Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_8b6bc30ae81dc2afea68c3eabac594fb8e9329_ac3115bf_e35ef701-adbc-4911-8025-93c23815d03e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D5.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Nov 29 18:18:50 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4BB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC519.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HFInUAYNqgsnDSwNdDpz.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2264,i,13592779823444466378,7570623517769425458,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 1204
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://home.twentykx20pt.top/bugEWhhZIPIipxajeFfO1732855736?argument=V3pE2pk3ErlV9NFr1732904223
|
34.118.84.150
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://www.youtube.coP
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/5750-
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
http://anglebug.com/1423136$k
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://chrome.google.com/webstore$k
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp$k
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
https://www.google.com/Chark$
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://anglebug.com/3586il
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://drive-daily-5.corp.go
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
twentykx20pt.top
|
34.118.84.150
|
||
home.twentykx20pt.top
|
34.118.84.150
|
||
www.google.com
|
172.217.21.36
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
217.20.56.102
|
||
httpbin.org
|
18.213.123.165
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
18.213.123.165
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.118.84.150
|
twentykx20pt.top
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1CB4000
|
heap
|
page read and write
|
||
43A800220000
|
trusted library allocation
|
page read and write
|
||
64F400264000
|
trusted library allocation
|
page read and write
|
||
7E62000
|
heap
|
page read and write
|
||
2F4EB95F000
|
heap
|
page read and write
|
||
5848002DC000
|
direct allocation
|
page read and write
|
||
6B24009EC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
B81000
|
unkown
|
page execute and write copy
|
||
6B24001DC000
|
trusted library allocation
|
page read and write
|
||
6B2400E30000
|
trusted library allocation
|
page read and write
|
||
43A800248000
|
trusted library allocation
|
page read and write
|
||
6B2400E78000
|
trusted library allocation
|
page read and write
|
||
1CC7000
|
heap
|
page read and write
|
||
6B2400F30000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
F5CD9FE000
|
unkown
|
page readonly
|
||
6B24001B4000
|
trusted library allocation
|
page read and write
|
||
5848002EC000
|
direct allocation
|
page read and write
|
||
2F4E7FFA000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
43A8007C0000
|
trusted library allocation
|
page read and write
|
||
2F4EBAA0000
|
trusted library section
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
6B2400A48000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6B2400FE0000
|
trusted library allocation
|
page read and write
|
||
5848002A8000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB9F1000
|
heap
|
page read and write
|
||
6B2400340000
|
trusted library allocation
|
page read and write
|
||
43A8008F4000
|
trusted library allocation
|
page read and write
|
||
43A80084C000
|
trusted library allocation
|
page read and write
|
||
6B2400E68000
|
trusted library allocation
|
page read and write
|
||
6B24004C8000
|
trusted library allocation
|
page read and write
|
||
F5D01FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400D94000
|
trusted library allocation
|
page read and write
|
||
2F4F1A60000
|
trusted library section
|
page read and write
|
||
2F4E7FF0000
|
heap
|
page read and write
|
||
F5F11FE000
|
stack
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
6D61000
|
heap
|
page read and write
|
||
7460000
|
direct allocation
|
page execute and read and write
|
||
6B24002F7000
|
trusted library allocation
|
page read and write
|
||
2F4E7F20000
|
heap
|
page read and write
|
||
2F4F05C3000
|
trusted library section
|
page read and write
|
||
6B2400E84000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B24010F8000
|
trusted library allocation
|
page read and write
|
||
7E89000
|
heap
|
page read and write
|
||
6B2400D07000
|
trusted library allocation
|
page read and write
|
||
6B2400F88000
|
trusted library allocation
|
page read and write
|
||
6B2401144000
|
trusted library allocation
|
page read and write
|
||
F5F09FE000
|
unkown
|
page readonly
|
||
43A800828000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
2F4EA8B0000
|
unkown
|
page read and write
|
||
F5E41FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB900000
|
trusted library section
|
page read and write
|
||
2F4EB984000
|
heap
|
page read and write
|
||
43A8008C4000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
43A8006BC000
|
trusted library allocation
|
page read and write
|
||
F5D99FE000
|
unkown
|
page readonly
|
||
6B240046D000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F400294000
|
trusted library allocation
|
page read and write
|
||
584800294000
|
direct allocation
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
F5EB9FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
584800260000
|
direct allocation
|
page read and write
|
||
2F4E8060000
|
trusted library allocation
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
7F64000
|
heap
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B2400E6C000
|
trusted library allocation
|
page read and write
|
||
7CD1000
|
heap
|
page read and write
|
||
6B24008E0000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7D85000
|
heap
|
page read and write
|
||
6B24009F8000
|
trusted library allocation
|
page read and write
|
||
43A8006E8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400D7C000
|
trusted library allocation
|
page read and write
|
||
6B240100C000
|
trusted library allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
F5ED1FA000
|
stack
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
64F4002C0000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
heap
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240120C000
|
trusted library allocation
|
page read and write
|
||
F5D11FE000
|
stack
|
page read and write
|
||
6B2400F38000
|
trusted library allocation
|
page read and write
|
||
12AF000
|
stack
|
page read and write
|
||
64F400278000
|
trusted library allocation
|
page read and write
|
||
6B2400B6C000
|
trusted library allocation
|
page read and write
|
||
2F4EB95A000
|
heap
|
page read and write
|
||
43A800868000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
