
page read and write
|
||
7BEC000EC000
|
trusted library allocation
|
page read and write
|
||
7BEC00967000
|
trusted library allocation
|
page read and write
|
||
6560BFE000
|
unkown
|
page readonly
|
||
7BEC00A98000
|
trusted library allocation
|
page read and write
|
||
167800248000
|
trusted library allocation
|
page read and write
|
||
7479000
|
direct allocation
|
page read and write
|
||
7BEC00D70000
|
trusted library allocation
|
page read and write
|
||
73C6000
|
heap
|
page read and write
|
||
7BEC002B0000
|
trusted library allocation
|
page read and write
|
||
7BEC002D8000
|
trusted library allocation
|
page read and write
|
||
1844EF7D000
|
heap
|
page read and write
|
||
7BEC01150000
|
trusted library allocation
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
7366000
|
heap
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
18458543000
|
trusted library section
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
1DBC002ED000
|
trusted library allocation
|
page read and write
|
||
6573BFE000
|
unkown
|
page readonly
|
||
65703FE000
|
stack
|
page read and write
|
||
7114002E4000
|
direct allocation
|
page read and write
|
||
167800264000
|
trusted library allocation
|
page read and write
|
||
7BEC00E28000
|
trusted library allocation
|
page read and write
|
||
184568B0000
|
trusted library allocation
|
page read and write
|
||
7BEC00E5C000
|
trusted library allocation
|
page read and write
|
||
7BEC00AFC000
|
trusted library allocation
|
page read and write
|
||
656B3FE000
|
stack
|
page read and write
|
||
7BEC0100C000
|
trusted library allocation
|
page read and write
|
||
1DBC00601000
|
trusted library allocation
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
72A4000
|
heap
|
page read and write
|
||
65653FB000
|
stack
|
page read and write
|
||
167800288000
|
trusted library allocation
|
page read and write
|
||
7BEC00C50000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC001E0000
|
trusted library allocation
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
7BEC00F5C000
|
trusted library allocation
|
page read and write
|
||
6565BFE000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
18458502000
|
trusted library section
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
184568F7000
|
unclassified section
|
page read and write
|
||
6509FFE000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
1845297C000
|
heap
|
page read and write
|
||
1DBC00700000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00C74000
|
trusted library allocation
|
page read and write
|
||
7BEC01120000
|
trusted library allocation
|
page read and write
|
||
1DBC0060C000
|
trusted library allocation
|
page read and write
|
||
7BEC00F04000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
1678002C0000
|
trusted library allocation
|
page read and write
|
||
7BEC004A8000
|
trusted library allocation
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
1678002C0000
|
trusted library allocation
|
page read and write
|
||
1DBC00408000
|
trusted library allocation
|
page read and write
|
||
18458AD0000
|
trusted library section
|
page read and write
|
||
7BEC001B8000
|
trusted library allocation
|
page read and write
|
||
7348000
|
heap
|
page read and write
|
||
7BEC00A30000
|
trusted library allocation
|
page read and write
|
||
7BEC00A7C000
|
trusted library allocation
|
page read and write
|
||
7BEC00E6C000
|
trusted library allocation
|
page read and write
|
||
7BEC00001000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
7BEC001F8000
|
trusted library allocation
|
page read and write
|
||
1844EF9D000
|
heap
|
page read and write
|
||
6572BFE000
|
unkown
|
page readonly
|
||
655D3FE000
|
stack
|
page read and write
|
||
7BEC00E0C000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1DBC00430000
|
trusted library allocation
|
page read and write
|
||
1DBC0081C000
|
trusted library allocation
|
page read and write
|
||
1DBC00974000
|
trusted library allocation
|
page read and write
|
||
73F6000
|
heap
|
page read and write
|
||
7BEC0111C000
|
trusted library allocation
|
page read and write
|
||
1DBC00401000
|
trusted library allocation
|
page read and write
|
||
1DBC006AC000
|
trusted library allocation
|
page read and write
|
||
1DBC00898000
|
trusted library allocation
|
page read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
18457270000
|
heap
|
page read and write
|
||
18458D20000
|
trusted library section
|
page read and write
|
||
1DBC006C8000
|
trusted library allocation
|
page read and write
|
||
184523FF000
|
heap
|
page read and write
|
||
184585CD000
|
trusted library section
|
page read and write
|
||
1844EEB0000
|
heap
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC005CC000
|
trusted library allocation
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
711400201000
|
direct allocation
|
page read and write
|
||
742A000
|
heap
|
page read and write
|
||
1844EFA9000
|
heap
|
page read and write
|
||
6506FFE000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1DBC00201000
|
trusted library allocation
|
page read and write
|
||
1DBC006D4000
|
trusted library allocation
|
page read and write
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
6501FFE000
|
unkown
|
page readonly
|
||
18458D11000
|
trusted library section
|
page read and write
|
||
1844EF89000
|
heap
|
page read and write
|
||
65047FA000
|
stack
|
page read and write
|
||
735F000
|
heap
|
page read and write
|
||
18452A0D000
|
heap
|
page read and write
|
||
7BEC00B34000
|
trusted library allocation
|
page read and write
|
||
72A4000
|
heap
|
page read and write
|
||
18452A03000
|
heap
|
page read and write
|
||
18452993000
|
heap
|
page read and write
|
||
7BEC0004C000
|
trusted library allocation
|
page read and write
|
||
73FF000
|
heap
|
page read and write
|
||
7BEC0020C000
|
trusted library allocation
|
page read and write
