Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
95e1Fwp61u.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_95e1Fwp61u.exe_712e2179e37367d26716f84bdb6b61d81dd8a813_efa5f1a4_e25b01f1-01ff-401e-8715-92e1633a9c87\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31F7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:25:40 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER338E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33BE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\95e1Fwp61u.exe
|
"C:\Users\user\Desktop\95e1Fwp61u.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2000,i,15655755230875397707,13609631537999439981,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 1144
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
http://anglebug.com/6929an
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://anglebug.com/5371W
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
http://anglebug.com/3965U
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
https://anglebug.com/7369an
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
http://anglebug.com/6048.
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en0
|
unknown
|
||
http://anglebug.com/8229b
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/8280rk.enable
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5055=
|
unknown
|
||
http://anglebug.com/4551Y
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/3502v
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://anglebug.com/4551F
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://anglebug.com/6860r
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hjt)
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/7047b
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icofrom_play_api2
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
ProgramId
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
FileId
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
LowerCaseLongPath
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
LongPathHash
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Name
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
OriginalFileName
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Publisher
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Version
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
BinFileVersion
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
BinaryType
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
ProductName
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
ProductVersion
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
LinkDate
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
BinProductVersion
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
AppxPackageFullName
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Size
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Language
|
||
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B0DC7FE000
|
unkown
|
page readonly
|
||
36C02994000
|
trusted library allocation
|
page read and write
|
||
2000002E4000
|
trusted library allocation
|
page read and write
|
||
36C02514000
|
trusted library allocation
|
page read and write
|
||
36C0256C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C02420000
|
trusted library allocation
|
page read and write
|
||
136000290000
|
direct allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
36C02878000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
36C023C8000
|
trusted library allocation
|
page read and write
|
||
297400354000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5E5000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400310000
|
trusted library allocation
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
B0E0FFE000
|
stack
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B0FCFFE000
|
stack
|
page read and write
|
||
297400614000
|
trusted library allocation
|
page read and write
|
||
36C02B08000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C02514000
|
trusted library allocation
|
page read and write
|
||
36C03040000
|
trusted library allocation
|
page read and write
|
||
36C02280000
|
trusted library allocation
|
page read and write
|
||
1360002DC000
|
direct allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
B41000
|
unkown
|
page execute read
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
83A7000
|
heap
|
page read and write
|
||
36C02801000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02EF4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2000002F0000
|
trusted library allocation
|
page read and write
|
||
1B0DDC96000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
3F50000
|
direct allocation
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
36C03025000
|
trusted library allocation
|
page read and write
|
||
29740075C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5EE000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
1B0DD5F2000
|
heap
|
page read and write
|
||
36C02B74000
|
trusted library allocation
|
page read and write
|
||
2974002B8000
|
trusted library allocation
|
page read and write
|
||
36C03001000
|
trusted library allocation
|
page read and write
|
||
36C02F04000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
8274000
|
heap
|
page read and write
|
||
1B0E3EF0000
|
trusted library section
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02E7C000
|
trusted library allocation
|
page read and write
|
||
36C02614000
|
trusted library allocation
|
page read and write
|
||
36C02264000
|
trusted library allocation
|
page read and write
|
||
36C02546000
|
trusted library allocation
|
page read and write
|
||
297400734000
|
trusted library allocation
|
page read and write
|
||
2974006B0000
|
trusted library allocation
|
page read and write
|
||
B0FD7FE000
|
unkown
|
page readonly
|
||
36C02F20000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DA1D0000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
8A20000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
B0DCFFE000
|
stack
|
page read and write
|
||
8368000
|
heap
|
page read and write
|
||
2974002E4000
|
trusted library allocation
|
page read and write
|
||
2194000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1B0DDC8F000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
8389000
|
heap
|
page read and write
|
||
297400404000
|
trusted library allocation
|
page read and write
|
||
36C02934000
|
trusted library allocation
|
page read and write
|
||
36C02554000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