F5E71FD000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24001A8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A80081C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2401150000
|
trusted library allocation
|
page read and write
|
||
6B2400454000
|
trusted library allocation
|
page read and write
|
||
1CB4000
|
heap
|
page read and write
|
||
5848002D0000
|
direct allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F0520000
|
trusted library section
|
page read and write
|
||
F5ED9FE000
|
unkown
|
page readonly
|
||
6B24005C8000
|
trusted library allocation
|
page read and write
|
||
F5D09FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E8190000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8006D4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7EDB000
|
heap
|
page read and write
|
||
6B2400EC4000
|
trusted library allocation
|
page read and write
|
||
6B240097C000
|
trusted library allocation
|
page read and write
|
||
43A800230000
|
trusted library allocation
|
page read and write
|
||
6B2400E60000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
2F4F22F1000
|
trusted library section
|
page read and write
|
||
6B2400DB8000
|
trusted library allocation
|
page read and write
|
||
64F400235000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400EA0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
6D61000
|
heap
|
page read and write
|
||
584800303000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F0797000
|
unclassified section
|
page read and write
|
||
6B24001D4000
|
trusted library allocation
|
page read and write
|
||
43A800401000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240050C000
|
trusted library allocation
|
page read and write
|
||
7E7A000
|
heap
|
page read and write
|
||
F5D19FE000
|
unkown
|
page readonly
|
||
F5E99FE000
|
unkown
|
page readonly
|
||
6B2400E0C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B24007BC000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
F5C81FE000
|
stack
|
page read and write
|
||
7D94000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
2F4F04E2000
|
trusted library section
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
F5D51FA000
|
stack
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
2F4EBC40000
|
trusted library section
|
page read and write
|
||
1CAB000
|
heap
|
page read and write
|
||
6B240041C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800818000
|
trusted library allocation
|
page read and write
|
||
6B24009C0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E8018000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
1CC7000
|
heap
|
page read and write
|
||
6B24004C8000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8006F0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400060000
|
trusted library allocation
|
page read and write
|
||
6B2400ACC000
|
trusted library allocation
|
page read and write
|
||
6B24011C0000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F400201000
|
trusted library allocation
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
2F4E7FBA000
|
heap
|
page read and write
|
||
43A800801000
|
trusted library allocation
|
page read and write
|
||
2F4F22E0000
|
trusted library section
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800974000
|
trusted library allocation
|
page read and write
|
||
64F40020C000
|
trusted library allocation
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
7CD1000
|
heap
|
page read and write
|
||
6B24008B4000
|
trusted library allocation
|
page read and write
|
||
43A800880000
|
trusted library allocation
|
page read and write
|
||
7F17000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
43A80020C000
|
trusted library allocation
|
page read and write
|
||
F5CA1FA000
|
stack
|
page read and write
|
||
6B2400590000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
6B240006C000
|
trusted library allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
6B240060C000
|
trusted library allocation
|
page read and write
|
||
1CC1000
|
heap
|
page read and write
|
||
6B2400FD4000
|
trusted library allocation
|
page read and write
|
||
6B2400CE0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7E34000
|
heap
|
page read and write
|
||
2F4F2480000
|
trusted library section
|
page read and write
|
||
6B2400601000
|
trusted library allocation
|
page read and write
|
||
6B2400718000
|
trusted library allocation
|
page read and write
|
||
43A8008C8000
|
trusted library allocation
|
page read and write
|
||
6B240039C000
|
trusted library allocation
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2F4E7E20000
|
heap
|
page read and write
|
||
1CA000
|
stack
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6C141000
|
unkown
|
page execute read
|
||
584800274000
|
direct allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
43A8007A0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5CF1FC000
|
stack
|
page read and write
|
||
6B2400480000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5C71FE000
|
stack
|
page read and write
|
||
6B2400C94000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240042C000
|
trusted library allocation
|
page read and write
|
||
6B2400FB0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400124000
|
trusted library allocation
|
page read and write
|
||
6B2400A76000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD5000
|
heap
|
page read and write
|
||
7D94000
|
heap
|
page read and write
|
||
6B2400A70000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
6B240020C000
|
trusted library allocation
|
page read and write
|
||
6B2400FEC000
|
trusted library allocation
|
page read and write
|
||
43A800238000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
1CA1000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
6B2401044000
|
trusted library allocation
|
page read and write
|
||
F5D59FE000
|
unkown
|
page readonly
|
||
2F4F0660000
|
trusted library section
|
page read and write
|
||
6B2400D58000
|
trusted library allocation
|
page read and write
|
||
F5D89FB000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400FD4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F400238000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400338000
|
trusted library allocation
|
page read and write
|
||
2F4F20E0000
|
trusted library section
|
page read and write
|
||
43A800848000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
6B2400C7C000
|
trusted library allocation
|
page read and write
|
||
43A8002F4000
|
trusted library allocation
|
page read and write
|
||
6B2400290000
|
trusted library allocation
|
page read and write
|
||
6B2400F00000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
6B2401201000
|
trusted library allocation
|
page read and write
|
||
2F4F244D000
|
trusted library section
|
page read and write
|
||
6B2400E78000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24002B4000
|
trusted library allocation
|
page read and write
|
||
2F4EB987000
|
heap
|
page read and write