|
||
1DBC007D4000
|
trusted library allocation
|
page read and write
|
||
7BEC012DC000
|
trusted library allocation
|
page read and write
|
||
7BEC004B4000
|
trusted library allocation
|
page read and write
|
||
72A9000
|
heap
|
page read and write
|
||
7BEC00E88000
|
trusted library allocation
|
page read and write
|
||
7BEC00C61000
|
trusted library allocation
|
page read and write
|
||
167800270000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1DBC008EC000
|
trusted library allocation
|
page read and write
|
||
7114002EC000
|
direct allocation
|
page read and write
|
||
7BEC00C28000
|
trusted library allocation
|
page read and write
|
||
1844F053000
|
heap
|
page read and write
|
||
657C3FE000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
7BEC00A2B000
|
trusted library allocation
|
page read and write
|
||
1DBC002F4000
|
trusted library allocation
|
page read and write
|
||
7470000
|
heap
|
page read and write
|
||
7BEC00658000
|
trusted library allocation
|
page read and write
|
||
1DBC00220000
|
trusted library allocation
|
page read and write
|
||
71140020C000
|
direct allocation
|
page read and write
|
||
791000
|
unkown
|
page readonly
|
||
7BEC003A8000
|
trusted library allocation
|
page read and write
|
||
7BEC00F74000
|
trusted library allocation
|
page read and write
|
||
18458E62000
|
trusted library section
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC0080C000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1844EE70000
|
heap
|
page readonly
|
||
7BEC00F5C000
|
trusted library allocation
|
page read and write
|
||
7BEC00230000
|
trusted library allocation
|
page read and write
|
||
18452406000
|
heap
|
page read and write
|
||
72A2000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
184523D0000
|
heap
|
page read and write
|
||
7469000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
7BEC00308000
|
trusted library allocation
|
page read and write
|
||
65633FE000
|
stack
|
page read and write
|
||
7BEC00520000
|
trusted library allocation
|
page read and write
|
||
7BEC00B1C000
|
trusted library allocation
|
page read and write
|
||
7BEC00330000
|
trusted library allocation
|
page read and write
|
||
184529F0000
|
heap
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
7BEC001E8000
|
trusted library allocation
|
page read and write
|
||
7BEC002B0000
|
trusted library allocation
|
page read and write
|
||
184585C2000
|
trusted library section
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC002B0000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
72AE000
|
heap
|
page read and write
|
||
7BEC01048000
|
trusted library allocation
|
page read and write
|
||
1845299E000
|
heap
|
page read and write
|
||
167800250000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page execute and write copy
|
||
780000
|
unkown
|
page readonly
|
||
65783FB000
|
stack
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7BEC005F0000
|
trusted library allocation
|
page read and write
|
||
1DBC007C0000
|
trusted library allocation
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
1678002C8000
|
trusted library allocation
|
page read and write
|
||
167800294000
|
trusted library allocation
|
page read and write
|
||
7BEC00570000
|
trusted library allocation
|
page read and write
|
||
65663FC000
|
stack
|
page read and write
|
||
7BEC00338000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
direct allocation
|
page read and write
|
||
1DBC002D4000
|
trusted library allocation
|
page read and write
|
||
73B8000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC01001000
|
trusted library allocation
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
7BEC00918000
|
trusted library allocation
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
1DBC008F4000
|
trusted library allocation
|
page read and write
|
||
73E9000
|
heap
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
7BEC00508000
|
trusted library allocation
|
page read and write
|
||
7BEC00838000
|
trusted library allocation
|
page read and write
|
||
7BEC00C40000
|
trusted library allocation
|
page read and write
|
||
7BEC0009C000
|
trusted library allocation
|
page read and write
|
||
71140023C000
|
direct allocation
|
page read and write
|
||
65723FB000
|
stack
|
page read and write
|
||
711400260000
|
direct allocation
|
page read and write
|
||
18456B8F000
|
heap
|
page read and write
|
||
7BEC00EF8000
|
trusted library allocation
|
page read and write
|
||
1844EE80000
|
heap
|
page read and write
|
||
7475000
|
heap
|
page read and write
|
||
7BEC00118000
|
trusted library allocation
|
page read and write
|
||
7BEC0109C000
|
trusted library allocation
|
page read and write
|
||
7BEC00401000
|
trusted library allocation
|
page read and write
|
||
184587C7000
|
unclassified section
|
page read and write
|
||
74F4000
|
heap
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
18452403000
|
heap
|
page read and write
|
||
7BEC009B4000
|
trusted library allocation
|
page read and write
|
||
6563BFE000
|
unkown
|
page readonly
|
||
7BEC00F00000
|
trusted library allocation
|
page read and write
|
||
7BEC008FC000
|
trusted library allocation
|
page read and write
|
||
7BEC008CC000
|
trusted library allocation
|
page read and write
|
||
1844F010000
|
trusted library section
|
page readonly
|
||
780000
|
unkown
|
page readonly
|
||
72AD000
|
heap
|
page read and write
|
||
7BEC00860000
|
trusted library allocation
|
page read and write
|
||
7BEC002D3000
|
trusted library allocation
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
7BEC00828000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
heap
|
page read and write
|
||
6503FFE000
|
unkown
|
page readonly
|
||
7BEC00730000
|
trusted library allocation
|
page read and write
|
||
7382000
|
heap
|
page read and write
|
||
7BEC00F04000
|
trusted library allocation
|