B0F97FE000
|
unkown
|
page readonly
|
||
B0E37FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0D8FFC000
|
stack
|
page read and write
|
||
1B0E1AA0000
|
trusted library allocation
|
page read and write
|
||
1B0DA03E000
|
heap
|
page read and write
|
||
2974006B4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02FC8000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page execute read
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
331F000
|
unkown
|
page read and write
|
||
36C022F0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400210000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
200000278000
|
trusted library allocation
|
page read and write
|
||
297400640000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page read and write
|
||
36C02390000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2000002A0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
200000260000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
36C0240C000
|
trusted library allocation
|
page read and write
|
||
1B0E40F0000
|
trusted library section
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0307C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400758000
|
trusted library allocation
|
page read and write
|
||
36C02590000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7D80000
|
direct allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
7A00000
|
direct allocation
|
page execute and read and write
|
||
36C027B8000
|
trusted library allocation
|
page read and write
|
||
36C027A4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0E0004000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C023E8000
|
trusted library allocation
|
page read and write
|
||
297400248000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0D1FFE000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DDCE4000
|
heap
|
page read and write
|
||
1B0DD60D000
|
heap
|
page read and write
|
||
36C028E0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
200000238000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C029E4000
|
trusted library allocation
|
page read and write
|
||
36C0240C000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1B0DA210000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
2000002B0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
B0E3FFD000
|
stack
|
page read and write
|
||
1B0DDE57000
|
unclassified section
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
2000002C0000
|
trusted library allocation
|
page read and write
|
||
36C02960000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
unkown
|
page read and write
|
||
B0EF7FE000
|
unkown
|
page readonly
|
||
32D0000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
36C0254C000
|
trusted library allocation
|
page read and write
|
||
1B0DDCCB000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0D5FFE000
|
stack
|
page read and write
|
||
B0E17FE000
|
unkown
|
page readonly
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0F8FFE000
|
stack
|
page read and write
|
||
B0F4FFE000
|
stack
|
page read and write
|
||
B0E8FFD000
|
stack
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
8273000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
200000270000
|
trusted library allocation
|
page read and write
|
||
827E000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0DEFFA000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400678000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C0254C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DDC98000
|
heap
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
36C0269C000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
2186000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C02D10000
|
trusted library allocation
|
page read and write
|
||
36C029D0000
|
trusted library allocation
|
page read and write
|
||
1B0DDC00000
|
heap
|
page read and write
|
||
36C02E34000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C026F0000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
2974006D4000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974002ED000
|
trusted library allocation
|
page read and write
|
||
36C02E58000
|
trusted library allocation
|
page read and write
|
||
B0F1FFE000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0FAFFE000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0235C000
|
trusted library allocation
|
page read and write
|
||
B0F47FE000
|
unkown
|
page readonly
|
||
1B0DDB50000
|
trusted library section
|
page read and write
|
||
7E04000
|
heap
|
page read and write
|
||
36C0252C000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
36C026E7000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
36C024AE000
|
trusted library allocation
|
page read and write
|
||
6C1F9000
|
unkown
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02E48000
|
trusted library allocation
|
page read and write
|
||
2000002C0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C024C9000
|
trusted library allocation
|
page read and write
|
||
36C02EDC000
|
trusted library allocation
|
page read and write
|
||
104E000
|
heap
|
page read and write
|
||
36C02B90000
|
trusted library allocation
|
page read and write
|
||
36C02EB0000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
2000002D8000
|
trusted library allocation
|
page read and write
|
||
6C0D1000
|
unkown
|
page execute read
|
||
8468000
|
heap
|
page read and write
|
||
29740040C000
|
trusted library allocation
|
page read and write
|
||
8274000
|
heap
|
page read and write
|
||
36C02F80000
|
trusted library allocation
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
36C0277C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0246C000
|
trusted library allocation
|
page read and write
|
||
297400688000
|
trusted library allocation
|
page read and write
|
||
297400368000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2000002B0000
|
trusted library allocation
|
page read and write
|
||
36C02E48000
|
trusted library allocation
|
page read and write
|
||
1B0DA213000
|
heap
|
page read and write
|
||
36C02D74000
|
trusted library allocation
|
page read and write
|
||
297400658000
|
trusted library allocation
|
page read and write
|
||
8368000
|
heap
|
page read and write
|
||
36C03050000
|
trusted library allocation
|
page read and write
|
||
83E3000
|
heap
|
page read and write
|
||
1B0DD5E7000
|
heap
|
page read and write
|
||
36C02944000
|
trusted library allocation
|
page read and write
|
||
1B0DD5E4000
|
heap
|
page read and write
|
||
