Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB2DF.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Nov 22 04:00:36 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB476.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4E4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2496 --field-trial-handle=2344,i,554225903763573679,10568711165825227446,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6904 -s 1284
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoionNames)
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/82295
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
http://anglebug.com/7761DM
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
http://anglebug.com/6876)
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/250706693allowCompressedFormats
|
unknown
|
||
https://chrome.google.com/webstore?hl=en4
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://anglebug.com/5658pH
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
http://anglebug.com/7036fl
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/35022
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoing
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
ABA27FE000
|
unkown
|
page readonly
|
||
CE00256C000
|
trusted library allocation
|
page read and write
|
||
26104074000
|
heap
|
page read and write
|
||
AB95FFD000
|
stack
|
page read and write
|
||
CE00256C000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
56D000700000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
56D000724000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE0031F0000
|
trusted library allocation
|
page read and write
|
||
56D000694000
|
trusted library allocation
|
page read and write
|
||
2610E263000
|
trusted library section
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
56D00020C000
|
trusted library allocation
|
page read and write
|
||
2610E230000
|
trusted library section
|
page read and write
|
||
8078000
|
heap
|
page read and write
|
||
2610754A000
|
heap
|
page read and write
|
||
CE00268C000
|
trusted library allocation
|
page read and write
|
||
7FD5000
|
heap
|
page read and write
|
||
CE002E70000
|
trusted library allocation
|
page read and write
|
||
AB9AFFE000
|
stack
|
page read and write
|
||
CE0031B4000
|
trusted library allocation
|
page read and write
|
||
56D000620000
|
trusted library allocation
|
page read and write
|
||
CE0026F4000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
5324002C0000
|
trusted library allocation
|
page read and write
|
||
CE0030B8000
|
trusted library allocation
|
page read and write
|
||
CE002E28000
|
trusted library allocation
|
page read and write
|
||
2610756C000
|
heap
|
page read and write
|
||
7FC7000
|
heap
|
page read and write
|
||
26107531000
|
heap
|
page read and write
|
||
AB8BFFA000
|
stack
|
page read and write
|
||
CE00251C000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
56D000668000
|
trusted library allocation
|
page read and write
|
||
26107600000
|
trusted library section
|
page readonly
|
||
26107546000
|
heap
|
page read and write
|
||
ABF99FE000
|
unkown
|
page read and write
|
||
CE002F74000
|
trusted library allocation
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
56D000784000
|
trusted library allocation
|
page read and write
|
||
81DE000
|
heap
|
page read and write
|
||
AB857FE000
|
unkown
|
page readonly
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
CE002394000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE002F84000
|
trusted library allocation
|
page read and write
|
||
26107540000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
6624002DC000
|
direct allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
26107536000
|
heap
|
page read and write
|
||
ABA17FE000
|
unkown
|
page readonly
|
||
CE0024BC000
|
trusted library allocation
|
page read and write
|
||
AB817FE000
|
unkown
|
page readonly
|
||
2610753F000
|
heap
|
page read and write
|
||
56D000230000
|
trusted library allocation
|
page read and write
|
||
AB8DFFE000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE003090000
|
trusted library allocation
|
page read and write
|
||
7EA2000
|
heap
|
page read and write
|
||
2610D720000
|
heap
|
page read and write
|
||
56D0006AC000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
7AD0000
|
direct allocation
|
page execute and read and write
|
||
56D0006B4000
|
trusted library allocation
|
page read and write
|
||
CE002EF8000
|
trusted library allocation
|
page read and write
|
||
662400290000
|
direct allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107543000
|
heap
|
page read and write
|
||
AB94FFC000
|
stack
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
80E8000
|
heap
|
page read and write
|
||
2610D6A7000
|
unclassified section
|
page read and write
|
||
2B3D000
|
stack
|
page read and write
|
||
56D0006C4000
|
trusted library allocation
|
page read and write
|
||
56D000201000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
56D000368000
|
trusted library allocation
|
page read and write
|
||
56D000354000
|
trusted library allocation
|
page read and write
|
||
CE002528000
|
trusted library allocation
|
page read and write
|
||
56D000348000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
unkown
|
page readonly
|
||
56D000744000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
CE0031B4000
|
trusted library allocation
|
page read and write
|
||
7F52000
|
heap
|
page read and write
|
||
26107532000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
CE002801000
|
trusted library allocation
|
page read and write
|
||
CE00247C000
|
trusted library allocation
|
page read and write
|
||
CE002880000
|
trusted library allocation
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
ABF89EF000
|
stack
|
page read and write
|
||
2610753B000
|
heap
|
page read and write
|
||
AB8AFFD000
|
stack
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE0031C0000
|
trusted library allocation
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
26105CD0000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002D30000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
AB957FE000
|
unkown
|
page readonly
|
||
56D0002D4000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE0022F0000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
CE0032AC000
|
trusted library allocation
|
page read and write
|
||
18DB000
|
unkown
|
page execute and write copy
|
||
26107544000
|
heap
|
page read and write
|
||
CE00242C000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE000001000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002D94000
|
trusted library allocation
|
page read and write
|
||
CE002E84000
|
trusted library allocation
|
page read and write
|
||
26107BB2000
|
heap
|
page read and write
|
||
CE002F34000
|
trusted library allocation
|
page read and write
|
||
26107543000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
2610756C000
|
heap
|
page read and write
|
||
2610D950000
|
trusted library section
|
page read and write
|
||
CE003018000
|
trusted library allocation
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
5324002E4000
|
trusted library allocation
|
page read and write
|
||
CE002498000
|
trusted library allocation