|
||
6B2400518000
|
trusted library allocation
|
page read and write
|
||
6B2400D7C000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
6B2400870000
|
trusted library allocation
|
page read and write
|
||
43A800874000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5EA1FC000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
7E6B000
|
heap
|
page read and write
|
||
6B2400B7C000
|
trusted library allocation
|
page read and write
|
||
58480023C000
|
direct allocation
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6B240101C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
64F4002D8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400684000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
6B2400338000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400188000
|
trusted library allocation
|
page read and write
|
||
F5E01FC000
|
stack
|
page read and write
|
||
43A80070C000
|
trusted library allocation
|
page read and write
|
||
6B2400FD4000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
6B24007D0000
|
trusted library allocation
|
page read and write
|
||
6B2400DF8000
|
trusted library allocation
|
page read and write
|
||
43A8007BC000
|
trusted library allocation
|
page read and write
|
||
6B2400144000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F4002A0000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400F20000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800408000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
F5E51FD000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400801000
|
trusted library allocation
|
page read and write
|
||
F5D61FE000
|
stack
|
page read and write
|
||
2F4E7FB6000
|
heap
|
page read and write
|
||
7450000
|
direct allocation
|
page execute and read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B2400F20000
|
trusted library allocation
|
page read and write
|
||
6B24011D0000
|
trusted library allocation
|
page read and write
|
||
6B240038C000
|
trusted library allocation
|
page read and write
|
||
43A8002CC000
|
trusted library allocation
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800864000
|
trusted library allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E7F00000
|
heap
|
page readonly
|
||
7DC7000
|
heap
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
6B2400154000
|
trusted library allocation
|
page read and write
|
||
7E6F000
|
heap
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
43A800418000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8008E4000
|
trusted library allocation
|
page read and write
|
||
43A8008D8000
|
trusted library allocation
|
page read and write
|
||
6C21D000
|
unkown
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400704000
|
trusted library allocation
|
page read and write
|
||
6B2400368000
|
trusted library allocation
|
page read and write
|
||
6B2400078000
|
trusted library allocation
|
page read and write
|
||
7FDE000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5C99FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400AC0000
|
trusted library allocation
|
page read and write
|
||
6B2401044000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B2400AF8000
|
trusted library allocation
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
6B2400B04000
|
trusted library allocation
|
page read and write
|
||
5848002E4000
|
direct allocation
|
page read and write
|
||
7D64000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800424000
|
trusted library allocation
|
page read and write
|
||
7E94000
|
heap
|
page read and write
|
||
584800290000
|
direct allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
2F4EBA2F000
|
heap
|
page read and write
|
||
6B2400CA8000
|
trusted library allocation
|
page read and write
|
||
64F4002F0000
|
trusted library allocation
|
page read and write
|
||
7D84000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B24010E0000
|
trusted library allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
71F0000
|
direct allocation
|
page read and write
|
||
6B24006DC000
|
trusted library allocation
|
page read and write
|
||
6B2400EF0000
|
trusted library allocation
|
page read and write
|
||
43A8002B8000
|
trusted library allocation
|
page read and write
|
||
2F4F062D000
|
trusted library section
|
page read and write
|
||
43A80071C000
|
trusted library allocation
|
page read and write
|
||
F5CB1FA000
|
stack
|
page read and write
|
||
6B2400124000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400268000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
584800270000
|
direct allocation
|
page read and write
|
||
43A8006AC000
|
trusted library allocation
|
page read and write
|
||
1C5D000
|
heap
|
page read and write
|
||
6B2400B40000
|
trusted library allocation
|
page read and write
|
||
F5DC9FE000
|
unkown
|
page readonly
|
||
6B2400E3C000
|
trusted library allocation
|
page read and write
|
||
6B240032C000
|
trusted library allocation
|
page read and write
|
||
6B24001E4000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B2401130000
|
trusted library allocation
|
page read and write
|
||
1CB4000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6B24011D4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD7000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800700000
|
trusted library allocation
|
page read and write
|
||
F5DF1FC000
|
stack
|
page read and write
|
||
6B2400D2C000
|
trusted library allocation
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
6B24000DC000
|
trusted library allocation
|
page read and write
|
||
6B2400500000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
6B24006A8000
|
trusted library allocation
|
page read and write
|
||
7E4E000
|
heap
|
page read and write
|
||
6B2400934000
|
trusted library allocation
|
page read and write
|
||
801E000
|
heap
|
page read and write
|
||
6B2401060000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24007E4000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
F5D39FE000
|
unkown
|
page readonly
|
||
B80000
|
unkown
|
page readonly
|
||
6B24005B4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240001C000
|
trusted library allocation
|
page read and write
|
||
F5E49FE000
|
unkown
|
page readonly
|
||
6B2400DDC000
|
trusted library allocation
|
page read and write
|
||
2F4EB4EF000
|
heap
|
page read and write
|
||
6B2400DA0000
|
trusted library allocation
|
page read and write
|
||
6B240115C000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
7735000
|
heap
|
page read and write
|
||
64F4002B0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
2F4EDA37000
|
unclassified section
|
page read and write
|
||
2F4F2442000
|
trusted library section
|
page read and write
|
||
7FFF000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400442000
|
trusted library allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
F5E69FE000
|
unkown
|
page readonly
|
||
6B2400E90000