297400610000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02F34000
|
trusted library allocation
|
page read and write
|
||
84AA000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C02430000
|
trusted library allocation
|
page read and write
|
||
36C0278C000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
136000217000
|
direct allocation
|
page read and write
|
||
1B0DFFA2000
|
heap
|
page read and write
|
||
1B0DA255000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
B0CEFFE000
|
stack
|
page read and write
|
||
297400374000
|
trusted library allocation
|
page read and write
|
||
36C0221C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5EE000
|
heap
|
page read and write
|
||
8273000
|
heap
|
page read and write
|
||
36C02418000
|
trusted library allocation
|
page read and write
|
||
8158000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02FB8000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C023B4000
|
trusted library allocation
|
page read and write
|
||
B0FBFFE000
|
stack
|
page read and write
|
||
36C0290C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02CD8000
|
trusted library allocation
|
page read and write
|
||
B0CE7FE000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
36C02DD4000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
36C02FF0000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974002F4000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02410000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C03054000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
6C1AD000
|
unkown
|
page read and write
|
||
297400401000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
29740033C000
|
trusted library allocation
|
page read and write
|
||
36C02F90000
|
trusted library allocation
|
page read and write
|
||
36C02EEC000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
136000210000
|
direct allocation
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
846F000
|
heap
|
page read and write
|
||
36C02398000
|
trusted library allocation
|
page read and write
|
||
837D000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C024A4000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0F2FFD000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
297400248000
|
trusted library allocation
|
page read and write
|
||
84DA000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C003F4000
|
trusted library allocation
|
page read and write
|
||
297400724000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
297400238000
|
trusted library allocation
|
page read and write
|
||
36C00B06000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0252C000
|
trusted library allocation
|
page read and write
|
||
36C02D20000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400704000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page write copy
|
||
7341000
|
heap
|
page read and write
|
||
36C02AAC000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
36C02DB4000
|
trusted library allocation
|
page read and write
|
||
B0DE7FE000
|
unkown
|
page readonly
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C02D04000
|
trusted library allocation
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02ADC000
|
trusted library allocation
|
page read and write
|
||
36C02E24000
|
trusted library allocation
|
page read and write
|
||
36C023E4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
36C02500000
|
trusted library allocation
|
page read and write
|
||
36C023AC000
|
trusted library allocation
|
page read and write
|
||
1B0DD628000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02C01000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
841F000
|
heap
|
page read and write
|
||
36C0234C000
|
trusted library allocation
|
page read and write
|
||
2974006C8000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
297400601000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
200000288000
|
trusted library allocation
|
page read and write
|
||
36C0225A000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DDA50000
|
trusted library section
|
page read and write
|
||
B0E2FFE000
|
unkown
|
page readonly
|
||
36C024AE000
|
trusted library allocation
|
page read and write
|
||
36C02A98000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
36C00801000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02BD0000
|
trusted library allocation
|
page read and write
|
||
297400320000
|
trusted library allocation
|
page read and write
|
||
297400320000
|
trusted library allocation
|
page read and write
|
||
21AC000
|
heap
|
page read and write
|
||
2000002A0000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02E6C000
|
trusted library allocation
|
page read and write
|
||
36C02A50000
|
trusted library allocation
|
page read and write
|
||
36C023EC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C023F0000
|
trusted library allocation
|
page read and write
|
||
B0D67FE000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C024A8000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page execute read
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DFFCB000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0E3700000
|
heap
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
77C0000
|
direct allocation
|
page read and write
|
||
83CF000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C028F8000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
861D000
|
heap
|
page read and write
|
||
2974006D0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
29740020C000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
36C02EB0000
|
trusted library allocation
|
page read and write
|
||
8270000
|
heap
|
page read and write
|
||
36C0013C000
|
trusted library allocation
|
page read and write
|
||
136000303000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8275000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0EFFFD000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7EE4000
|
direct allocation
|
page read and write
|
||
136000270000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page execute and write copy
|
||
297400684000
|
trusted library allocation
|
page read and write
|
||
B0F57FE000
|
unkown
|
page readonly
|
||
36C0280C000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
8344000
|
heap
|
page read and write
|
||
36C02E98000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
827A000
|
heap
|
page read and write
|
||
36C02914000
|
trusted library allocation
|
page read and write
|
||
1B0DD60D000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
B0EA7FE000
|
unkown
|