|
page read and write
|
||
5324002D8000
|
trusted library allocation
|
page read and write
|
||
CE00298C000
|
trusted library allocation
|
page read and write
|
||
CE0026A0000
|
trusted library allocation
|
page read and write
|
||
CE002B0C000
|
trusted library allocation
|
page read and write
|
||
26107532000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2610BE10000
|
heap
|
page read and write
|
||
CE0024E0000
|
trusted library allocation
|
page read and write
|
||
26103F50000
|
trusted library allocation
|
page read and write
|
||
2610754C000
|
heap
|
page read and write
|
||
AB89FFE000
|
stack
|
page read and write
|
||
CE0024A4000
|
trusted library allocation
|
page read and write
|
||
CE0023E8000
|
trusted library allocation
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
56D0007D0000
|
trusted library allocation
|
page read and write
|
||
CE003020000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
A6C000
|
stack
|
page read and write
|
||
CE002958000
|
trusted library allocation
|
page read and write
|
||
AB937FE000
|
unkown
|
page readonly
|
||
AB997FE000
|
unkown
|
page readonly
|
||
CE002280000
|
trusted library allocation
|
page read and write
|
||
CE002AE8000
|
trusted library allocation
|
page read and write
|
||
CE002ED0000
|
trusted library allocation
|
page read and write
|
||
CE002414000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
56D000310000
|
trusted library allocation
|
page read and write
|
||
56D000330000
|
trusted library allocation
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE002C0C000
|
trusted library allocation
|
page read and write
|
||
CE00256C000
|
trusted library allocation
|
page read and write
|
||
AB86FFE000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
ABA5FFE000
|
stack
|
page read and write
|
||
532400264000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002D10000
|
trusted library allocation
|
page read and write
|
||
CE00240C000
|
trusted library allocation
|
page read and write
|
||
56D0006EC000
|
trusted library allocation
|
page read and write
|
||
ABA37FE000
|
unkown
|
page readonly
|
||
56D000601000
|
trusted library allocation
|
page read and write
|
||
2610E5AE000
|
trusted library section
|
page read and write
|
||
CE0023AC000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE00301C000
|
trusted library allocation
|
page read and write
|
||
26107BAD000
|
heap
|
page read and write
|
||
CE002A48000
|
trusted library allocation
|
page read and write
|
||
CE002430000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002228000
|
trusted library allocation
|
page read and write
|
||
2610B802000
|
trusted library allocation
|
page read and write
|
||
7860000
|
direct allocation
|
page read and write
|
||
AB85FFC000
|
stack
|
page read and write
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
CE003080000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
56D0006FC000
|
trusted library allocation
|
page read and write
|
||
56D00039C000
|
trusted library allocation
|
page read and write
|
||
CE002C44000
|
trusted library allocation
|
page read and write
|
||
CE0023AC000
|
trusted library allocation
|
page read and write
|
||
8084000
|
heap
|
page read and write
|
||
5324002B0000
|
trusted library allocation
|
page read and write
|
||
CE002E01000
|
trusted library allocation
|
page read and write
|
||
26107B61000
|
heap
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
AB81FFE000
|
stack
|
page read and write
|
||
AB877FE000
|
unkown
|
page readonly
|
||
CE002F08000
|
trusted library allocation
|
page read and write
|
||
56D000418000
|
trusted library allocation
|
page read and write
|
||
662400230000
|
direct allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
AB80FFB000
|
stack
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
ABFF9FB000
|
stack
|
page read and write
|
||
56D000754000
|
trusted library allocation
|
page read and write
|
||
CE0028E4000
|
trusted library allocation
|
page read and write
|
||
CE003001000
|
trusted library allocation
|
page read and write
|
||
7F57000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
80CB000
|
heap
|
page read and write
|
||
26107BAA000
|
heap
|
page read and write
|
||
CE0026DC000
|
trusted library allocation
|
page read and write
|
||
7EAB000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
812E000
|
heap
|
page read and write
|
||
CE002E98000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
662400215000
|
direct allocation
|
page read and write
|
||
56D0006B8000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE002418000
|
trusted library allocation
|
page read and write
|
||
CE000601000
|
trusted library allocation
|
page read and write
|
||
CE00296C000
|
trusted library allocation
|
page read and write
|
||
CE00284C000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
7EA8000
|
heap
|
page read and write
|
||
56D000250000
|
trusted library allocation
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
7F69000
|
heap
|
page read and write
|
||
CE00293C000
|
trusted library allocation
|
page read and write
|
||
26107BA0000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
AB927FE000
|
unkown
|
page readonly
|
||
73E1000
|
heap
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002F24000
|
trusted library allocation
|
page read and write
|
||
ABA77FE000
|
unkown
|
page readonly
|
||
CE0023DC000
|
trusted library allocation
|
page read and write
|
||
CE002664000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002F58000
|
trusted library allocation
|
page read and write
|
||
ABA7FFE000
|
stack
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107BDC000
|
heap
|
page read and write
|
||
AB82FFA000
|
stack
|
page read and write
|
||
56D000801000
|
trusted library allocation
|
page read and write
|
||
2610D912000
|
trusted library section
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FC0000
|
heap
|
page read and write
|
||
CE00299C000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
6C0D1000
|
unkown
|
page execute read
|
||
CE0023B4000
|
trusted library allocation
|
page read and write
|
||
56D0006F0000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE0024EB000
|
trusted library allocation
|
page read and write
|
||
CE002D70000
|
trusted library allocation
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
CE002528000
|
trusted library allocation
|
page read and write
|
||
56D0007C8000
|
trusted library allocation
|
page read and write
|
||
56D000630000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002CD8000
|
trusted library allocation
|
page read and write
|
||
CE002293000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
56D00033C000
|
trusted library allocation
|
page read and write
|
||
ABA3FFE000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107524000
|
heap
|
page read and write
|
||
56D00035C000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
56D000320000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE0022E0000
|
trusted library allocation
|
page read and write
|
||
662400280000
|
direct allocation
|
page read and write
|
||
CE002EF0000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002584000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE00309C000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