|
trusted library allocation
|
page read and write
|
||
2F4F0042000
|
trusted library allocation
|
page read and write
|
||
F5E29FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
1CAA000
|
heap
|
page read and write
|
||
6B240064C000
|
trusted library allocation
|
page read and write
|
||
2F4EB963000
|
heap
|
page read and write
|
||
2F4F231E000
|
trusted library section
|
page read and write
|
||
6B24008C4000
|
trusted library allocation
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
6B240039C000
|
trusted library allocation
|
page read and write
|
||
43A8007D4000
|
trusted library allocation
|
page read and write
|
||
805B000
|
heap
|
page read and write
|
||
F5F29FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
F5D31FD000
|
stack
|
page read and write
|
||
6B2400580000
|
trusted library allocation
|
page read and write
|
||
6B24001C4000
|
trusted library allocation
|
page read and write
|
||
6B2400CC8000
|
trusted library allocation
|
page read and write
|
||
6B24012BC000
|
trusted library allocation
|
page read and write
|
||
2F4EB97D000
|
heap
|
page read and write
|
||
F5E89FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
64F4002C8000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
7ED9000
|
heap
|
page read and write
|
||
12E2000
|
unkown
|
page write copy
|
||
6B2400CFC000
|
trusted library allocation
|
page read and write
|
||
43A800201000
|
trusted library allocation
|
page read and write
|
||
6C21F000
|
unkown
|
page readonly
|
||
21E000
|
unkown
|
page write copy
|
||
6B2400C14000
|
trusted library allocation
|
page read and write
|
||
6B2400758000
|
trusted library allocation
|
page read and write
|
||
2F4E7F37000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
7F99000
|
heap
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
F5E81FD000
|
stack
|
page read and write
|
||
75A1000
|
heap
|
page read and write
|
||
83E1000
|
heap
|
page read and write
|
||
6B2400C62000
|
trusted library allocation
|
page read and write
|
||
F5EF1FE000
|
stack
|
page read and write
|
||
43A8008EC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400790000
|
trusted library allocation
|
page read and write
|
||
6B24000AC000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B2400DDC000
|
trusted library allocation
|
page read and write
|
||
F5E39FE000
|
unkown
|
page readonly
|
||
2F4F20EE000
|
trusted library section
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400198000
|
trusted library allocation
|
page read and write
|
||
6B2400C8C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240020C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8006F4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8007AC000
|
trusted library allocation
|
page read and write
|
||
761F000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7DAE000
|
heap
|
page read and write
|
||
6B2400DDC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
1CB8000
|
heap
|
page read and write
|
||
7732000
|
heap
|
page read and write
|
||
43A80027C000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
64F4002A0000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
heap
|
page read and write
|
||
6B2400D7C000
|
trusted library allocation
|
page read and write
|
||
584800280000
|
direct allocation
|
page read and write
|
||
6B2401114000
|
trusted library allocation
|
page read and write
|
||
43A800250000
|
trusted library allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
6B2401001000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24001D8000
|
trusted library allocation
|
page read and write
|
||
F5D71FC000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400F10000
|
trusted library allocation
|
page read and write
|
||
6B2400324000
|
trusted library allocation
|
page read and write
|
||
2F4E9E63000
|
heap
|
page read and write
|
||
6B2400220000
|
trusted library allocation
|
page read and write
|
||
584800220000
|
direct allocation
|
page read and write
|
||
6B2400C7C000
|
trusted library allocation
|
page read and write
|
||
F5C31EF000
|
stack
|
page read and write
|
||
F5EE1FC000
|
stack
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400B40000
|
trusted library allocation
|
page read and write
|
||
1CB8000
|
heap
|
page read and write
|
||
7E37000
|
heap
|
page read and write
|
||
F5CC1FE000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
6B2400A28000
|
trusted library allocation
|
page read and write
|
||
6B2400EFC000
|
trusted library allocation
|
page read and write
|
||
2F4E8003000
|
heap
|
page read and write
|
||
7DE9000
|
heap
|
page read and write
|
||
2F4EB4EF000
|
heap
|
page read and write
|
||
2F4EBA0B000
|
heap
|
page read and write
|
||
6B2400700000
|
trusted library allocation
|
page read and write
|
||
6B2400BD4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5DF9FE000
|
unkown
|
page readonly
|
||
77E9000
|
direct allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5EC1FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD7000
|
heap
|
page read and write
|
||
6B2400E48000
|
trusted library allocation
|
page read and write
|
||
7470000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400C0C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB4EA000
|
heap
|
page read and write
|
||
7CD8000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F0622000
|
trusted library section
|
page read and write
|
||
6B24009D0000
|
trusted library allocation
|
page read and write
|
||
2F4EDBE3000
|
heap
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
43A80085C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400ED4000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
6B24002D0000
|
trusted library allocation
|
page read and write
|
||
6B24001E0000
|
trusted library allocation
|
page read and write
|
||
6B24000FC000
|
trusted library allocation
|
page read and write
|
||
43A8002B0000
|
trusted library allocation
|
page read and write
|
||
F5D69FE000
|
unkown
|
page readonly
|
||
2F4F056E000
|
trusted library section
|
page read and write
|
||
6B24008CC000
|
trusted library allocation
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
2F4EB4F6000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
2F4EB981000
|
heap
|
page read and write
|
||
6B2400DAC000
|
trusted library allocation
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
6B24006F5000
|
trusted library allocation
|
page read and write
|
||
6B2401168000
|
trusted library allocation
|
page read and write
|
||
43A8002DC000
|
trusted library allocation
|
page read and write
|
||
6B24002F0000
|
trusted library allocation
|
page read and write
|
||
6B2400F7C000
|
trusted library allocation
|
page read and write
|
||
6B2400E90000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6B2400C28000
|
trusted library allocation
|
page read and write
|
||
6B2400098000
|
trusted library allocation
|
page read and write
|
||