page readonly
|
||
1B0E432E000
|
trusted library section
|
page read and write
|
||
6C0D0000
|
unkown
|
page readonly
|
||
36C0303C000
|
trusted library allocation
|
page read and write
|
||
36C02888000
|
trusted library allocation
|
page read and write
|
||
297400250000
|
trusted library allocation
|
page read and write
|
||
7CE1000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02CAC000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DA09E000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
8272000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0E38D0000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C02E5C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
29740085C000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02401000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
B0E5FFC000
|
stack
|
page read and write
|
||
7B4C000
|
heap
|
page read and write
|
||
36C0285C000
|
trusted library allocation
|
page read and write
|
||
2974002B0000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DDC86000
|
heap
|
page read and write
|
||
1360002D0000
|
direct allocation
|
page read and write
|
||
7C30000
|
heap
|
page read and write
|
||
827F000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DD5E7000
|
heap
|
page read and write
|
||
36C024AE000
|
trusted library allocation
|
page read and write
|
||
29740035C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02D90000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
841C000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
835C000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
200000230000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8322000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B0E9FFE000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
7B99000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
827C000
|
heap
|
page read and write
|
||
B0CCFF1000
|
stack
|
page read and write
|
||
36C02718000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
8276000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
200000294000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DA200000
|
trusted library section
|
page readonly
|
||
136000250000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
36C02601000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
2F1A000
|
stack
|
page read and write
|
||
36C02628000
|
trusted library allocation
|
page read and write
|
||
8560000
|
heap
|
page read and write
|
||
8423000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
297400770000
|
trusted library allocation
|
page read and write
|
||
1B0DD628000
|
heap
|
page read and write
|
||
84E4000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1B0D9FA0000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
B0EAFFB000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
1B0DDCDB000
|
heap
|
page read and write
|
||
36C024E0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
B0D77FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
36C024A8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
1B0DDC21000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C02560000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
unkown
|
page write copy
|
||
1B0DD604000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C027DC000
|
trusted library allocation
|
page read and write
|
||
297400348000
|
trusted library allocation
|
page read and write
|
||
1B0DD5E7000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
29740027C000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1B0DD5E5000
|
heap
|
page read and write
|
||
36C00401000
|
trusted library allocation
|
page read and write
|
||
845A000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C025EC000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
136000280000
|
direct allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02514000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
297400624000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02538000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
36C02543000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
2194000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
1B0DD5E5000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
297400364000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
1360002EC000
|
direct allocation
|
page read and write
|
||
6C1AF000
|
unkown
|
page readonly
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
83E4000
|
heap
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
36C02EC0000
|
trusted library allocation
|
page read and write
|
||
29740025C000
|
trusted library allocation
|
page read and write
|
||
200000220000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
36C02434000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C00432000
|
trusted library allocation
|
page read and write
|
||
297400390000
|
trusted library allocation
|
page read and write
|
||
36C02A28000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
2000002C0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02244000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
unkown
|
page write copy
|
||
7341000
|
heap
|
page read and write
|
||
B0D97FE000
|
unkown
|
page readonly
|
||
827D000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02FD0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD617000
|
heap
|
page read and write
|
||
1B0DDC31000
|
heap
|
page read and write
|
||
20000020C000
|
trusted library allocation
|
page read and write
|
||
297400788000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0E3CF0000
|
trusted library section
|
page read and write
|
||
B0EEFFC000
|
stack
|
page read and write
|
||
21A2000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02FE8000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
7341000
|
heap
|
page read and write
|
||
7EE6000
|
direct allocation
|
page read and write
|
||
36C02E7C000
|
trusted library allocation
|
page read and write
|
||
1B0DDDC0000
|
trusted library section
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
29740060C000
|
trusted library allocation
|
page read and write
|
||
827D000
|
heap
|
page read and write
|
||
36C02F40000
|
trusted library allocation
|
page read and write
|
||
B0F0FFE000
|
stack
|
page read and write
|
||
36C030D8000
|
trusted library allocation
|
page read and write
|
||
36C030F4000
|
trusted library allocation
|
page read and write
|
||
36C023F8000
|
trusted library allocation
|
page read and write
|
||
36C02FAC000
|
trusted library allocation
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C030EC000