CE003120000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
26103F00000
|
heap
|
page read and write
|
||
2610B7E4000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
CE003180000
|
trusted library allocation
|
page read and write
|
||
2610E187000
|
unclassified section
|
page read and write
|
||
CE00253C000
|
trusted library allocation
|
page read and write
|
||
56D000788000
|
trusted library allocation
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
532400278000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
ABFA1FE000
|
unkown
|
page readonly
|
||
800F000
|
heap
|
page read and write
|
||
CE0030E8000
|
trusted library allocation
|
page read and write
|
||
CE000801000
|
trusted library allocation
|
page read and write
|
||
CE0023E4000
|
trusted library allocation
|
page read and write
|
||
AB9FFFE000
|
stack
|
page read and write
|
||
81F5000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
2610E360000
|
trusted library section
|
page read and write
|
||
56D0002B0000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE002670000
|
trusted library allocation
|
page read and write
|
||
CE002D2C000
|
trusted library allocation
|
page read and write
|
||
7EA7000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107DC0000
|
trusted library section
|
page read and write
|
||
26107A40000
|
trusted library section
|
page read and write
|
||
662400220000
|
direct allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002298000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
804E000
|
heap
|
page read and write
|
||
7AC0000
|
direct allocation
|
page execute and read and write
|
||
B1E000
|
unkown
|
page read and write
|
||
26107542000
|
heap
|
page read and write
|
||
813E000
|
heap
|
page read and write
|
||
ABFE1FE000
|
unkown
|
page readonly
|
||
FFC000
|
stack
|
page read and write
|
||
7EA9000
|
heap
|
page read and write
|
||
56D000644000
|
trusted library allocation
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE002E50000
|
trusted library allocation
|
page read and write
|
||
2610753D000
|
heap
|
page read and write
|
||
26107BC4000
|
heap
|
page read and write
|
||
AB8D7FE000
|
unkown
|
page readonly
|
||
CE002F94000
|
trusted library allocation
|
page read and write
|
||
AB8E7FE000
|
unkown
|
page readonly
|
||
AB9BFFE000
|
stack
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
ABFB9FE000
|
stack
|
page read and write
|
||
53240020C000
|
trusted library allocation
|
page read and write
|
||
CE002550000
|
trusted library allocation
|
page read and write
|
||
2610756C000
|
heap
|
page read and write
|
||
56D000354000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
662400250000
|
direct allocation
|
page read and write
|
||
7FAE000
|
heap
|
page read and write
|
||
CE00240C000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE002B94000
|
trusted library allocation
|
page read and write
|
||
CE002528000
|
trusted library allocation
|
page read and write
|
||
CE0023C8000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
26107BE9000
|
heap
|
page read and write
|
||
CE0023A0000
|
trusted library allocation
|
page read and write
|
||
CE002601000
|
trusted library allocation
|
page read and write
|
||
26107B9E000
|
heap
|
page read and write
|
||
26107526000
|
heap
|
page read and write
|
||
26107BC4000
|
heap
|
page read and write
|
||
26107BB8000
|
heap
|
page read and write
|
||
26107BB2000
|
heap
|
page read and write
|
||
CE0025A4000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE002664000
|
trusted library allocation
|
page read and write
|
||
56D000704000
|
trusted library allocation
|
page read and write
|
||
CE002548000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2610E097000
|
unclassified section
|
page read and write
|
||
7EA6000
|
heap
|
page read and write
|
||
AB9CFFE000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
AB8A7FE000
|
unkown
|
page readonly
|
||
CE0024C0000
|
trusted library allocation
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
CE002688000
|
trusted library allocation
|
page read and write
|
||
CE002A70000
|
trusted library allocation
|
page read and write
|
||
CE002AD4000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
heap
|
page read and write
|
||
7EA4000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
2610D717000
|
unclassified section
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
56D0003EC000
|
trusted library allocation
|
page read and write
|
||
CE0028E4000
|
trusted library allocation
|
page read and write
|
||
7FBE000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002AFC000
|
trusted library allocation
|
page read and write
|
||
7EA4000
|
heap
|
page read and write
|
||
7FE7000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE003190000
|
trusted library allocation
|
page read and write
|
||
CE003068000
|
trusted library allocation
|
page read and write
|
||
AB907FE000
|
unkown
|
page readonly
|
||
26107B96000
|
heap
|
page read and write
|
||
CE002F38000
|
trusted library allocation
|
page read and write
|
||
26107548000
|
heap
|
page read and write
|
||
B1A000
|
unkown
|
page readonly
|
||
2150000
|
direct allocation
|
page read and write
|
||
AB917FA000
|
stack
|
page read and write
|
||
26107BB8000
|
heap
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
CE00253C000
|
trusted library allocation
|
page read and write
|
||
CE003110000
|
trusted library allocation
|
page read and write
|
||
56D000320000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
56D000654000
|
trusted library allocation
|
page read and write
|
||
CE002E7C000
|
trusted library allocation
|
page read and write
|
||
6624002D0000
|
direct allocation
|
page read and write
|
||
8069000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE00323C000
|
trusted library allocation
|
page read and write
|
||
56D000248000
|
trusted library allocation
|
page read and write
|
||
2610756C000
|
heap
|
page read and write
|
||
CE00241C000
|
trusted library allocation
|
page read and write
|
||
AB987FE000
|
unkown
|
page readonly
|
||
56D00078C000
|
trusted library allocation
|
page read and write
|
||
56D00033C000
|
trusted library allocation
|
page read and write
|
||
26107BA2000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE002530000
|
trusted library allocation
|
page read and write
|
||
26107B9C000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
56D000238000
|
trusted library allocation
|
page read and write
|
||
CE002FA0000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
26107545000
|
heap
|
page read and write
|
||
7F33000
|
heap
|
page read and write
|
||
CE002528000
|
trusted library allocation
|
page read and write
|
||
CE002A80000
|
trusted library allocation
|
page read and write
|
||
26107527000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE002664000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26103FC0000
|
heap
|
page read and write
|
||
26107548000
|
heap
|
page read and write
|
||
56D0002B8000
|
trusted library allocation
|
page read and write
|
||
CE002774000
|
trusted library allocation
|
page read and write
|
||
6624002EC000
|
