Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1fgVMJOnF0.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1fgVMJOnF0.exe_4b23ec8207bd5196ba4b19a9356d6da698c89_145c913c_162c9f71-861f-4a7f-9fd2-fd99b81f2aa9\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB461.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:32:46 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA8D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBADC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1fgVMJOnF0.exe
|
"C:\Users\user\Desktop\1fgVMJOnF0.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2292,i,6432418105620109786,16203351336791091311,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1232
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/5658nt
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/6141m
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
https://chrome.google.com/webstore?hl=enR1
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://anglebug.com/7369l
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
https://anglebug.com/7369G
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
http://anglebug.com/7761seed
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.132
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
ProgramId
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
FileId
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
LowerCaseLongPath
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
LongPathHash
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Name
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
OriginalFileName
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Publisher
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Version
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
BinFileVersion
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
BinaryType
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
ProductName
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
ProductVersion
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
LinkDate
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
BinProductVersion
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
AppxPackageFullName
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Size
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Language
|
||
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
478800BC4000
|
trusted library allocation
|
page read and write
|
||
6C10006AC000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
63ED1FE000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800490000
|
trusted library allocation
|
page read and write
|
||
478800001000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
stack
|
page read and write
|
||
4788001BC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA3D15000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
185000278000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6381FFE000
|
unkown
|
page readonly
|
||
478800FA4000
|
trusted library allocation
|
page read and write
|
||
478800E34000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
478800FB4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
478800700000
|
trusted library allocation
|
page read and write
|
||
7597000
|
heap
|
page read and write
|
||
478800D8C000
|
trusted library allocation
|
page read and write
|
||
478800F14000
|
trusted library allocation
|
page read and write
|
||
1850002E4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
6C1000368000
|
trusted library allocation
|
page read and write
|
||
478800DE8000
|
trusted library allocation
|
page read and write
|
||
63EA1EF000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A000250000
|
direct allocation
|
page read and write
|
||
4788006E8000
|
trusted library allocation
|
page read and write
|
||
63FE1FE000
|
stack
|
page read and write
|
||
478800594000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800CE4000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788002EB000
|
trusted library allocation
|
page read and write
|
||
47880015C000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
7A000234000
|
direct allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800959000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000354000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CADD16000
|
trusted library section
|
page read and write
|
||
478800F7C000
|
trusted library allocation
|
page read and write
|
||
478800384000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
6C1000624000
|
trusted library allocation
|
page read and write
|
||
76C4000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA750C000
|
heap
|
page read and write
|
||
24CA753E000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C10002FC000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
24CAB567000
|
unclassified section
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A000217000
|
direct allocation
|
page read and write
|
||
4788001E0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA3A60000
|
trusted library section
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
76DB000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800CF4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
185000260000
|
trusted library allocation
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
6C100035C000
|
trusted library allocation
|
page read and write
|
||
47880041C000
|
trusted library allocation
|
page read and write
|
||
63FD9FE000
|
unkown
|
page readonly
|
||
6C1000310000
|
trusted library allocation
|
page read and write
|
||
638AFFE000
|
unkown
|
page readonly
|
||
24CA3D10000
|
heap
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
6C1000404000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800624000
|
trusted library allocation
|
page read and write
|
||
47880004D000
|
trusted library allocation
|
page read and write
|
||
478800EA0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000288000
|
trusted library allocation
|
page read and write
|
||
1AF7000
|
heap
|
page read and write
|
||
47880100C000
|
trusted library allocation
|
page read and write
|
||
742F000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
638DFFE000
|
unkown
|
page readonly
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
24CADDB0000
|
trusted library section
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
24CA74D1000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
7622000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000720000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
unkown
|
page write copy
|
||
24CA74F2000
|
heap
|
page read and write
|
||
47880042C000
|
trusted library allocation
|
page read and write
|
||
638E7FD000
|
stack
|
page read and write
|
||
63887FD000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
6C10002F0000
|
trusted library allocation
|
page read and write
|
||
478800D78000
|
trusted library allocation
|
page read and write
|
||
4788001A4000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
24CA7542000
|
heap
|
page read and write
|
||
7CF8000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63F29FE000
|
unkown
|
page readonly
|
||
478800FA4000
|
trusted library allocation
|
page read and write
|
||