|
trusted library allocation
|
page read and write
|
||
36C02334000
|
trusted library allocation
|
page read and write
|
||
36C023AC000
|
trusted library allocation
|
page read and write
|
||
36C02C1C000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
343B000
|
heap
|
page read and write
|
||
200000201000
|
trusted library allocation
|
page read and write
|
||
1B0D9F90000
|
heap
|
page readonly
|
||
B0ECFFE000
|
stack
|
page read and write
|
||
36C02F5C000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0F6FFE000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400320000
|
trusted library allocation
|
page read and write
|
||
36C007F8000
|
trusted library allocation
|
page read and write
|
||
36C0289B000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0276C000
|
trusted library allocation
|
page read and write
|
||
8272000
|
heap
|
page read and write
|
||
B0E27FA000
|
stack
|
page read and write
|
||
B0DB7FE000
|
unkown
|
page readonly
|
||
200000248000
|
trusted library allocation
|
page read and write
|
||
6C1F8000
|
unkown
|
page readonly
|
||
36C0287C000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
297400668000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
36C02B4C000
|
trusted library allocation
|
page read and write
|
||
297400330000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
2000002F8000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
1B0E1AD2000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
8604000
|
heap
|
page read and write
|
||
36C02AF0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C02DAC000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C023D8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7B9C000
|
heap
|
page read and write
|
||
36C025EC000
|
trusted library allocation
|
page read and write
|
||
36C02490000
|
trusted library allocation
|
page read and write
|
||
36C0237C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974007B4000
|
trusted library allocation
|
page read and write
|
||
297400750000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C027EC000
|
trusted library allocation
|
page read and write
|
||
1B0DDC9D000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD60E000
|
heap
|
page read and write
|
||
36C03084000
|
trusted library allocation
|
page read and write
|
||
36C02E98000
|
trusted library allocation
|
page read and write
|
||
36C02580000
|
trusted library allocation
|
page read and write
|
||
297400718000
|
trusted library allocation
|
page read and write
|
||
6C1FC000
|
unkown
|
page readonly
|
||
7B31000
|
heap
|
page read and write
|
||
8506000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974006E4000
|
trusted library allocation
|
page read and write
|
||
B0D37FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
36C02C2C000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
136000284000
|
direct allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02708000
|
trusted library allocation
|
page read and write
|
||
297400220000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
78C000
|
stack
|
page read and write
|
||
17B7000
|
unkown
|
page execute and write copy
|
||
36C023B4000
|
trusted library allocation
|
page read and write
|
||
2974002FC000
|
trusted library allocation
|
page read and write
|
||
36C02E3C000
|
trusted library allocation
|
page read and write
|
||
218D000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
8A27000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400620000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
136000274000
|
direct allocation
|
page read and write
|
||
36C0309C000
|
trusted library allocation
|
page read and write
|
||
13600023C000
|
direct allocation
|
page read and write
|
||
36C0220C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974002CC000
|
trusted library allocation
|
page read and write
|
||
36C0254C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7E00000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C02F4C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5EE000
|
heap
|
page read and write
|
||
B0D3FFB000
|
stack
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C02201000
|
trusted library allocation
|
page read and write
|
||
84BE000
|
heap
|
page read and write
|
||
36C02988000
|
trusted library allocation
|
page read and write
|
||
297400694000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B41000
|
unkown
|
page execute read
|
||
B41000
|
unkown
|
page execute read
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
2974006F0000
|
trusted library allocation
|
page read and write
|
||
36C00601000
|
trusted library allocation
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
B0D17FE000
|
unkown
|
page readonly
|
||
36C030D0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C00E01000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
200000235000
|
trusted library allocation
|
page read and write
|
||
36C02414000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C023C4000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
B0E67FE000
|
unkown
|
page readonly
|
||
1B0DD604000
|
heap
|
page read and write
|
||
B0FA7FE000
|
unkown
|
page readonly
|
||
297400664000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
36C00F56000
|
trusted library allocation
|
page read and write
|
||
83AB000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
8275000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
2132000
|
heap
|
page read and write
|
||
36C0275C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02955000
|
trusted library allocation
|
page read and write
|
||
2000002A0000
|
trusted library allocation
|
page read and write
|
||
8272000
|
heap
|
page read and write
|
||
136000260000
|
direct allocation
|
page read and write
|
||
83B7000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2974006AC000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02684000
|
trusted library allocation
|
page read and write
|
||
8278000
|
heap
|
page read and write
|
||
7B31000
|
heap
|
page read and write
|
||
36C02D68000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C023B4000
|
trusted library allocation
|
page read and write
|
||
8277000
|
heap
|
page read and write
|
||
36C02F0C000
|
trusted library allocation
|
page read and write
|
||
1B0DD608000
|
heap
|
page read and write
|
||
8279000
|
heap
|
page read and write
|
||
36C0242C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C0281C000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02328000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8275000