direct allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002F40000
|
trusted library allocation
|
page read and write
|
||
7EAC000
|
heap
|
page read and write
|
||
ABA57FE000
|
unkown
|
page readonly
|
||
CE0031F0000
|
trusted library allocation
|
page read and write
|
||
56D000658000
|
trusted library allocation
|
page read and write
|
||
56D000288000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
B1E000
|
unkown
|
page write copy
|
||
840000
|
heap
|
page read and write
|
||
CE000A01000
|
trusted library allocation
|
page read and write
|
||
26107565000
|
heap
|
page read and write
|
||
7F34000
|
heap
|
page read and write
|
||
CE002A5C000
|
trusted library allocation
|
page read and write
|
||
56D000624000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
2610D91D000
|
trusted library section
|
page read and write
|
||
7860000
|
direct allocation
|
page read and write
|
||
CE0028E4000
|
trusted library allocation
|
page read and write
|
||
CE0031B4000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
5324002A0000
|
trusted library allocation
|
page read and write
|
||
7F84000
|
heap
|
page read and write
|
||
26103F70000
|
heap
|
page read and write
|
||
26107510000
|
heap
|
page read and write
|
||
AB8EFFE000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
2610753B000
|
heap
|
page read and write
|
||
56D0002CC000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002900000
|
trusted library allocation
|
page read and write
|
||
8118000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
CE002D8C000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE0032B8000
|
trusted library allocation
|
page read and write
|
||
2610754A000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
CE002238000
|
trusted library allocation
|
page read and write
|
||
CE0023AC000
|
trusted library allocation
|
page read and write
|
||
CE00290C000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
7EA3000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
CE002E58000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
AB91FFE000
|
unkown
|
page readonly
|
||
532400235000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
5324002A0000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
CE0029D8000
|
trusted library allocation
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
26103F90000
|
trusted library allocation
|
page read and write
|
||
804B000
|
heap
|
page read and write
|
||
CE00255C000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002A28000
|
trusted library allocation
|
page read and write
|
||
26107BA2000
|
heap
|
page read and write
|
||
CE0031C0000
|
trusted library allocation
|
page read and write
|
||
CE002428000
|
trusted library allocation
|
page read and write
|
||
AB9DFFD000
|
stack
|
page read and write
|
||
ABFC1FE000
|
unkown
|
page readonly
|
||
8028000
|
heap
|
page read and write
|
||
26107554000
|
heap
|
page read and write
|
||
ABA47FE000
|
unkown
|
page readonly
|
||
1B34000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
CE002954000
|
trusted library allocation
|
page read and write
|
||
CE002EF0000
|
trusted library allocation
|
page read and write
|
||
56D000320000
|
trusted library allocation
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
2610E306000
|
trusted library section
|
page read and write
|
||
CE0031B4000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
CE002498000
|
trusted library allocation
|
page read and write
|
||
56D00025C000
|
trusted library allocation
|
page read and write
|
||
CE0031C0000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002490000
|
trusted library allocation
|
page read and write
|
||
CE002338000
|
trusted library allocation
|
page read and write
|
||
CE002410000
|
trusted library allocation
|
page read and write
|
||
CE0024E0000
|
trusted library allocation
|
page read and write
|
||
CE0024E3000
|
trusted library allocation
|
page read and write
|
||
CE002420000
|
trusted library allocation
|
page read and write
|
||
AB84FFB000
|
stack
|
page read and write
|
||
7EA1000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002508000
|
trusted library allocation
|
page read and write
|
||
CE0028B0000
|
trusted library allocation
|
page read and write
|
||
CE00256C000
|
trusted library allocation
|
page read and write
|
||
CE00305C000
|
trusted library allocation
|
page read and write
|
||
818B000
|
heap
|
page read and write
|
||
CE002FB5000
|
trusted library allocation
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
CE003294000
|
trusted library allocation
|
page read and write
|
||
CE002664000
|
trusted library allocation
|
page read and write
|
||
7F6B000
|
direct allocation
|
page read and write
|
||
2610D8F6000
|
trusted library section
|
page read and write
|
||
CE002CBC000
|
trusted library allocation
|
page read and write
|
||
CE002FC4000
|
trusted library allocation
|
page read and write
|
||
ABA67FE000
|
unkown
|
page readonly
|
||
56D000714000
|
trusted library allocation
|
page read and write
|
||
2610754C000
|
heap
|
page read and write
|
||
CE002EF3000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
AB887FE000
|
unkown
|
page readonly
|
||
CE002E60000
|
trusted library allocation
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
CE0023C4000
|
trusted library allocation
|
page read and write
|
||
CE002664000
|
trusted library allocation
|
page read and write
|
||
26107538000
|
heap
|
page read and write
|
||
CE002C54000
|
trusted library allocation
|
page read and write
|
||
26107B6D000
|
heap
|
page read and write
|
||
CE00253C000
|
trusted library allocation
|
page read and write
|
||
ABA6FFE000
|
stack
|
page read and write
|
||
26107545000
|
heap
|
page read and write
|
||
AB99FFC000
|
stack
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
6C0D0000
|
unkown
|
page readonly
|
||
26107541000
|
heap
|
page read and write
|
||
56D000330000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
ABFE9FD000
|
stack
|
page read and write
|
||
CE002698000
|
trusted library allocation
|
page read and write
|
||
80FF000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
6C1F8000
|
unkown
|
page readonly
|
||
83C000
|
stack
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
CE002870000
|
trusted library allocation
|
page read and write
|
||
CE0023B4000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
26107541000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107536000
|
heap
|
page read and write
|
||
2610DDA0000
|
trusted library section
|
page read and write
|
||
2610E1D1000
|
trusted library section
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
CE002C78000
|
trusted library allocation
|
page read and write
|
||
CE00237C000
|
trusted library allocation
|
page read and write
|
||
2610BE18000
|
heap
|
page read and write
|
||
2610D6E0000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7F81000
|
heap
|
page read and write
|
||
CE002201000
|
trusted library allocation
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
7EA3000
|
heap
|
page read and write
|
||
ABFD9FE000
|
stack
|
page read and write
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
2610E1C0000
|
trusted library section
|
page read and write
|
||