page read and write
|
||
7BEC00234000
|
trusted library allocation
|
page read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
1844EF49000
|
heap
|
page read and write
|
||
7BEC00144000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
184591AE000
|
trusted library section
|
page read and write
|
||
655A3EF000
|
stack
|
page read and write
|
||
1DBC0087C000
|
trusted library allocation
|
page read and write
|
||
746E000
|
heap
|
page read and write
|
||
7BEC0065C000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1DBC0078C000
|
trusted library allocation
|
page read and write
|
||
7BEC0040C000
|
trusted library allocation
|
page read and write
|
||
7BEC00EB8000
|
trusted library allocation
|
page read and write
|
||
7BEC01178000
|
trusted library allocation
|
page read and write
|
||
7BEC00D80000
|
trusted library allocation
|
page read and write
|
||
72A8000
|
heap
|
page read and write
|
||
18456B50000
|
heap
|
page read and write
|
||
1845298B000
|
heap
|
page read and write
|
||
7BEC0129C000
|
trusted library allocation
|
page read and write
|
||
7BEC007C8000
|
trusted library allocation
|
page read and write
|
||
7BEC00DCC000
|
trusted library allocation
|
page read and write
|
||
7BEC00AC8000
|
trusted library allocation
|
page read and write
|
||
7BEC00CD4000
|
trusted library allocation
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
18458F00000
|
trusted library section
|
page read and write
|
||
1844EFAE000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
1DBC00920000
|
trusted library allocation
|
page read and write
|
||
7BEC001F4000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
1678002A0000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
6577BFE000
|
unkown
|
page readonly
|
||
1844EECE000
|
heap
|
page read and write
|
||
16CF000
|
stack
|
page read and write
|
||
7BEC00092000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
711400220000
|
direct allocation
|
page read and write
|
||
7BEC002CC000
|
trusted library allocation
|
page read and write
|
||
1DBC007A0000
|
trusted library allocation
|
page read and write
|
||
18452949000
|
heap
|
page read and write
|
||
656CBFE000
|
unkown
|
page readonly
|
||
1678002A0000
|
trusted library allocation
|
page read and write
|
||
7BEC00A0C000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
65673FC000
|
stack
|
page read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
6575BFE000
|
unkown
|
page readonly
|
||
7BEC0077B000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
6502FFE000
|
unkown
|
page readonly
|
||
7DC000
|
stack
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
657CBFE000
|
unkown
|
page readonly
|
||
7BEC0000C000
|
trusted library allocation
|
page read and write
|
||
1DBC00404000
|
trusted library allocation
|
page read and write
|
||
65097FE000
|
stack
|
page read and write
|
||
752E000
|
heap
|
page read and write
|
||
7BEC00A21000
|
trusted library allocation
|
page read and write
|
||
73AF000
|
heap
|
page read and write
|
||
7BEC00388000
|
trusted library allocation
|
page read and write
|
||
7BEC00D30000
|
trusted library allocation
|
page read and write
|
||
1845294F000
|
heap
|
page read and write
|
||
1844EEB8000
|
heap
|
page read and write
|
||
7BEC0020C000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
657A3FD000
|
stack
|
page read and write
|
||
7BEC00324000
|
trusted library allocation
|
page read and write
|
||
1DBC00960000
|
trusted library allocation
|
page read and write
|
||
7BEC00108000
|
trusted library allocation
|
page read and write
|
||
1844EF57000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00E1D000
|
trusted library allocation
|
page read and write
|
||
747B000
|
direct allocation
|
page read and write
|
||
1DBC008E8000
|
trusted library allocation
|
page read and write
|
||
7BEC0036C000
|
trusted library allocation
|
page read and write
|
||
7BEC00898000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
711400250000
|
direct allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
711400215000
|
direct allocation
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
1DBC0039C000
|
trusted library allocation
|
page read and write
|
||
18456947000
|
unclassified section
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
7BEC00358000
|
trusted library allocation
|
page read and write
|
||
1844F050000
|
heap
|
page read and write
|
||
1DBC00210000
|
trusted library allocation
|
page read and write
|
||
1678002F8000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
7BEC0023C000
|
trusted library allocation
|
page read and write
|
||
7BEC00CD4000
|
trusted library allocation
|
page read and write
|
||
1844EF4D000
|
heap
|
page read and write
|
||
7BEC00248000
|
trusted library allocation
|
page read and write
|
||
6576BFE000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
1DBC00880000
|
trusted library allocation
|
page read and write
|
||
18458EA0000
|
trusted library section
|
page read and write
|
||
18459177000
|
unclassified section
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7BEC00C01000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
7BEC00CB8000
|
trusted library allocation
|
page read and write
|
||
73CC000
|
heap
|
page read and write
|
||
7BEC00BB8000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1DBC00248000
|
trusted library allocation
|
page read and write
|
||
167800274000
|
trusted library allocation
|
page read and write
|
||
764E000
|
heap
|
page read and write
|
||
72AC000
|
heap
|
page read and write
|
||
655DBFE000
|
unkown
|
page readonly
|
||
29AA000
|
heap
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
1DBC0082C000
|
trusted library allocation
|
page read and write
|
||
1DBC006F0000
|
trusted library allocation
|
page read and write
|
||
7BEC001EC000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