|
heap
|
page read and write
|
||
36C029B8000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
297400330000
|
trusted library allocation
|
page read and write
|
||
1B0DDE47000
|
unclassified section
|
page read and write
|
||
B0D07FE000
|
unkown
|
page readonly
|
||
B0DF7FE000
|
unkown
|
page readonly
|
||
B40000
|
unkown
|
page readonly
|
||
8327000
|
heap
|
page read and write
|
||
B0E77FE000
|
unkown
|
page readonly
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8447000
|
heap
|
page read and write
|
||
297400714000
|
trusted library allocation
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
297400744000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
136000234000
|
direct allocation
|
page read and write
|
||
1360002AC000
|
direct allocation
|
page read and write
|
||
36C0228F000
|
trusted library allocation
|
page read and write
|
||
1B0DA1A0000
|
heap
|
page read and write
|
||
36C02E44000
|
trusted library allocation
|
page read and write
|
||
1B0DD5EE000
|
heap
|
page read and write
|
||
36C02957000
|
trusted library allocation
|
page read and write
|
||
8317000
|
heap
|
page read and write
|
||
1B0DFFE5000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C03029000
|
trusted library allocation
|
page read and write
|
||
36C02F74000
|
trusted library allocation
|
page read and write
|
||
36C02C78000
|
trusted library allocation
|
page read and write
|
||
858E000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
13600020C000
|
direct allocation
|
page read and write
|
||
36C02C70000
|
trusted library allocation
|
page read and write
|
||
83EC000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
2000002C8000
|
trusted library allocation
|
page read and write
|
||
36C023A0000
|
trusted library allocation
|
page read and write
|
||
36C02B30000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1360002E4000
|
direct allocation
|
page read and write
|
||
8319000
|
heap
|
page read and write
|
||
2186000
|
heap
|
page read and write
|
||
36C029A1000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
827C000
|
heap
|
page read and write
|
||
2974006E0000
|
trusted library allocation
|
page read and write
|
||
85EB000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DDCCD000
|
heap
|
page read and write
|
||
297400380000
|
trusted library allocation
|
page read and write
|
||
297400630000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
843C000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5C0000
|
heap
|
page read and write
|
||
2000002F4000
|
trusted library allocation
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C03030000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
B0F07FE000
|
unkown
|
page readonly
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C023D4000
|
trusted library allocation
|
page read and write
|
||
B0F87FE000
|
unkown
|
page readonly
|
||
29740080C000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
B51000
|
unkown
|
page readonly
|
||
297400424000
|
trusted library allocation
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
36C026E0000
|
trusted library allocation
|
page read and write
|
||
36C02ECC000
|
trusted library allocation
|
page read and write
|
||
36C024EB000
|
trusted library allocation
|
page read and write
|
||
2974006EC000
|
trusted library allocation
|
page read and write
|
||
36C02F9C000
|
trusted library allocation
|
page read and write
|
||
1B0DD830000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0E36A7000
|
unclassified section
|
page read and write
|
||
36C024B8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02EA8000
|
trusted library allocation
|
page read and write
|
||
36C023DC000
|
trusted library allocation
|
page read and write
|
||
36C02BEC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
36C02A01000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
36C0301F000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0EE7FE000
|
unkown
|
page readonly
|
||
1B0E3677000
|
unclassified section
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
B4E000
|
unkown
|
page read and write
|
||
1B0E4320000
|
trusted library section
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DDC83000
|
heap
|
page read and write
|
||
36C02C0C000
|
trusted library allocation
|
page read and write
|
||
36C029AC000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
direct allocation
|
page execute and read and write
|
||
B0E7FFC000
|
stack
|
page read and write
|
||
B0E4FFC000
|
stack
|
page read and write
|
||
36C02D28000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
83FC000
|
heap
|
page read and write
|
||
36C030E0000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C030B8000
|
trusted library allocation
|
page read and write
|
||
1B0DDCC5000
|
heap
|
page read and write
|
||
36C023E0000
|
trusted library allocation
|
page read and write
|
||
2974007CC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02CF4000
|
trusted library allocation
|
page read and write
|
||
85C7000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
36C0305C000
|
trusted library allocation
|
page read and write
|
||
2187000
|
heap
|
page read and write
|
||
B0CDFFE000
|
unkown
|
page read and write
|
||
36C024A4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
863B000
|
heap
|
page read and write
|
||
7A20000
|
direct allocation
|
page execute and read and write
|
||
36C02EE0000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
B4A000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0DDCF0000
|
heap
|
page read and write
|
||
1B0E40FE000
|
trusted library section
|
page read and write
|
||
297400784000
|
trusted library allocation
|
page read and write
|
||
36C00A01000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
2974006C4000
|
trusted library allocation
|
page read and write
|
||
8511000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
B0EC7FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
B0E07FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
36C029C4000
|
trusted library allocation
|
page read and write
|
||
36C02540000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DA1C0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
3F50000
|
direct allocation
|
page read and write
|
||
B0F37FE000
|
unkown
|
page readonly
|
||
B0E47FE000
|
unkown
|
page readonly
|
||
29740078C000
|
trusted library allocation
|
page read and write
|
||
36C028FC000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
2000002C0000
|
trusted library allocation
|
page read and write
|
||