56D000408000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
26107530000
|
heap
|
page read and write
|
||
ABA2FFA000
|
stack
|
page read and write
|
||
56D00060C000
|
trusted library allocation
|
page read and write
|
||
CE003038000
|
trusted library allocation
|
page read and write
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
CE0026B4000
|
trusted library allocation
|
page read and write
|
||
532400288000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
662400210000
|
direct allocation
|
page read and write
|
||
CE002300000
|
trusted library allocation
|
page read and write
|
||
7EAE000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2610E3AE000
|
trusted library section
|
page read and write
|
||
AB8F7FE000
|
unkown
|
page readonly
|
||
56D000424000
|
trusted library allocation
|
page read and write
|
||
26107543000
|
heap
|
page read and write
|
||
CE0026EA000
|
trusted library allocation
|
page read and write
|
||
CE00322C000
|
trusted library allocation
|
page read and write
|
||
56D000678000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
807C000
|
heap
|
page read and write
|
||
26107BAD000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107542000
|
heap
|
page read and write
|
||
7EA4000
|
heap
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
56D000688000
|
trusted library allocation
|
page read and write
|
||
ABFA9FE000
|
stack
|
page read and write
|
||
CE0023F0000
|
trusted library allocation
|
page read and write
|
||
56D0007B4000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
CE002D20000
|
trusted library allocation
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
800E000
|
heap
|
page read and write
|
||
56D000760000
|
trusted library allocation
|
page read and write
|
||
56D0006E8000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
26104063000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
7F63000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
80AC000
|
heap
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
AB9A7FE000
|
unkown
|
page readonly
|
||
CE003158000
|
trusted library allocation
|
page read and write
|
||
662400303000
|
direct allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
8036000
|
heap
|
page read and write
|
||
CE002EB8000
|
trusted library allocation
|
page read and write
|
||
AB83FFB000
|
stack
|
page read and write
|
||
26107538000
|
heap
|
page read and write
|
||
CE0023E0000
|
trusted library allocation
|
page read and write
|
||
26107565000
|
heap
|
page read and write
|
||
CE0028F0000
|
trusted library allocation
|
page read and write
|
||
CE00274C000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
80AA000
|
heap
|
page read and write
|
||
820F000
|
heap
|
page read and write
|
||
CE002845000
|
trusted library allocation
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE002530000
|
trusted library allocation
|
page read and write
|
||
7FA6000
|
heap
|
page read and write
|
||
6624002A8000
|
direct allocation
|
page read and write
|
||
CE0029B8000
|
trusted library allocation
|
page read and write
|
||
7EA7000
|
heap
|
page read and write
|
||
26103F20000
|
heap
|
page read and write
|
||
CE002E0C000
|
trusted library allocation
|
page read and write
|
||
CE002EE0000
|
trusted library allocation
|
page read and write
|
||
532400270000
|
trusted library allocation
|
page read and write
|
||
26104055000
|
heap
|
page read and write
|
||
CE0031D0000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
56D000320000
|
trusted library allocation
|
page read and write
|
||
8075000
|
heap
|
page read and write
|
||
80A4000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE002E24000
|
trusted library allocation
|
page read and write
|
||
AB97FFB000
|
stack
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
AB9C7FE000
|
unkown
|
page readonly
|
||
B1E000
|
unkown
|
page write copy
|
||
56D000330000
|
trusted library allocation
|
page read and write
|
||
662400260000
|
direct allocation
|
page read and write
|
||
CE00249A000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
B1E000
|
unkown
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE0032B4000
|
trusted library allocation
|
page read and write
|
||
2610E32D000
|
trusted library section
|
page read and write
|
||
CE00297C000
|
trusted library allocation
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
CE002FDC000
|
trusted library allocation
|
page read and write
|
||
CE002EF0000
|
trusted library allocation
|
page read and write
|
||
26107B5D000
|
heap
|
page read and write
|
||
AB9EFFD000
|
stack
|
page read and write
|
||
2610E1FE000
|
trusted library section
|
page read and write
|
||
532400250000
|
trusted library allocation
|
page read and write
|
||
56D000401000
|
trusted library allocation
|
page read and write
|
||
CE00235C000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002860000
|
trusted library allocation
|
page read and write
|
||
CE003030000
|
trusted library allocation
|
page read and write
|
||
56D000758000
|
trusted library allocation
|
page read and write
|
||
AB897FE000
|
unkown
|
page readonly
|
||
26107552000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE0030C4000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE0030E0000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
AB837FE000
|
unkown
|
page readonly
|
||
AB977FE000
|
unkown
|
page readonly
|
||
26107552000
|
heap
|
page read and write
|
||
2610754D000
|
heap
|
page read and write
|
||
2610E322000
|
trusted library section
|
page read and write
|
||
26107540000
|
heap
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
CE002C34000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
7F69000
|
direct allocation
|
page read and write
|
||
CE002BCC000
|
trusted library allocation
|
page read and write
|
||
26107BAA000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107542000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2B7A000
|
stack
|
page read and write
|
||
AB9D7FE000
|
unkown
|
page readonly
|
||
7EA2000
|
heap
|
page read and write
|
||
2610D85E000
|
trusted library section
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002DB8000
|
trusted library allocation
|
page read and write
|
||
CE002FF0000
|
trusted library allocation
|
page read and write
|
||
817E000
|
heap
|
page read and write
|
||
AB827FE000
|
unkown
|
page readonly
|
||
CE00220C000
|
trusted library allocation
|
page read and write
|
||
532400201000
|
trusted library allocation
|
page read and write
|
||
7FD9000
|
heap
|
page read and write
|
||
26107548000
|
heap
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
56D000390000
|
trusted library allocation
|
page read and write
|
||
56D0006D4000
|
trusted library allocation
|
page read and write
|
||
AB98FFB000
|
stack
|
page read and write
|
||
2610756C000
|
heap
|
page read and write
|
||
CE0022B8000
|
trusted library allocation
|
page read and write
|
||
CE003050000
|
trusted library allocation
|
page read and write
|
||
26107561000
|
heap
|
page read and write
|
||
CE0030A8000
|
trusted library allocation
|
page read and write
|
||
662400234000
|
direct allocation
|
page read and write
|
||
CE000E01000
|
trusted library allocation
|
page read and write
|
||