6B2400C18000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
7B56000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
F5EB1FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400FB0000
|
trusted library allocation
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
6B2400BB0000
|
trusted library allocation
|
page read and write
|
||
7E96000
|
heap
|
page read and write
|
||
6B2400C8C000
|
trusted library allocation
|
page read and write
|
||
6B24006DC000
|
trusted library allocation
|
page read and write
|
||
64F400270000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24002C4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
6B2400C14000
|
trusted library allocation
|
page read and write
|
||
6B2400D04000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24005A0000
|
trusted library allocation
|
page read and write
|
||
2F4EB9E6000
|
heap
|
page read and write
|
||
2F4F2312000
|
trusted library section
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
6B2400224000
|
trusted library allocation
|
page read and write
|
||
6B2400401000
|
trusted library allocation
|
page read and write
|
||
6B2400D20000
|
trusted library allocation
|
page read and write
|
||
6B2401108000
|
trusted library allocation
|
page read and write
|
||
F5F21FE000
|
stack
|
page read and write
|
||
6B2400B50000
|
trusted library allocation
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
6B240039C000
|
trusted library allocation
|
page read and write
|
||
2F4F0606000
|
trusted library section
|
page read and write
|
||
6C26C000
|
unkown
|
page readonly
|
||
2F4EBA1C000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
6B2400A80000
|
trusted library allocation
|
page read and write
|
||
2F4EB96E000
|
heap
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
F5E19FE000
|
unkown
|
page readonly
|
||
43A8006C8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400D14000
|
trusted library allocation
|
page read and write
|
||
43A800964000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
794C000
|
direct allocation
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
480000
|
heap
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800844000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
64F4002B0000
|
trusted library allocation
|
page read and write
|
||
5848002AC000
|
direct allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
6B2400C7C000
|
trusted library allocation
|
page read and write
|
||
2F4EB4F4000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
584800284000
|
direct allocation
|
page read and write
|
||
6B2400E78000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800860000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
6B2400658000
|
trusted library allocation
|
page read and write
|
||
6B24002A8000
|
trusted library allocation
|
page read and write
|
||
43A80078C000
|
trusted library allocation
|
page read and write
|
||
F5C51FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
6B2400FD8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400054000
|
trusted library allocation
|
page read and write
|
||
6B2400E54000
|
trusted library allocation
|
page read and write
|
||
1C92000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
430000
|
heap
|
page read and write
|
||
6B24001B4000
|
trusted library allocation
|
page read and write
|
||
2F4E8020000
|
heap
|
page read and write
|
||
21A000
|
unkown
|
page readonly
|
||
2F4F1E77000
|
unclassified section
|
page read and write
|
||
6B2400EE8000
|
trusted library allocation
|
page read and write
|
||
F5CE9FE000
|
unkown
|
page readonly
|
||
6B2400C8C000
|
trusted library allocation
|
page read and write
|
||
6B2400448000
|
trusted library allocation
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
F5CD1FA000
|
stack
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
43A800728000
|
trusted library allocation
|
page read and write
|
||
7F09000
|
heap
|
page read and write
|
||
F5CF9FE000
|
unkown
|
page readonly
|
||
2F4E8011000
|
heap
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
64F400260000
|
trusted library allocation
|
page read and write
|
||
2F4F1EB0000
|
trusted library section
|
page read and write
|
||
6B2400210000
|
trusted library allocation
|
page read and write
|
||
2F4EFE3E000
|
heap
|
page read and write
|
||
6B24009B0000
|
trusted library allocation
|
page read and write
|
||
F5E21FB000
|
stack
|
page read and write
|
||
43A800430000
|
trusted library allocation
|
page read and write
|
||
1CB8000
|
heap
|
page read and write
|
||
43A80040C000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
6B240129C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24001E8000
|
trusted library allocation
|
page read and write
|
||
6B2400230000
|
trusted library allocation
|
page read and write
|
||
2F4EB9DE000
|
heap
|
page read and write
|
||
6B24001A0000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
6B2400338000
|
trusted library allocation
|
page read and write
|
||
43A8007E4000
|
trusted library allocation
|
page read and write
|
||
7D82000
|
heap
|
page read and write
|
||
6B2400DC8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB972000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8002FC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
584800215000
|
direct allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
794E000
|
direct allocation
|
page read and write
|
||
6B24006EC000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
F5EC9FE000
|
unkown
|
page readonly
|
||
43A8006E8000
|
trusted library allocation
|
page read and write
|
||
7CDC000
|
heap
|
page read and write
|
||
6B2400C8F000
|
trusted library allocation
|
page read and write
|
||
6B24010C0000
|
trusted library allocation
|
page read and write
|
||
43A80060C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240034C000
|
trusted library allocation
|
page read and write
|
||
43A800884000
|
trusted library allocation
|
page read and write
|
||
2F4F0010000
|
trusted library section
|
page read and write
|
||
7CDF000
|
heap
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
166D000
|
unkown
|
page execute and write copy
|
||
6B24012A4000
|
trusted library allocation
|
page read and write
|
||
64F4002C0000
|
trusted library allocation
|
page read and write
|
||
7E3C000
|
heap
|
page read and write
|
||
64F400220000
|
trusted library allocation
|
page read and write
|
||
7620000
|
heap
|
page read and write
|
||
6B240044C000
|
trusted library allocation
|
page read and write
|
||
6B240012C000
|
trusted library allocation
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
7E7D000
|
heap
|
page read and write
|
||
2F4EB4FB000
|
heap
|
page read and write
|
||
6B2400641000
|
trusted library allocation
|
page read and write
|
||
6B2400AB0000
|
trusted library allocation
|
page read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
6B2400FB0000
|
trusted library allocation
|
page read and write