B0E1FFB000
|
stack
|
page read and write
|
||
36C030C8000
|
trusted library allocation
|
page read and write
|
||
B0EDFFE000
|
stack
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
B0D87FE000
|
unkown
|
page readonly
|
||
8271000
|
heap
|
page read and write
|
||
36C024F0000
|
trusted library allocation
|
page read and write
|
||
B0E87FE000
|
unkown
|
page readonly
|
||
7341000
|
heap
|
page read and write
|
||
8278000
|
heap
|
page read and write
|
||
1B0DD628000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
36C02B18000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8436000
|
heap
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
339F000
|
stack
|
page read and write
|
||
297400201000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B0CFFFE000
|
stack
|
page read and write
|
||
36C023F4000
|
trusted library allocation
|
page read and write
|
||
36C02540000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
2000002BC000
|
trusted library allocation
|
page read and write
|
||
297400430000
|
trusted library allocation
|
page read and write
|
||
2EDD000
|
stack
|
page read and write
|
||
8276000
|
heap
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
36C0260C000
|
trusted library allocation
|
page read and write
|
||
36C008C6000
|
trusted library allocation
|
page read and write
|
||
297400320000
|
trusted library allocation
|
page read and write
|
||
8071000
|
heap
|
page read and write
|
||
36C00001000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD608000
|
heap
|
page read and write
|
||
36C02CC8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C03070000
|
trusted library allocation
|
page read and write
|
||
B0F17FE000
|
unkown
|
page readonly
|
||
8271000
|
heap
|
page read and write
|
||
1360002A8000
|
direct allocation
|
page read and write
|
||
8274000
|
heap
|
page read and write
|
||
2000002B0000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
1B0DDC0C000
|
heap
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C02318000
|
trusted library allocation
|
page read and write
|
||
36C00C01000
|
trusted library allocation
|
page read and write
|
||
29740035C000
|
trusted library allocation
|
page read and write
|
||
2974002D4000
|
trusted library allocation
|
page read and write
|
||
200000250000
|
trusted library allocation
|
page read and write
|
||
1B0DA042000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
36C0236C000
|
trusted library allocation
|
page read and write
|
||
36C024C4000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0DBFFE000
|
stack
|
page read and write
|
||
36C00678000
|
trusted library allocation
|
page read and write
|
||
B0F77FE000
|
unkown
|
page readonly
|
||
8340000
|
heap
|
page read and write
|
||
B0D7FFB000
|
stack
|
page read and write
|
||
8274000
|
heap
|
page read and write
|
||
B0D57FE000
|
unkown
|
page readonly
|
||
2000002C0000
|
trusted library allocation
|
page read and write
|
||
29740033C000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
29740069C000
|
trusted library allocation
|
page read and write
|
||
8398000
|
heap
|
page read and write
|
||
853F000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02D68000
|
trusted library allocation
|
page read and write
|
||
B0E6FFB000
|
stack
|
page read and write
|
||
36C02D84000
|
trusted library allocation
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
1B0DA250000
|
heap
|
page read and write
|
||
136000230000
|
direct allocation
|
page read and write
|
||
36C02E78000
|
trusted library allocation
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C02BBC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0F7FFA000
|
stack
|
page read and write
|
||
B0D6FFD000
|
stack
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B0ED7FE000
|
unkown
|
page readonly
|
||
1B0DD5D0000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1B0DD60A000
|
heap
|
page read and write
|
||
36C03018000
|
trusted library allocation
|
page read and write
|
||
1B0DD604000
|
heap
|
page read and write
|
||
36C0287C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02CCC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
8274000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
36C0298A000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
36C00D2E000
|
trusted library allocation
|
page read and write
|
||
859F000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
36C03068000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
2194000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
36C02B24000
|
trusted library allocation
|
page read and write
|
||
36C02C4C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0D9F80000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
B0DFFFE000
|
stack
|
page read and write
|
||
36C02618000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DD5F0000
|
heap
|
page read and write
|
||
136000294000
|
direct allocation
|
page read and write
|
||
2974006CC000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02A0C000
|
trusted library allocation
|
page read and write
|
||
36C02888000
|
trusted library allocation
|
page read and write
|
||
1B0D9FA8000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
83C3000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C028A0000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
83BD000
|
heap
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
B0F27FE000
|
unkown
|
page readonly
|
||
297400754000
|
trusted library allocation
|
page read and write
|
||
297400700000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
36C01001000
|
trusted library allocation
|
page read and write
|
||
36C02274000
|
trusted library allocation
|
page read and write
|
||
8376000
|
heap
|
page read and write
|
||
B0D47FE000
|
unkown
|
page readonly
|
||
1B0DC780000
|
unkown
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
1B0DA170000
|
heap
|
page read and write
|
||
297400330000
|
trusted library allocation
|
page read and write
|
||
2194000
|
heap
|
page read and write
|
||
36C023B4000
|
trusted library allocation
|
page read and write
|
||
B0DDFFE000
|
stack
|
page read and write
|
||
842A000
|
heap
|
page read and write
|
||
8303000
|
heap
|
page read and write
|
||
B0EB7FE000
|
unkown
|
page readonly
|
||
1B0DD604000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
297400288000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
B0DAFFE000
|
stack
|
page read and write
|
||
1B0E000F000
|
heap
|
page read and write
|
||
36C02E01000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