26107B92000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002A01000
|
trusted library allocation
|
page read and write
|
||
CE0022A0000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
56D000248000
|
trusted library allocation
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
2610754A000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
532400230000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
CE002EE0000
|
trusted library allocation
|
page read and write
|
||
CE0028D4000
|
trusted library allocation
|
page read and write
|
||
56D00080C000
|
trusted library allocation
|
page read and write
|
||
26103F60000
|
heap
|
page read and write
|
||
26106720000
|
unkown
|
page read and write
|
||
CE00308E000
|
trusted library allocation
|
page read and write
|
||
CE0024F0000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
8255000
|
heap
|
page read and write
|
||
56D000730000
|
trusted library allocation
|
page read and write
|
||
26107D20000
|
trusted library section
|
page read and write
|
||
532400260000
|
trusted library allocation
|
page read and write
|
||
2610E240000
|
trusted library section
|
page read and write
|
||
AB8B7FE000
|
unkown
|
page readonly
|
||
56D000310000
|
trusted library allocation
|
page read and write
|
||
CE002EA4000
|
trusted library allocation
|
page read and write
|
||
CE00280C000
|
trusted library allocation
|
page read and write
|
||
56D000718000
|
trusted library allocation
|
page read and write
|
||
56D000380000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
AB92FFC000
|
stack
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002906000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE002CEC000
|
trusted library allocation
|
page read and write
|
||
261077B0000
|
heap
|
page read and write
|
||
26105CD3000
|
heap
|
page read and write
|
||
B1A000
|
unkown
|
page readonly
|
||
26107541000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7EA9000
|
heap
|
page read and write
|
||
CE002401000
|
trusted library allocation
|
page read and write
|
||
56D0002FC000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
5324002A0000
|
trusted library allocation
|
page read and write
|
||
26107BAD000
|
heap
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
56D000430000
|
trusted library allocation
|
page read and write
|
||
801E000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
CE003201000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
CE002580000
|
trusted library allocation
|
page read and write
|
||
532400294000
|
trusted library allocation
|
page read and write
|
||
CE00260C000
|
trusted library allocation
|
page read and write
|
||
5324002B0000
|
trusted library allocation
|
page read and write
|
||
CE002A0C000
|
trusted library allocation
|
page read and write
|
||
CE002EF0000
|
trusted library allocation
|
page read and write
|
||
CE002890000
|
trusted library allocation
|
page read and write
|
||
CE002784000
|
trusted library allocation
|
page read and write
|
||
CE000201000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE0028CD000
|
trusted library allocation
|
page read and write
|
||
AB96FFB000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
AB967FE000
|
unkown
|
page readonly
|
||
CE003148000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
7EA9000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
85C000
|
stack
|
page read and write
|
||
AB9B7FE000
|
unkown
|
page readonly
|
||
73E1000
|
heap
|
page read and write
|
||
CE0030F8000
|
trusted library allocation
|
page read and write
|
||
26107BA5000
|
heap
|
page read and write
|
||
AB847FE000
|
unkown
|
page readonly
|
||
73E1000
|
heap
|
page read and write
|
||
CE00238C000
|
trusted library allocation
|
page read and write
|
||
56D000734000
|
trusted library allocation
|
page read and write
|
||
CE002434000
|
trusted library allocation
|
page read and write
|
||
CE002694000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
2610752C000
|
heap
|
page read and write
|
||
26107538000
|
heap
|
page read and write
|
||
56D00035C000
|
trusted library allocation
|
page read and write
|
||
5324002C0000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE00229E000
|
trusted library allocation
|
page read and write
|
||
8183000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE003020000
|
trusted library allocation
|
page read and write
|
||
56D00027C000
|
trusted library allocation
|
page read and write
|
||
CE00253C000
|
trusted library allocation
|
page read and write
|
||
2610753B000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE0024FC000
|
trusted library allocation
|
page read and write
|
||
CE002F7C000
|
trusted library allocation
|
page read and write
|
||
2610D852000
|
trusted library section
|
page read and write
|
||
CE003110000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
ABA4FFC000
|
stack
|
page read and write
|
||
CE00249A000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107565000
|
heap
|
page read and write
|
||
2610756C000
|
heap
|
page read and write
|
||
CE0024B0000
|
trusted library allocation
|
page read and write
|
||
CE0032BC000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
CE00312C000
|
trusted library allocation
|
page read and write
|
||
8082000
|
heap
|
page read and write
|
||
56D000404000
|
trusted library allocation
|
page read and write
|
||
AB947FE000
|
unkown
|
page readonly
|
||
56D0006B0000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
unkown
|
page readonly
|
||
73E1000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7EAD000
|
heap
|
page read and write
|
||
6C1F9000
|
unkown
|
page read and write
|
||
56D00075C000
|
trusted library allocation
|
page read and write
|
||
AB8FFFB000
|
stack
|
page read and write
|
||
CE002508000
|
trusted library allocation
|
page read and write
|
||
26107BB2000
|
heap
|
page read and write
|
||
56D00040C000
|
trusted library allocation
|
page read and write
|
||
ABFD1FE000
|
unkown
|
page readonly
|
||
26107552000
|
heap
|
page read and write
|
||
CE002424000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
7EA7000
|
heap
|
page read and write
|
||
26107B98000
|
heap
|
page read and write
|
||
26107551000
|
heap
|
page read and write
|
||
662400274000
|
direct allocation
|
page read and write
|
||
662400217000
|
direct allocation
|
page read and write
|
||
CE002EF8000
|
trusted library allocation
|
page read and write
|
||
2610754C000
|
heap
|
page read and write
|
||
CE002A5C000
|
trusted library allocation
|
page read and write
|
||
CE002E48000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
5324002F8000
|
trusted library allocation
|
page read and write
|
||
8032000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE003054000
|
trusted library allocation
|
page read and write
|
||
CE002594000
|
trusted library allocation
|
page read and write
|
||
66240024C000
|
direct allocation
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
26107547000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
56D000640000
|
trusted library allocation
|
page read and write
|
||
5324002C0000
|
trusted library allocation
|
page read and write
|
||
AB8CFFE000
|
stack
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
26107500000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