|
||
F5D41FE000
|
stack
|
page read and write
|
||
F5C69FE000
|
unkown
|
page readonly
|
||
77CA000
|
heap
|
page read and write
|
||
2F4E7FF5000
|
heap
|
page read and write
|
||
7E40000
|
heap
|
page read and write
|
||
6B2400C7C000
|
trusted library allocation
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
6B2400DC8000
|
trusted library allocation
|
page read and write
|
||
6C269000
|
unkown
|
page read and write
|
||
43A800790000
|
trusted library allocation
|
page read and write
|
||
6B2400D7C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5EA9FE000
|
unkown
|
page readonly
|
||
2F4EBA0F000
|
heap
|
page read and write
|
||
43A800850000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6B2400B74000
|
trusted library allocation
|
page read and write
|
||
6B24001D0000
|
trusted library allocation
|
page read and write
|
||
584800250000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
F5D21FE000
|
stack
|
page read and write
|
||
7DD6000
|
heap
|
page read and write
|
||
2F4F0463000
|
trusted library section
|
page read and write
|
||
F5E91FE000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EBA09000
|
heap
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
6B240110C000
|
trusted library allocation
|
page read and write
|
||
6B2400888000
|
trusted library allocation
|
page read and write
|
||
6CF000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6B24001F0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800920000
|
trusted library allocation
|
page read and write
|
||
F5E11FD000
|
stack
|
page read and write
|
||
6B24001EC000
|
trusted library allocation
|
page read and write
|
||
43A8007D0000
|
trusted library allocation
|
page read and write
|
||
6B2400E01000
|
trusted library allocation
|
page read and write
|
||
F5EE9FE000
|
unkown
|
page readonly
|
||
13C0000
|
heap
|
page read and write
|
||
F5CA9FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6D61000
|
heap
|
page read and write
|
||
6B24004C8000
|
trusted library allocation
|
page read and write
|
||
7CD1000
|
heap
|
page read and write
|
||
43A800878000
|
trusted library allocation
|
page read and write
|
||
2F4F2383000
|
trusted library section
|
page read and write
|
||
2F4EDBE0000
|
heap
|
page read and write
|
||
43A8006C8000
|
trusted library allocation
|
page read and write
|
||
2F4EB9EF000
|
heap
|
page read and write
|
||
2F4E7F2B000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800960000
|
trusted library allocation
|
page read and write
|
||
43A8002EE000
|
trusted library allocation
|
page read and write
|
||
2F4EDBA0000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6B24001CC000
|
trusted library allocation
|
page read and write
|
||
64F400248000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
2F4E8040000
|
heap
|
page read and write
|
||
6B2400F5C000
|
trusted library allocation
|
page read and write
|
||
64F400274000
|
trusted library allocation
|
page read and write
|
||
2F4F04ED000
|
trusted library section
|
page read and write
|
||
43A8008E8000
|
trusted library allocation
|
page read and write
|
||
F5DA9FE000
|
unkown
|
page readonly
|
||
6B24004C8000
|
trusted library allocation
|
page read and write
|
||
1CC7000
|
heap
|
page read and write
|
||
43A80080C000
|
trusted library allocation
|
page read and write
|
||
64F4002F8000
|
trusted library allocation
|
page read and write
|
||
43A8002C4000
|
trusted library allocation
|
page read and write
|
||
43A8008B8000
|
trusted library allocation
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
6B2400A01000
|
trusted library allocation
|
page read and write
|
||
6B2400340000
|
trusted library allocation
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
2F4EBA07000
|
heap
|
page read and write
|
||
6B2400B58000
|
trusted library allocation
|
page read and write
|
||
6B24002F3000
|
trusted library allocation
|
page read and write
|
||
6B24002C9000
|
trusted library allocation
|
page read and write
|
||
2F4EB4EF000
|
heap
|
page read and write
|
||
7E23000
|
heap
|
page read and write
|
||
2F4E7F6F000
|
heap
|
page read and write
|
||
F5DD9FE000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page readonly
|
||
6B2400973000
|
trusted library allocation
|
page read and write
|
||
64F4002A0000
|
trusted library allocation
|
page read and write
|
||
F5D29FE000
|
unkown
|
page readonly
|
||
6D50000
|
direct allocation
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5F01FE000
|
stack
|
page read and write
|
||
7F5C000
|
heap
|
page read and write
|
||
2F4F2360000
|
trusted library section
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B24003B0000
|
trusted library allocation
|
page read and write
|
||
6B240043D000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB501000
|
heap
|
page read and write
|
||
43A80039C000
|
trusted library allocation
|
page read and write
|
||
6B2400338000
|
trusted library allocation
|
page read and write
|
||
64F4002B0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400C6C000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
F5E31FE000
|
stack
|
page read and write
|
||
2F4E8195000
|
heap
|
page read and write
|
||
43A800840000
|
trusted library allocation
|
page read and write
|
||
6B2400214000
|
trusted library allocation
|
page read and write
|
||
6B2400F7C000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
43A800918000
|
trusted library allocation
|
page read and write
|
||
6B240037C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240047C000
|
trusted library allocation
|
page read and write
|
||
6B2400300000
|
trusted library allocation
|
page read and write
|
||
43A80025C000
|
trusted library allocation
|
page read and write
|
||
6B24002A8000
|
trusted library allocation
|
page read and write
|
||
6B2400CB0000
|
trusted library allocation
|
page read and write
|
||
2F4E8005000
|
heap
|
page read and write
|
||
43A800404000
|
trusted library allocation
|
page read and write
|
||
1CB8000
|
heap
|
page read and write
|
||
43A8006E0000
|
trusted library allocation
|
page read and write
|
||
64F4002A0000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
2F4F2300000
|
trusted library section
|
page read and write
|
||
43A800778000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5C61FE000
|
stack
|
page read and write
|
||
6B2400C94000
|
trusted library allocation
|
page read and write
|
||
6B2400EAC000
|
trusted library allocation
|
page read and write
|
||
43A8008F0000
|
trusted library allocation
|
page read and write
|
||
2F4EB4D0000
|
heap
|
page read and write
|
||
43A8002EC000
|
trusted library allocation
|
page read and write
|
||
F5E61FD000
|
stack
|
page read and write
|
||
7E03000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
2F4EB950000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E8150000
|
trusted library section
|
page readonly
|
||
2F4EB965000
|
heap
|
page read and write
|
||