68F1000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
7BEC012F0000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00BB8000
|
trusted library allocation
|
page read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
18458D91000
|
trusted library section
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
68F1000
|
heap
|
page read and write
|
||
18456970000
|
heap
|
page read and write
|
||
711400217000
|
direct allocation
|
page read and write
|
||
7BEC00D20000
|
trusted library allocation
|
page read and write
|
||
7BEC00224000
|
trusted library allocation
|
page read and write
|
||
7BEC0040C000
|
trusted library allocation
|
page read and write
|
||
7342000
|
heap
|
page read and write
|
||
65793FD000
|
stack
|
page read and write
|
||
7BEC00388000
|
trusted library allocation
|
page read and write
|
||
18456D72000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
1DBC00894000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
167800260000
|
trusted library allocation
|
page read and write
|
||
7BEC00DD8000
|
trusted library allocation
|
page read and write
|
||
7BEC01174000
|
trusted library allocation
|
page read and write
|
||
1DBC00884000
|
trusted library allocation
|
page read and write
|
||
7114002A8000
|
direct allocation
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
1DBC00801000
|
trusted library allocation
|
page read and write
|
||
711400270000
|
direct allocation
|
page read and write
|
||
7BEC00420000
|
trusted library allocation
|
page read and write
|
||
7BEC004FC000
|
trusted library allocation
|
page read and write
|
||
18458D3E000
|
trusted library section
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
7BEC00590000
|
trusted library allocation
|
page read and write
|
||
1DBC00860000
|
trusted library allocation
|
page read and write
|
||
167800235000
|
trusted library allocation
|
page read and write
|
||
655B3FE000
|
unkown
|
page read and write
|
||
1844EF9D000
|
heap
|
page read and write
|
||
1678002F4000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
7BEC00B14000
|
trusted library allocation
|
page read and write
|
||
7BEC00AA4000
|
trusted library allocation
|
page read and write
|
||
7BEC0075C000
|
trusted library allocation
|
page read and write
|
||
1DBC008B8000
|
trusted library allocation
|
page read and write
|
||
6C140000
|
unkown
|
page readonly
|
||
7BEC00CC4000
|
trusted library allocation
|
page read and write
|
||
7BEC00338000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00144000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
18452997000
|
heap
|
page read and write
|
||
7322000
|
direct allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC012A8000
|
trusted library allocation
|
page read and write
|
||
7444000
|
heap
|
page read and write
|
||
7BEC008D4000
|
trusted library allocation
|
page read and write
|
||
7BEC00FAC000
|
trusted library allocation
|
page read and write
|
||
7BEC002C0000
|
trusted library allocation
|
page read and write
|
||
1DBC002FC000
|
trusted library allocation
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
7BEC0120C000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
direct allocation
|
page execute and read and write
|
||
1DBC00904000
|
trusted library allocation
|
page read and write
|
||
1DBC0039C000
|
trusted library allocation
|
page read and write
|
||
65027FE000
|
stack
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC009DC000
|
trusted library allocation
|
page read and write
|
||
7BEC00EC4000
|
trusted library allocation
|
page read and write
|
||
18452A38000
|
heap
|
page read and write
|
||
7BEC00710000
|
trusted library allocation
|
page read and write
|
||
711400294000
|
direct allocation
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
72A9000
|
heap
|
page read and write
|
||
18452410000
|
heap
|
page read and write
|
||
18458D70000
|
trusted library section
|
page read and write
|
||
167800201000
|
trusted library allocation
|
page read and write
|
||
1DBC008AC000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1DBC008E4000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC00F00000
|
trusted library allocation
|
page read and write
|
||
7BEC00994000
|
trusted library allocation
|
page read and write
|
||
6570BFE000
|
unkown
|
page readonly
|
||
6FB0000
|
direct allocation
|
page execute and read and write
|
||
1DBC0070C000
|
trusted library allocation
|
page read and write
|
||
656C3FA000
|
stack
|
page read and write
|
||
1DBC00890000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
7454000
|
heap
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
7BEC00E5C000
|
trusted library allocation
|
page read and write
|
||
18452403000
|
heap
|
page read and write
|
||
7BEC002D1000
|
trusted library allocation
|
page read and write
|
||
7BEC00D48000
|
trusted library allocation
|
page read and write
|
||
18456BA2000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
650BFFE000
|
unkown
|
page readonly
|
||
184584F0000
|
trusted library section
|
page read and write
|
||
7BEC00B28000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
direct allocation
|
page read and write
|
||
657DBFE000
|
unkown
|
page readonly
|
||
65077FE000
|
stack
|
page read and write
|
||
7BEC006E0000
|
trusted library allocation
|
page read and write
|
||
1678002C0000
|
trusted library allocation
|
page read and write
|
||
7BEC00630000
|
trusted library allocation
|
page read and write
|
||
7BEC00E38000
|
trusted library allocation
|
page read and write
|
||
7BEC00DE4000
|
trusted library allocation
|
page read and write
|
||
18458676000
|
trusted library section
|
page read and write
|
||
7BEC00A8C000
|
trusted library allocation
|
page read and write
|
||
1DBC0084C000
|
trusted library allocation
|
page read and write
|
||
7BEC00F60000
|
trusted library allocation
|
page read and write
|
||
18452A16000
|
heap
|
page read and write