CE0024B9000
|
trusted library allocation
|
page read and write
|
||
532400248000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26107532000
|
heap
|
page read and write
|
||
2610E251000
|
trusted library section
|
page read and write
|
||
26103F10000
|
heap
|
page readonly
|
||
CE002B88000
|
trusted library allocation
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
5324002C0000
|
trusted library allocation
|
page read and write
|
||
56D000664000
|
trusted library allocation
|
page read and write
|
||
7DA1000
|
heap
|
page read and write
|
||
8010000
|
heap
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
7AB0000
|
direct allocation
|
page execute and read and write
|
||
56D000614000
|
trusted library allocation
|
page read and write
|
||
CE003074000
|
trusted library allocation
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
CE0026D8000
|
trusted library allocation
|
page read and write
|
||
2610405A000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE002AA0000
|
trusted library allocation
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
56D000750000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
5324002F4000
|
trusted library allocation
|
page read and write
|
||
CE002EE0000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
AB93FFD000
|
stack
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002A34000
|
trusted library allocation
|
page read and write
|
||
CE002248000
|
trusted library allocation
|
page read and write
|
||
26107BA0000
|
heap
|
page read and write
|
||
56D000698000
|
trusted library allocation
|
page read and write
|
||
CE003158000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
56D0002ED000
|
trusted library allocation
|
page read and write
|
||
56D000610000
|
trusted library allocation
|
page read and write
|
||
7FA6000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
CE00261C000
|
trusted library allocation
|
page read and write
|
||
CE002344000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107BC4000
|
heap
|
page read and write
|
||
2610754C000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
5324002C0000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
662400284000
|
direct allocation
|
page read and write
|
||
CE00251C000
|
trusted library allocation
|
page read and write
|
||
CE0027A8000
|
trusted library allocation
|
page read and write
|
||
56D000770000
|
trusted library allocation
|
page read and write
|
||
ABA87FE000
|
unkown
|
page readonly
|
||
26107BAA000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
CE002D08000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
AB90FFC000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002CFC000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
662400270000
|
direct allocation
|
page read and write
|
||
CE00320C000
|
trusted library allocation
|
page read and write
|
||
26107543000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
CE003258000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
ABFC9FE000
|
stack
|
page read and write
|
||
CE002F60000
|
trusted library allocation
|
page read and write
|
||
2610754B000
|
heap
|
page read and write
|
||
2610753A000
|
heap
|
page read and write
|
||
26107565000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2610754A000
|
heap
|
page read and write
|
||
2610DB50000
|
trusted library section
|
page read and write
|
||
662400201000
|
direct allocation
|
page read and write
|
||
CE0023EC000
|
trusted library allocation
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
56D00069C000
|
trusted library allocation
|
page read and write
|
||
CE003180000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
66240023C000
|
direct allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
56D0006E4000
|
trusted library allocation
|
page read and write
|
||
CE002F50000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
56D0002F4000
|
trusted library allocation
|
page read and write
|
||
26107550000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
822F000
|
heap
|
page read and write
|
||
CE002BC3000
|
trusted library allocation
|
page read and write
|
||
CE0028E4000
|
trusted library allocation
|
page read and write
|
||
26107B00000
|
heap
|
page read and write
|
||
5324002F0000
|
trusted library allocation
|
page read and write
|
||
7860000
|
direct allocation
|
page read and write
|
||
826E000
|
heap
|
page read and write
|
||
CE0024A4000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE002274000
|
trusted library allocation
|
page read and write
|
||
532400220000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002D80000
|
trusted library allocation
|
page read and write
|
||
800A000
|
heap
|
page read and write
|
||
56D000364000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002328000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
6624002AC000
|
direct allocation
|
page read and write
|
||
26107BB8000
|
heap
|
page read and write
|
||
7EA9000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
CE002514000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
56D000684000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7E12000
|
direct allocation
|
page read and write
|
||
7EA2000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
ABA07FE000
|
unkown
|
page readonly
|
||
26107B9A000
|
heap
|
page read and write
|
||
7EAC000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
CE002694000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
56D0007CC000
|
trusted library allocation
|
page read and write
|
||
7FE1000
|
heap
|
page read and write
|
||
2610E3A0000
|
trusted library section
|
page read and write
|
||
6C1AD000
|
unkown
|
page read and write
|
||
CE001001000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
unkown
|
page read and write
|
||
7EA3000
|
heap
|
page read and write
|
||
2610753E000
|
heap
|
page read and write
|
||
7EA5000
|
heap
|
page read and write
|
||
CE002710000
|
trusted library allocation
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
AB9E7FE000
|
unkown
|
page readonly
|
||
B1A000
|
unkown
|
page readonly
|
||
2E60000
|
heap
|
page read and write
|
||
7EAF000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE0024B4000
|
trusted library allocation
|
page read and write
|
||
5324002A0000
|
trusted library allocation
|
page read and write
|
||
532400274000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107B9E000
|
heap
|
page read and write
|
||
7EA1000
|
heap
|
page read and write
|
||
CE002820000
|
trusted library allocation
|
page read and write
|
||
CE002934000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
2610E1F2000
|
trusted library section
|
page read and write
|
||
CE002E1C000
|
trusted library allocation
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
CE0027EC000
|
trusted library allocation
|
page read and write
|
||
2610D8B3000
|
trusted library section
|
page read and write
|
||
CE000401000
|
trusted library allocation
|
page read and write
|
||
801A000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE0024D0000
|
trusted library allocation
|
page read and write
|
||
CE002B2C000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE002CAC000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