2F4EFC00000
|
trusted library allocation
|
page read and write
|
||
6B2400358000
|
trusted library allocation
|
page read and write
|
||
F5C79FE000
|
unkown
|
page readonly
|
||
6B2400201000
|
trusted library allocation
|
page read and write
|
||
6B2400480000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
64F4002BC000
|
trusted library allocation
|
page read and write
|
||
6B2400228000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7E5A000
|
heap
|
page read and write
|
||
43A80095C000
|
trusted library allocation
|
page read and write
|
||
2F4EB4F3000
|
heap
|
page read and write
|
||
6B2400924000
|
trusted library allocation
|
page read and write
|
||
64F4002E4000
|
trusted library allocation
|
page read and write
|
||
6B2400E78000
|
trusted library allocation
|
page read and write
|
||
584800201000
|
direct allocation
|
page read and write
|
||
6B24006C8000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5D79FE000
|
unkown
|
page readonly
|
||
43A800788000
|
trusted library allocation
|
page read and write
|
||
6B24004C8000
|
trusted library allocation
|
page read and write
|
||
6B240040C000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400648000
|
trusted library allocation
|
page read and write
|
||
6B2400C78000
|
trusted library allocation
|
page read and write
|
||
F5CC9FE000
|
unkown
|
page readonly
|
||
6B2400630000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5DB1FD000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400448000
|
trusted library allocation
|
page read and write
|
||
2F4EB501000
|
heap
|
page read and write
|
||
2F4EBA03000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5E79FE000
|
unkown
|
page readonly
|
||
1CB8000
|
heap
|
page read and write
|
||
7D94000
|
heap
|
page read and write
|
||
43A80091C000
|
trusted library allocation
|
page read and write
|
||
2F4F2371000
|
trusted library section
|
page read and write
|
||
6B2400768000
|
trusted library allocation
|
page read and write
|
||
6B24011D8000
|
trusted library allocation
|
page read and write
|
||
43A80087C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800288000
|
trusted library allocation
|
page read and write
|
||
EF000
|
stack
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
64F4002C0000
|
trusted library allocation
|
page read and write
|
||
F5DB9FE000
|
unkown
|
page readonly
|
||
2F4F20B7000
|
unclassified section
|
page read and write
|
||
6B2400E18000
|
trusted library allocation
|
page read and write
|
||
6B240102C000
|
trusted library allocation
|
page read and write
|
||
F5D91FE000
|
unkown
|
page readonly
|
||
6B240008F000
|
trusted library allocation
|
page read and write
|
||
6B240080C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F1C60000
|
trusted library section
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E8070000
|
trusted library allocation
|
page read and write
|
||
64F4002F4000
|
trusted library allocation
|
page read and write
|
||
1CAA000
|
heap
|
page read and write
|
||
6B2400218000
|
trusted library allocation
|
page read and write
|
||
6B2400834000
|
trusted library allocation
|
page read and write
|
||
F5DE1FC000
|
stack
|
page read and write
|
||
6B2401124000
|
trusted library allocation
|
page read and write
|
||
6B2400954000
|
trusted library allocation
|
page read and write
|
||
F5C89FE000
|
unkown
|
page readonly
|
||
6B240032C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400D70000
|
trusted library allocation
|
page read and write
|
||
64F4002C0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
6B2400234000
|
trusted library allocation
|
page read and write
|
||
2F4EB4EA000
|
heap
|
page read and write
|
||
2F4EB4C0000
|
heap
|
page read and write
|
||
F5C91FD000
|
stack
|
page read and write
|
||
43A800894000
|
trusted library allocation
|
page read and write
|
||
2F4EB4F3000
|
heap
|
page read and write
|
||
2F4ED9F7000
|
unclassified section
|
page read and write
|
||
6B24007F8000
|
trusted library allocation
|
page read and write
|
||
7E37000
|
heap
|
page read and write
|
||
F5D49FE000
|
unkown
|
page readonly
|
||
2F4F042E000
|
trusted library section
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400E90000
|
trusted library allocation
|
page read and write
|
||
6B24001F4000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B2400848000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
6B2400CB8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4E9E60000
|
heap
|
page read and write
|
||
1CC7000
|
heap
|
page read and write
|
||
6B2400124000
|
trusted library allocation
|
page read and write
|
||
2F4EBA0D000
|
heap
|
page read and write
|
||
7E10000
|
heap
|
page read and write
|
||
6B2400F88000
|
trusted library allocation
|
page read and write
|
||
6B2400858000
|
trusted library allocation
|
page read and write
|
||
6B240030C000
|
trusted library allocation
|
page read and write
|
||
F5CE1FB000
|
stack
|
page read and write
|
||
F5D81FC000
|
stack
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
6B2400164000
|
trusted library allocation
|
page read and write
|
||
F5E09FE000
|
unkown
|
page readonly
|
||
6B24000A0000
|
trusted library allocation
|
page read and write
|
||
43A800830000
|
trusted library allocation
|
page read and write
|
||
2F4E9E00000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5E59FE000
|
unkown
|
page readonly
|
||
6B240089C000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
2F4F0562000
|
trusted library section
|
page read and write
|
||
6B24000B4000
|
trusted library allocation
|
page read and write
|
||
6B2400730000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800248000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400B90000
|
trusted library allocation
|
page read and write
|
||
2F4E7FFD000
|
heap
|
page read and write
|
||
6B24005DC000
|
trusted library allocation
|
page read and write
|
||
6B2400C98000
|
trusted library allocation
|
page read and write
|
||
58480024C000
|
direct allocation
|
page read and write
|
||
2F4EB96D000
|
heap
|
page read and write
|
||
2F4EFE00000
|
heap
|
page read and write
|
||
7E8B000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB4F4000
|
heap
|
page read and write
|
||
64F400288000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400D7C000
|
trusted library allocation
|
page read and write
|
||
6B2400300000
|
trusted library allocation
|
page read and write
|
||
43A8002F0000
|
trusted library allocation
|
page read and write
|
||
F5EF9FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400BF8000
|
trusted library allocation
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
6B24001B4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A8007E0000
|
trusted library allocation
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
6B2400001000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400A9C000
|
trusted library allocation
|
page read and write
|
||
43A80079C000