|
||
184523FA000
|
heap
|
page read and write
|
||
6508FFE000
|
unkown
|
page readonly
|
||
7BEC002CC000
|
trusted library allocation
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
656E3FE000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
656ABFE000
|
unkown
|
page readonly
|
||
1DBC00728000
|
trusted library allocation
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
6507FFE000
|
unkown
|
page readonly
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
65773FD000
|
stack
|
page read and write
|
||
656D3FE000
|
stack
|
page read and write
|
||
7BEC00788000
|
trusted library allocation
|
page read and write
|
||
1DBC00778000
|
trusted library allocation
|
page read and write
|
||
7BEC00F00000
|
trusted library allocation
|
page read and write
|
||
18452993000
|
heap
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
7BEC00E5C000
|
trusted library allocation
|
page read and write
|
||
78E000
|
unkown
|
page write copy
|
||
184528D0000
|
trusted library section
|
page read and write
|
||
7BEC003F0000
|
trusted library allocation
|
page read and write
|
||
18456973000
|
heap
|
page read and write
|
||
65683FE000
|
stack
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
18452640000
|
heap
|
page read and write
|
||
6504FFE000
|
unkown
|
page readonly
|
||
1DBC002F0000
|
trusted library allocation
|
page read and write
|
||
6567BFE000
|
unkown
|
page readonly
|
||
72A0000
|
heap
|
page read and write
|
||
7BEC00801000
|
trusted library allocation
|
page read and write
|
||
1DBC0040C000
|
trusted library allocation
|
page read and write
|
||
655E3FE000
|
stack
|
page read and write
|
||
184529E9000
|
heap
|
page read and write
|
||
18458D80000
|
trusted library section
|
page read and write
|
||
1DBC00818000
|
trusted library allocation
|
page read and write
|
||
1DBC007D0000
|
trusted library allocation
|
page read and write
|
||
1DBC00878000
|
trusted library allocation
|
page read and write
|
||
1DBC007E0000
|
trusted library allocation
|
page read and write
|
||
7BEC00740000
|
trusted library allocation
|
page read and write
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
184523FA000
|
heap
|
page read and write
|
||
7114002DC000
|
direct allocation
|
page read and write
|
||
7BEC00A5C000
|
trusted library allocation
|
page read and write
|
||
711400290000
|
direct allocation
|
page read and write
|
||
18451590000
|
unkown
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC0030C000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
7BEC00201000
|
trusted library allocation
|
page read and write
|
||
1DBC006E8000
|
trusted library allocation
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
6579BFE000
|
unkown
|
page readonly
|
||
1DBC0091C000
|
trusted library allocation
|
page read and write
|
||
657B3FB000
|
stack
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC002CE000
|
trusted library allocation
|
page read and write
|
||
756E000
|
heap
|
page read and write
|
||
7BEC00678000
|
trusted library allocation
|
page read and write
|
||
1845294D000
|
heap
|
page read and write
|
||
711400210000
|
direct allocation
|
page read and write
|
||
1678002F0000
|
trusted library allocation
|
page read and write
|
||
7BEC01068000
|
trusted library allocation
|
page read and write
|
||
7BEC00E6C000
|
trusted library allocation
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
1678002B0000
|
trusted library allocation
|
page read and write
|
||
1678002B0000
|
trusted library allocation
|
page read and write
|
||
18452411000
|
heap
|
page read and write
|
||
7386000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
65763FC000
|
stack
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1678002C0000
|
trusted library allocation
|
page read and write
|
||
1DBC006AC000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
650B7FE000
|
stack
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
65623FB000
|
stack
|
page read and write
|
||
1DBC0025C000
|
trusted library allocation
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
657BBFE000
|
unkown
|
page readonly
|
||
7BEC00890000
|
trusted library allocation
|
page read and write
|
||
167800278000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
184529D3000
|
heap
|
page read and write
|
||
7BEC000BC000
|
trusted library allocation
|
page read and write
|
||
1844EF6B000
|
heap
|
page read and write
|
||
5DA000
|
stack
|
page read and write
|
||
72AA000
|
heap
|
page read and write
|
||
72A2000
|
heap
|
page read and write
|
||
1DBC002B8000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
73EC000
|
heap
|
page read and write
|
||
7BEC00744000
|
trusted library allocation
|
page read and write
|
||
739C000
|
heap
|
page read and write
|
||
657EBFE000
|
unkown
|
page readonly
|
||
78E000
|
unkown
|
page write copy
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
6561BFE000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00E0C000
|
trusted library allocation
|
page read and write
|
||
1DBC0071C000
|
trusted library allocation
|
page read and write
|
||
73FB000
|
heap
|
page read and write
|
||
6568BFE000
|
unkown
|
page readonly
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
1DBC00288000
|
trusted library allocation
|
page read and write
|
||
7BEC00398000
|
trusted library allocation
|
page read and write
|
||
7BEC01160000
|
trusted library allocation
|
page read and write
|
||
1DBC006F4000
|
trusted library allocation
|
page read and write
|
||
7BEC00694000
|
trusted library allocation
|
page read and write
|
||
7BEC00E7C000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
18458600000
|
trusted library section
|
page read and write
|
||
7BEC00BF8000
|
trusted library allocation
|
page read and write
|
||
6562BFE000
|
unkown
|
page readonly
|
||
18452BD0000
|
trusted library section
|
page read and write
|
||
746E000
|
heap
|