CE002E88000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE003220000
|
trusted library allocation
|
page read and write
|
||
CE0023F4000
|
trusted library allocation
|
page read and write
|
||
26107538000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
56D000220000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
6C1AF000
|
unkown
|
page readonly
|
||
B1E000
|
unkown
|
page read and write
|
||
56D0006C8000
|
trusted library allocation
|
page read and write
|
||
CE0023D8000
|
trusted library allocation
|
page read and write
|
||
CE002841000
|
trusted library allocation
|
page read and write
|
||
CE002CB0000
|
trusted library allocation
|
page read and write
|
||
7F8E000
|
heap
|
page read and write
|
||
CE002DA8000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE002B68000
|
trusted library allocation
|
page read and write
|
||
CE003044000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
AB9F7FE000
|
unkown
|
page readonly
|
||
CE0023F8000
|
trusted library allocation
|
page read and write
|
||
2610407B000
|
heap
|
page read and write
|
||
2610D723000
|
heap
|
page read and write
|
||
7EA4000
|
heap
|
page read and write
|
||
5324002C8000
|
trusted library allocation
|
page read and write
|
||
66240020C000
|
direct allocation
|
page read and write
|
||
8049000
|
heap
|
page read and write
|
||
56D00088C000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
306F000
|
unkown
|
page read and write
|
||
CE0030DC000
|
trusted library allocation
|
page read and write
|
||
CE002C01000
|
trusted library allocation
|
page read and write
|
||
CE0032CC000
|
trusted library allocation
|
page read and write
|
||
CE002BE8000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26103F65000
|
heap
|
page read and write
|
||
CE002EFE000
|
trusted library allocation
|
page read and write
|
||
56D000374000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107561000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
26107B9C000
|
heap
|
page read and write
|
||
CE00310C000
|
trusted library allocation
|
page read and write
|
||
CE002C1C000
|
trusted library allocation
|
page read and write
|
||
26107548000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE00313C000
|
trusted library allocation
|
page read and write
|
||
56D0006CC000
|
trusted library allocation
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
2610E1E0000
|
trusted library section
|
page read and write
|
||
AB88FFE000
|
stack
|
page read and write
|
||
CE002E28000
|
trusted library allocation
|
page read and write
|
||
803E000
|
heap
|
page read and write
|
||
CE000C01000
|
trusted library allocation
|
page read and write
|
||
CE0031D8000
|
trusted library allocation
|
page read and write
|
||
532400238000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE00305C000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107541000
|
heap
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
7EA5000
|
heap
|
page read and write
|
||
26107B9A000
|
heap
|
page read and write
|
||
CE00329C000
|
trusted library allocation
|
page read and write
|
||
ABA0FFE000
|
stack
|
page read and write
|
||
7F59000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7F32000
|
heap
|
page read and write
|
||
6624002E4000
|
direct allocation
|
page read and write
|
||
CE002494000
|
trusted library allocation
|
page read and write
|
||
26107543000
|
heap
|
page read and write
|
||
2610AF80000
|
trusted library allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
6C1FC000
|
unkown
|
page readonly
|
||
CE00328C000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE0027BC000
|
trusted library allocation
|
page read and write
|
||
26107B98000
|
heap
|
page read and write
|
||
CE0023B4000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
CE002FBC000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107549000
|
heap
|
page read and write
|
||
26107561000
|
heap
|
page read and write
|
||
56D0006E0000
|
trusted library allocation
|
page read and write
|
||
CE002498000
|
trusted library allocation
|
page read and write
|
||
CE002528000
|
trusted library allocation
|
page read and write
|
||
CE0023D4000
|
trusted library allocation
|
page read and write
|
||
2610753F000
|
heap
|
page read and write
|
||
CE002D70000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26103FC8000
|
heap
|
page read and write
|
||
CE002F18000
|
trusted library allocation
|
page read and write
|
||
CE002BAC000
|
trusted library allocation
|
page read and write
|
||
7EA4000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
CE00228E000
|
trusted library allocation
|
page read and write
|
||
CE00300C000
|
trusted library allocation
|
page read and write
|
||
26107561000
|
heap
|
page read and write
|
||
56D0002E4000
|
trusted library allocation
|
page read and write
|
||
1B34000
|
heap
|
page read and write
|
||
5324002B0000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
B1A000
|
unkown
|
page readonly
|
||
26107552000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
7FC8000
|
heap
|
page read and write
|
||
8055000
|
heap
|
page read and write
|
||
CE002A24000
|
trusted library allocation
|
page read and write
|
||
CE002794000
|
trusted library allocation
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
56D000210000
|
trusted library allocation
|
page read and write
|
||
AB807FE000
|
unkown
|
page readonly
|
||
CE00236C000
|
trusted library allocation
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002AC0000
|
trusted library allocation
|
page read and write
|
||
7EA8000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE0028C0000
|
trusted library allocation
|
page read and write
|
||
AB867FE000
|
unkown
|
page readonly
|
||
73E1000
|
heap
|
page read and write
|
||
2610E5A0000
|
trusted library section
|
page read and write
|
||
5324002BC000
|
trusted library allocation
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
7EA8000
|
heap
|
page read and write
|
||
CE002A94000
|
trusted library allocation
|
page read and write
|
||
56D0006D0000
|
trusted library allocation
|
page read and write
|
||
CE002DB0000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page readonly
|
||
AB8C7FE000
|
unkown
|
page readonly
|
||
26107B8B000
|
heap
|
page read and write
|
||
662400294000
|
direct allocation
|
page read and write
|
||
26107546000
|
heap
|
page read and write
|
||
CE0030C0000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
ABA1FFE000
|
stack
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
26107C00000
|
trusted library section
|
page read and write
|
||
7EAF000
|
heap
|
page read and write
|
||
ABFF1FE000
|
unkown
|
page readonly
|
||
B1E000
|
unkown
|
page write copy
|
||
CE002B48000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
direct allocation
|
page execute and read and write
|
||
B10000
|
unkown
|
page readonly
|
||
CE003180000
|
trusted library allocation
|
page read and write
|
||
AB87FFE000
|
stack
|
page read and write
|
||
26107552000
|
heap
|
page read and write
|
||
CE002EE0000
|
trusted library allocation
|
page read and write
|
||
CE0024FC000
|
trusted library allocation
|
page read and write
|
There are 1274 hidden memdumps, click here to show them.