|
trusted library allocation
|
page read and write
|
||
43A8008A8000
|
trusted library allocation
|
page read and write
|
||
6B2401054000
|
trusted library allocation
|
page read and write
|
||
F5C49FE000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6C140000
|
unkown
|
page readonly
|
||
7ECB000
|
heap
|
page read and write
|
||
6B2400C54000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800890000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB9FB000
|
heap
|
page read and write
|
||
6B2400300000
|
trusted library allocation
|
page read and write
|
||
6B240038C000
|
trusted library allocation
|
page read and write
|
||
6B240022C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F2350000
|
trusted library section
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
43A800210000
|
trusted library allocation
|
page read and write
|
||
2F4EB977000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
6B240108C000
|
trusted library allocation
|
page read and write
|
||
6B2400644000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800601000
|
trusted library allocation
|
page read and write
|
||
6B24002A4000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
43A8006AC000
|
trusted library allocation
|
page read and write
|
||
64F400250000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
7CDE000
|
heap
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2401070000
|
trusted library allocation
|
page read and write
|
||
6B240074C000
|
trusted library allocation
|
page read and write
|
||
6B2400A30000
|
trusted library allocation
|
page read and write
|
||
1CA4000
|
heap
|
page read and write
|
||
6B2400DF0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240021C000
|
trusted library allocation
|
page read and write
|
||
2F4EB4F3000
|
heap
|
page read and write
|
||
6B240061C000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
7E0C000
|
heap
|
page read and write
|
||
F5DC1FE000
|
stack
|
page read and write
|
||
221000
|
unkown
|
page readonly
|
||
6B2400174000
|
trusted library allocation
|
page read and write
|
||
6B2400300000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5C41FE000
|
unkown
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400CF0000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4F2426000
|
trusted library section
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
6B240063D000
|
trusted library allocation
|
page read and write
|
||
F5F19FE000
|
unkown
|
page readonly
|
||
584800234000
|
direct allocation
|
page read and write
|
||
2F4F1EBE000
|
trusted library section
|
page read and write
|
||
43A80082C000
|
trusted library allocation
|
page read and write
|
||
6B240070C000
|
trusted library allocation
|
page read and write
|
||
2F4EB961000
|
heap
|
page read and write
|
||
6B2400318000
|
trusted library allocation
|
page read and write
|
||
2F4EB4FB000
|
heap
|
page read and write
|
||
64F4002C0000
|
trusted library allocation
|
page read and write
|
||
F5CB9FE000
|
unkown
|
page readonly
|
||
6B24004DC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400F6C000
|
trusted library allocation
|
page read and write
|
||
803B000
|
heap
|
page read and write
|
||
6B2401140000
|
trusted library allocation
|
page read and write
|
||
6B24008FC000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
6B2400338000
|
trusted library allocation
|
page read and write
|
||
6B24001F8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24002B8000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
6D61000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
F5DE9FE000
|
unkown
|
page readonly
|
||
6B2400EDC000
|
trusted library allocation
|
page read and write
|
||
58480020C000
|
direct allocation
|
page read and write
|
||
2F4EB97A000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24010C8000
|
trusted library allocation
|
page read and write
|
||
F5DD1FC000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
43A800904000
|
trusted library allocation
|
page read and write
|
||
6B24007C4000
|
trusted library allocation
|
page read and write
|
||
43A800948000
|
trusted library allocation
|
page read and write
|
||
6B2400340000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EFE46000
|
heap
|
page read and write
|
||
7E16000
|
heap
|
page read and write
|
||
6B2400A0C000
|
trusted library allocation
|
page read and write
|
||
7DD7000
|
heap
|
page read and write
|
||
6B2400FD4000
|
trusted library allocation
|
page read and write
|
||
6B2400D44000
|
trusted library allocation
|
page read and write
|
||
1CB8000
|
heap
|
page read and write
|
||
7E0A000
|
heap
|
page read and write
|
||
6B2400374000
|
trusted library allocation
|
page read and write
|
||
6B2400994000
|
trusted library allocation
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
6B240000C000
|
trusted library allocation
|
page read and write
|
||
7F7B000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
64F400230000
|
trusted library allocation
|
page read and write
|
||
6B2400C01000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
6B24012B0000
|
trusted library allocation
|
page read and write
|
||
F5DA1FC000
|
stack
|
page read and write
|
||
584800230000
|
direct allocation
|
page read and write
|
||
2F4EB9EB000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B240064C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CDC000
|
heap
|
page read and write
|
||
7AD1000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
584800210000
|
direct allocation
|
page read and write
|
||
43A80039C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
2F4EB9DA000
|
heap
|
page read and write
|
||
6B24000EC000
|
trusted library allocation
|
page read and write
|
||
1CC4000
|
heap
|
page read and write
|
||
584800217000
|
direct allocation
|
page read and write
|
||
7FBD000
|
heap
|
page read and write
|
||
43A800898000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
2F4F0422000
|
trusted library section
|
page read and write
|
||
1CB4000
|
heap
|
page read and write
|
||
6B2400CC0000
|
trusted library allocation
|
page read and write
|
||
6B2400C7C000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400708000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B2400544000
|
trusted library allocation
|
page read and write
|
||
6B2400D89000
|
trusted library allocation
|
page read and write
|
||
43A8008AC000
|
trusted library allocation
|
page read and write
|
||
7E2D000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
6B24002CB000
|
trusted library allocation
|
page read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
43A8006AC000
|
trusted library allocation
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
6B240101C000
|
trusted library allocation
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
7DBE000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
There are 1252 hidden memdumps, click here to show them.