836C000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400644000
|
trusted library allocation
|
page read and write
|
||
36C022A8000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
36C02E0C000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B0DA7FE000
|
unkown
|
page readonly
|
||
B41000
|
unkown
|
page execute read
|
||
36C02D98000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C024A4000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
2974007C8000
|
trusted library allocation
|
page read and write
|
||
36C024A8000
|
trusted library allocation
|
page read and write
|
||
297400310000
|
trusted library allocation
|
page read and write
|
||
8324000
|
heap
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0EBFFE000
|
stack
|
page read and write
|
||
36C0300C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
B0E57FE000
|
unkown
|
page readonly
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
2974006B8000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
unkown
|
page readonly
|
||
36C022E0000
|
trusted library allocation
|
page read and write
|
||
200000274000
|
trusted library allocation
|
page read and write
|
||
200000264000
|
trusted library allocation
|
page read and write
|
||
B0D4FFB000
|
stack
|
page read and write
|
||
136000215000
|
direct allocation
|
page read and write
|
||
297400408000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
B51000
|
unkown
|
page readonly
|
||
297400654000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02F18000
|
trusted library allocation
|
page read and write
|
||
36C02868000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
B0E97FE000
|
unkown
|
page readonly
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
297400418000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C022D0000
|
trusted library allocation
|
page read and write
|
||
36C00201000
|
trusted library allocation
|
page read and write
|
||
2000002A0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
B0F67FE000
|
unkown
|
page readonly
|
||
B41000
|
unkown
|
page execute read
|
||
83EA000
|
heap
|
page read and write
|
||
36C02EA8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
219C000
|
heap
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
B0F5FFE000
|
stack
|
page read and write
|
||
B0D9FFE000
|
stack
|
page read and write
|
||
B0F3FFB000
|
stack
|
page read and write
|
||
36C02520000
|
trusted library allocation
|
page read and write
|
||
29740039C000
|
trusted library allocation
|
page read and write
|
||
36C02428000
|
trusted library allocation
|
page read and write
|
||
36C02DBC000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
7A30000
|
direct allocation
|
page execute and read and write
|
||
83CE000
|
heap
|
page read and write
|
||
1B0DDC7F000
|
heap
|
page read and write
|
||
1B0DD5F8000
|
heap
|
page read and write
|
||
827A000
|
heap
|
page read and write
|
||
13600024C000
|
direct allocation
|
page read and write
|
||
99C000
|
stack
|
page read and write
|
||
1B0DFFB2000
|
heap
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
36C02894000
|
trusted library allocation
|
page read and write
|
||
36C028B8000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02CB8000
|
trusted library allocation
|
page read and write
|
||
B0FB7FE000
|
unkown
|
page readonly
|
||
1B0DD609000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C026A8000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
unkown
|
page read and write
|
||
B0D2FFD000
|
stack
|
page read and write
|
||
36C02574000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page execute read
|
||
1B0DD609000
|
heap
|
page read and write
|
||
839F000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
297400354000
|
trusted library allocation
|
page read and write
|
||
B0F9FFC000
|
stack
|
page read and write
|
||
297400760000
|
trusted library allocation
|
page read and write
|
||
36C02F68000
|
trusted library allocation
|
page read and write
|
||
36C024D0000
|
trusted library allocation
|
page read and write
|
||
36C02A58000
|
trusted library allocation
|
page read and write
|
||
36C02BAC000
|
trusted library allocation
|
page read and write
|
||
1B0E38D3000
|
heap
|
page read and write
|
||
8401000
|
heap
|
page read and write
|
||
297400730000
|
trusted library allocation
|
page read and write
|
||
B0FC7FE000
|
unkown
|
page readonly
|
||
297400230000
|
trusted library allocation
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
36C02BA0000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C030B0000
|
trusted library allocation
|
page read and write
|
||
136000220000
|
direct allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
8277000
|
heap
|
page read and write
|
||
2974006FC000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
36C023AC000
|
trusted library allocation
|
page read and write
|
||
36C02A78000
|
trusted library allocation
|
page read and write
|
||
B0DD7FE000
|
unkown
|
page readonly
|
||
1010000
|
heap
|
page read and write
|
||
36C024A4000
|
trusted library allocation
|
page read and write
|
||
36C0260F000
|
trusted library allocation
|
page read and write
|
||
36C0241C000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DA090000
|
heap
|
page read and write
|
||
1B0DD5FC000
|
heap
|
page read and write
|
||
36C024B4000
|
trusted library allocation
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
36C026BC000
|
trusted library allocation
|
page read and write
|
||
B0D0FFE000
|
stack
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
36C00DCC000
|
trusted library allocation
|
page read and write
|
||
36C02424000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
36C02520000
|
trusted library allocation
|
page read and write
|
||
2974007D0000
|
trusted library allocation
|
page read and write
|
||
36C024C4000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0DD5EB000
|
heap
|
page read and write
|
||
136000201000
|
direct allocation
|
page read and write
|
||
B0D27FE000
|
unkown
|
page readonly
|
||
1B0DD5E6000
|
heap
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
1B0E1AB4000
|
trusted library allocation
|
page read and write
|
||
297400698000
|
trusted library allocation
|
page read and write
|
||
1B0DD609000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
2974003EC000
|
trusted library allocation
|
page read and write
|
||
141A000
|
unkown
|
page write copy
|
||
2974006E8000
|
trusted library allocation
|
page read and write
|
||
1B0DD5FE000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page write copy
|
There are 1345 hidden memdumps, click here to show them.