page read and write
|
||
7BEC00D98000
|
trusted library allocation
|
page read and write
|
||
7BEC00F5C000
|
trusted library allocation
|
page read and write
|
||
1DBC00850000
|
trusted library allocation
|
page read and write
|
||
7BEC00C0C000
|
trusted library allocation
|
page read and write
|
||
781000
|
unkown
|
page execute read
|
||
7BEC00D88000
|
trusted library allocation
|
page read and write
|
||
18452943000
|
heap
|
page read and write
|
||
7BEC012C0000
|
trusted library allocation
|
page read and write
|
||
6500FFE000
|
unkown
|
page readonly
|
||
758D000
|
heap
|
page read and write
|
||
6574BFE000
|
unkown
|
page readonly
|
||
7BEC002CC000
|
trusted library allocation
|
page read and write
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
7BEC0129C000
|
trusted library allocation
|
page read and write
|
||
7495000
|
heap
|
page read and write
|
||
72AA000
|
heap
|
page read and write
|
||
1DBC008D8000
|
trusted library allocation
|
page read and write
|
||
7BEC00C98000
|
trusted library allocation
|
page read and write
|
||
1DBC002B0000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC0003D000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
7BEC0024C000
|
trusted library allocation
|
page read and write
|
||
7BEC00ED4000
|
trusted library allocation
|
page read and write
|
||
1678002D8000
|
trusted library allocation
|
page read and write
|
||
18458D32000
|
trusted library section
|
page read and write
|
||
72A4000
|
heap
|
page read and write
|
||
18458690000
|
trusted library section
|
page read and write
|
||
65733FB000
|
stack
|
page read and write
|
||
1678002A0000
|
trusted library allocation
|
page read and write
|
||
7BEC0096C000
|
trusted library allocation
|
page read and write
|
||
7BEC004D8000
|
trusted library allocation
|
page read and write
|
||
656EBFE000
|
unkown
|
page readonly
|
||
7BEC00601000
|
trusted library allocation
|
page read and write
|
||
7BEC004A8000
|
trusted library allocation
|
page read and write
|
||
1DBC008A8000
|
trusted library allocation
|
page read and write
|
||
7BEC0034C000
|
trusted library allocation
|
page read and write
|
||
7BEC00378000
|
trusted library allocation
|
page read and write
|
||
655EBFE000
|
unkown
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
7BEC00D58000
|
trusted library allocation
|
page read and write
|
||
7BEC0107C000
|
trusted library allocation
|
page read and write
|
||
7441000
|
heap
|
page read and write
|
||
7BEC001C4000
|
trusted library allocation
|
page read and write
|
||
18452940000
|
heap
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
7BEC0063C000
|
trusted library allocation
|
page read and write
|
||
1678002A0000
|
trusted library allocation
|
page read and write
|
||
78A000
|
unkown
|
page readonly
|
||
7BEC003F0000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
direct allocation
|
page execute and read and write
|
||
791000
|
unkown
|
page readonly
|
||
1844EF80000
|
heap
|
page read and write
|
||
763F000
|
heap
|
page read and write
|
||
1DBC002CC000
|
trusted library allocation
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
7BEC006F0000
|
trusted library allocation
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
7BEC0014C000
|
trusted library allocation
|
page read and write
|
||
7BEC00144000
|
trusted library allocation
|
page read and write
|
||
71140024C000
|
direct allocation
|
page read and write
|
||
7BEC00CF0000
|
trusted library allocation
|
page read and write
|
||
791000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
7363000
|
heap
|
page read and write
|
||
7BEC004AC000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
18452404000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1678002E4000
|
trusted library allocation
|
page read and write
|
||
7BEC007A4000
|
trusted library allocation
|
page read and write
|
||
7BEC010C0000
|
trusted library allocation
|
page read and write
|
||
65037FE000
|
stack
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
8CF000
|
unkown
|
page read and write
|
||
72A4000
|
heap
|
page read and write
|
||
7440000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC00C40000
|
trusted library allocation
|
page read and write
|
||
184523E0000
|
heap
|
page read and write
|
||
7BEC00CD4000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00B90000
|
trusted library allocation
|
page read and write
|
||
1837000
|
heap
|
page read and write
|
||
1DBC00868000
|
trusted library allocation
|
page read and write
|
||
7114002D0000
|
direct allocation
|
page read and write
|
||
7BEC00303000
|
trusted library allocation
|
page read and write
|
||
7393000
|
heap
|
page read and write
|
||
1DBC00864000
|
trusted library allocation
|
page read and write
|
||
7BEC00344000
|
trusted library allocation
|
page read and write
|
||
7418000
|
heap
|
page read and write
|
||
78E000
|
unkown
|
page write copy
|
||
73CC000
|
heap
|
page read and write
|
||
7BEC00924000
|
trusted library allocation
|
page read and write
|
||
1844EF98000
|
heap
|
page read and write
|
||
7BEC001D0000
|
trusted library allocation
|
page read and write
|
||
18458CF7000
|
unclassified section
|
page read and write
|
||
16780020C000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
7BEC00EA8000
|
trusted library allocation
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
791000
|
unkown
|
page readonly
|
||
1678002B0000
|
trusted library allocation
|
page read and write
|
||
7BEC001E4000
|
trusted library allocation
|
page read and write
|
||
7BEC00C28000
|
trusted library allocation
|
page read and write
|
||
7BEC00C1C000
|
trusted library allocation
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
7BEC00720000
|
trusted library allocation
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
1845240C000
|
heap
|
page read and write
|
||
7BEC00C84000
|
trusted library allocation
|
page read and write
|
||
7BEC00FA8000
|
trusted library allocation
|
page read and write
|
||
6505FFE000
|
unkown
|
page readonly
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
65017FD000
|
stack
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
18456B60000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC00388000
|
trusted library allocation
|
page read and write
|
||
7BEC00963000
|
trusted library allocation
|
page read and write
|
||
655C3FE000
|
stack
|
page read and write
|
||
7BEC002AC000
|
trusted library allocation
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
657D3FE000
|
stack
|
page read and write
|
||
18452A40000
|
trusted library section
|
page read and write
|
||
1845299A000
|
heap
|
page read and write
|
||
7BEC003A8000
|
trusted library allocation
|
page read and write
|
||
7BEC01148000
|
trusted library allocation
|
page read and write
|
||
1844EFA9000
|
heap
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
167800238000
|
trusted library allocation
|
page read and write
|
||
656FBFE000
|
unkown
|
page readonly
|
||
184529C6000
|
heap
|
page read and write
|
||
7BEC00C6C000
|
trusted library allocation
|
page read and write
|
||
7BEC000B0000
|
trusted library allocation
|
page read and write
|
||
7BEC010B8000
|
trusted library allocation
|
page read and write
|
||
656F3FE000
|
stack
|
page read and write
|
||
1844EF6D000
|
heap
|
page read and write
|
||
7BEC00D64000
|
trusted library allocation
|
page read and write
|
||
1DBC0020C000
|
trusted library allocation
|
page read and write
|
||
7BEC012EC000
|
trusted library allocation
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
18452980000
|
heap
|
page read and write
|
||
7BEC001B0000
|
trusted library allocation
|
page read and write
|
||
1DBC007AC000
|
trusted library allocation
|
page read and write
|
||
655FBFE000
|
unkown
|
page readonly
|
||
1844EFE0000
|
trusted library allocation
|
page read and write
|
||
184529CC000
|
heap
|
page read and write
|
||
6569BFE000
|
unkown
|
page readonly
|
||
7BEC00B8C000
|
trusted library allocation
|
page read and write
|
||
7BEC00324000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
unkown
|
page readonly
|
||
7BEC00F9C000
|
trusted library allocation
|
page read and write
|
||
7BEC00C38000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
657FBFE000
|
unkown
|
page readonly
|
||
7BEC00AF4000
|
trusted library allocation
|
page read and write
|
||
655BBFE000
|
unkown
|
page readonly
|
||
18456BA0000
|
heap
|
page read and write
|
||
184529AF000
|
heap
|
page read and write
|
||
6571BFE000
|
unkown
|
page readonly
|
||
1DBC00250000
|
trusted library allocation
|
page read and write
|
||
7BEC00220000
|
trusted library allocation
|
page read and write
|
||
6C26C000
|
unkown
|
page readonly
|
||
1DBC00230000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
1845240C000
|
heap
|
page read and write
|
||
7BEC002B2000
|
trusted library allocation
|
page read and write
|
||
1DBC00418000
|
trusted library allocation
|
page read and write
|
||
7BEC012B4000
|
trusted library allocation
|
page read and write
|
||
711400274000
|
direct allocation
|
page read and write
|
||
7BEC00240000
|
trusted library allocation
|
page read and write
|
||
7BEC00C7C000
|
trusted library allocation
|
page read and write
|
||
7BEC00218000
|
trusted library allocation
|
page read and write
|
||
73EF000
|
heap
|
page read and write
|
||
7BEC00E98000
|
trusted library allocation
|
page read and write
|
||
1844F060000
|
heap
|
page read and write
|
||
7BEC007EC000
|
trusted library allocation
|
page read and write
|
||
184529FF000
|
heap
|
page read and write
|
||
742C000
|
heap
|
page read and write
|
||
65643FA000
|
stack
|
page read and write
|
||
7BEC00948000
|
trusted library allocation
|
page read and write
|
||
1DBC0085C000
|
trusted library allocation
|
page read and write
|
||
1DBC00874000
|
trusted library allocation
|
page read and write
|
||
1844EF98000
|
heap
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
7BEC00F9C000
|
trusted library allocation
|
page read and write
|
||
7BEC00F10000
|
trusted library allocation
|
page read and write
|
||
7545000
|
heap
|
page read and write
|
||
7BEC00A40000
|
trusted library allocation
|
page read and write
|
||
1DBC00788000
|
trusted library allocation
|
page read and write
|
||
1DBC007BC000
|
trusted library allocation
|
page read and write
|
||
7BEC00238000
|
trusted library allocation
|
page read and write
|
||
7395000
|
heap
|
page read and write
|
||
6C21F000
|
unkown
|
page readonly
|
||
7BEC00C40000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
65753FC000
|
stack
|
page read and write
|
||
184529BC000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
7BEC0108C000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
direct allocation
|
page read and write
|
||
6564BFE000
|
unkown
|
page readonly
|
||
68F1000
|
heap
|
page read and write
|
||
65603FD000
|
stack
|
page read and write
|
||
1DBC0095C000
|
trusted library allocation
|
page read and write
|
||
1A5F000
|
stack
|
page read and write
|
||
1678002C0000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
1DBC0080C000
|
trusted library allocation
|
page read and write
|
||
18458DA3000
|
trusted library section
|
page read and write
|
||
7BEC0022C000
|
trusted library allocation
|
page read and write
|
||
7346000
|
heap
|
page read and write
|
||
6FE0000
|
direct allocation
|
page execute and read and write
|
||
1DBC008F0000
|
trusted library allocation
|
page read and write
|
||
18452995000
|
heap
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
7BEC0060C000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1DBC00948000
|
trusted library allocation
|
page read and write
|
||
7BEC00DC6000
|
trusted library allocation
|
page read and write
|
||
7BEC00705000
|
trusted library allocation
|
page read and write
|
||
7BEC00CE8000
|
trusted library allocation
|
page read and write
|
||
740D000
|
heap
|
page read and write
|
||
184529FD000
|
heap
|
page read and write
|
||
65713FD000
|
stack
|
page read and write
|
||
18452A01000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1844EF70000
|
heap
|
page read and write
|
||
7BEC01201000
|
trusted library allocation
|
page read and write
|
||
7377000
|
heap
|
page read and write
|
||
184523FF000
|
heap
|
page read and write
|
||
7BEC00F84000
|
trusted library allocation
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
7114002AC000
|
direct allocation
|
page read and write
|
||
184529A2000
|
heap
|
page read and write
|
||
1DBC006AC000
|
trusted library allocation
|
page read and write
|
||
7BEC00BCC000
|
trusted library allocation
|
page read and write
|
||
7BEC00768000
|
trusted library allocation
|
page read and write
|
||
7BEC001A0000
|
trusted library allocation
|
page read and write
|
||
656A3FE000
|
stack
|
page read and write
|
||
6C141000
|
unkown
|
page execute read
|
||
7BEC009C8000
|
trusted library allocation
|
page read and write
|
||
65743FC000
|
stack
|
page read and write
|
||
7BEC00DF0000
|
trusted library allocation
|
page read and write
|
||
184529AF000
|
heap
|
page read and write
|
||
1844EFD0000
|
trusted library allocation
|
page read and write
|
||
73F2000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00739000
|
trusted library allocation
|
page read and write
|
||
7BEC00DB0000
|
trusted library allocation
|
page read and write
|
||
7BEC00F38000
|
trusted library allocation
|
page read and write
|
||
1844EFB0000
|
heap
|
page read and write
|
||
7BEC00DA0000
|
trusted library allocation
|
page read and write
|
||
18452997000
|
heap
|
page read and write
|
||
7BEC0034C000
|
trusted library allocation
|
page read and write
|
||
7BEC00060000
|
trusted library allocation
|
page read and write
|
||
65057FC000
|
stack
|
page read and write
|
||
734A000
|
heap
|
page read and write
|
||
7BEC00484000
|
trusted library allocation
|
page read and write
|
||
7BEC00228000
|
trusted library allocation
|
page read and write
|
||
1DBC00830000
|
trusted library allocation
|
page read and write
|
||
7BEC00298000
|
trusted library allocation
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
75C8000
|
heap
|
page read and write
|
||
711400230000
|
direct allocation
|
page read and write
|
||
7371000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00F04000
|
trusted library allocation
|
page read and write
|
||
7BEC00F00000
|
trusted library allocation
|
page read and write
|
||
72A8000
|
heap
|
page read and write
|
||
7BEC00CA8000
|
trusted library allocation
|
page read and write
|
||
7BEC00CF8000
|
trusted library allocation
|
page read and write
|
||
7BEC00F10000
|
trusted library allocation
|
page read and write
|
||
7BEC00AB8000
|
trusted library allocation
|
page read and write
|
||
7BEC00E50000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
7BEC00FBC000
|
trusted library allocation
|
page read and write
|
||
7BEC006D0000
|
trusted library allocation
|
page read and write
|
||
18452952000
|
heap
|
page read and write
|
||
7BEC00E01000
|
trusted library allocation
|
page read and write
|
||
7BEC0087C000
|
trusted library allocation
|
page read and write
|
||
6566BFE000
|
unkown
|
page readonly
|
||
65007FC000
|
stack
|
page read and write
|
||
7BEC00A48000
|
trusted library allocation
|
page read and write
|
||
7BEC00E18000
|
trusted library allocation
|
page read and write
|
||
1DBC00964000
|
trusted library allocation
|
page read and write
|
||
18452A05000
|
heap
|
page read and write
|
||
184529D0000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
68F1000
|
heap
|
page read and write
|
||
7BEC00CE8000
|
trusted library allocation
|
page read and write
|
||
18458ADC000
|
trusted library section
|
page read and write
|
||
791000
|
unkown
|
page readonly
|
||
59D000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1DBC006E0000
|
trusted library allocation
|
page read and write
|
||
65613FA000
|
stack
|
page read and write
|
||
7BEC003F0000
|
trusted library allocation
|
page read and write
|
||
184523FF000
|
heap
|
page read and write
|
||
1DBC0027C000
|
trusted library allocation
|
page read and write
|
||
18456B8B000
|
heap
|
page read and write
|
||
7BEC003F0000
|
trusted library allocation
|
page read and write
|
||
1DBC002E4000
|
trusted library allocation
|
page read and write
|
||
1844F065000
|
heap
|
page read and write
|
||
7BEC000D4000
|
trusted library allocation
|
page read and write
|
||
7BEC0034C000
|
trusted library allocation
|
page read and write
|
||
1DBC0079C000
|
trusted library allocation
|
page read and write
|
||
1DBC00248000
|
trusted library allocation
|
page read and write
|
||
7BEC012D0000
|
trusted library allocation
|
page read and write
|
||
7BEC00D58000
|
trusted library allocation
|
page read and write
|
||
7BEC002F8000
|
trusted library allocation
|
page read and write
|
||
1DBC00828000
|
trusted library allocation
|
page read and write
|
||
1DBC00790000
|
trusted library allocation
|
page read and write
|
||
7BEC01040000
|
trusted library allocation
|
page read and write
|
||
657E3FD000
|
stack
|
page read and write
|
||
7BEC006A4000
|
trusted library allocation
|
page read and write
|
||
656BBFE000
|
unkown
|
page readonly
|
||
7BEC0040C000
|
trusted library allocation
|
page read and write
|
||
18458F0E000
|
trusted library section
|
page read and write
|
||
1678002BC000
|
trusted library allocation
|
page read and write
|
||
7BEC0115C000
|
trusted library allocation
|
page read and write
|
||
72A2000
|
heap
|
page read and write
|
||
7BEC00A01000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
7BEC001D0000
|
trusted library allocation
|
page read and write
|
There are 1050 hidden memdumps, click here to show them.