6390FFE000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
24CA703A000
|
heap
|
page read and write
|
||
478800234000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
7A000294000
|
direct allocation
|
page read and write
|
||
478800BE4000
|
trusted library allocation
|
page read and write
|
||
47880060C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
762B000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
7A000230000
|
direct allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CADBF0000
|
trusted library section
|
page read and write
|
||
63807FB000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788001F0000
|
trusted library allocation
|
page read and write
|
||
478800348000
|
trusted library allocation
|
page read and write
|
||
24CAB510000
|
heap
|
page read and write
|
||
478800EE8000
|
trusted library allocation
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
24CAD520000
|
trusted library section
|
page read and write
|
||
638B7FE000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAD420000
|
trusted library section
|
page read and write
|
||
6C1000320000
|
trusted library allocation
|
page read and write
|
||
6C1000684000
|
trusted library allocation
|
page read and write
|
||
478800A0C000
|
trusted library allocation
|
page read and write
|
||
24CA39E0000
|
heap
|
page read and write
|
||
478800074000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
478800FB4000
|
trusted library allocation
|
page read and write
|
||
478800124000
|
trusted library allocation
|
page read and write
|
||
24CA74C1000
|
heap
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
478800320000
|
trusted library allocation
|
page read and write
|
||
6383FFE000
|
unkown
|
page readonly
|
||
4788000EC000
|
trusted library allocation
|
page read and write
|
||
478800104000
|
trusted library allocation
|
page read and write
|
||
4788002F8000
|
trusted library allocation
|
page read and write
|
||
47880020C000
|
trusted library allocation
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
75E0000
|
direct allocation
|
page read and write
|
||
4788002CC000
|
trusted library allocation
|
page read and write
|
||
638D7FD000
|
stack
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
6398FFE000
|
unkown
|
page readonly
|
||
24CAB780000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
478800E1D000
|
trusted library allocation
|
page read and write
|
||
6C100060C000
|
trusted library allocation
|
page read and write
|
||
7CFA000
|
heap
|
page read and write
|
||
478800D04000
|
trusted library allocation
|
page read and write
|
||
24CA7035000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAB997000
|
unclassified section
|
page read and write
|
||
6C10006FC000
|
trusted library allocation
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7CF9000
|
heap
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
63977FE000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800184000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
6B81000
|
heap
|
page read and write
|
||
6C100033C000
|
trusted library allocation
|
page read and write
|
||
478800AB4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788005CC000
|
trusted library allocation
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
185000274000
|
trusted library allocation
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
478800E70000
|
trusted library allocation
|
page read and write
|
||
478801298000
|
trusted library allocation
|
page read and write
|
||
7626000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800448000
|
trusted library allocation
|
page read and write
|
||
1850002F0000
|
trusted library allocation
|
page read and write
|
||
478800C70000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800240000
|
trusted library allocation
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800A6C000
|
trusted library allocation
|
page read and write
|
||
24CAD272000
|
trusted library section
|
page read and write
|
||
478800F08000
|
trusted library allocation
|
page read and write
|
||
478800314000
|
trusted library allocation
|
page read and write
|
||
6391FFE000
|
unkown
|
page readonly
|
||
63847FD000
|
stack
|
page read and write
|
||
4788002D4000
|
trusted library allocation
|
page read and write
|
||
478800670000
|
trusted library allocation
|
page read and write
|
||
478800850000
|
trusted library allocation
|
page read and write
|
||
63FC9FE000
|
unkown
|
page readonly
|
||
1B04000
|
heap
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
478800B94000
|
trusted library allocation
|
page read and write
|
||
80BD000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788004B0000
|
trusted library allocation
|
page read and write
|
||
478800238000
|
trusted library allocation
|
page read and write
|
||
24CA750C000
|
heap
|
page read and write
|
||
63987FE000
|
stack
|
page read and write
|
||
478800B9C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1B14000
|
heap
|
page read and write
|
||
6C1000620000
|
trusted library allocation
|
page read and write
|
||
47880114C000
|
trusted library allocation
|
page read and write
|
||
63957FA000
|
stack
|
page read and write
|
||
24CADD70000
|
trusted library section
|
page read and write
|
||
4788000F8000
|
trusted library allocation
|
page read and write
|
||
7CF6000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
9D1000
|
unkown
|
page execute and write copy
|
||
B9A000
|
unkown
|
page readonly
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
6C10002EE000
|
trusted library allocation
|
page read and write
|
||
478800334000
|
trusted library allocation
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
B9E000
|
unkown
|
page read and write
|
||
4788009C8000
|
trusted library allocation
|
page read and write
|
||
478800218000
|
trusted library allocation
|
page read and write
|
||
478800C84000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
762F000
|
heap
|
page read and write
|
||
6C10007CC000
|
trusted library allocation
|
page read and write
|
||
478800168000
|
trusted library allocation
|
page read and write
|
||
24CA7040000
|
heap
|
page read and write
|
||
4788002BC000
|
trusted library allocation
|
page read and write
|
||
6C100078C000
|
trusted library allocation
|
page read and write
|
||
6C10002B8000
|
trusted library allocation
|
page read and write
|
||
478800201000
|
trusted library allocation
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page read and write
|
||
24CA3B4B000
|
heap
|
page read and write
|
||
24CADD3D000
|
trusted library section
|
page read and write
|
||
6C1000418000
|
trusted library allocation
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
638CFFE000
|
unkown
|
page readonly
|
||
6C1000770000
|
trusted library allocation
|
page read and write
|
||
7621000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800210000
|
trusted library allocation
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
7621000
|
heap
|
page read and write
|
||
7CF5000
|
heap
|
page read and write
|
||
478800490000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800FF8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
76C9000
|
heap
|
page read and write
|
||
478800C1C000
|
trusted library allocation
|
page read and write
|
||
478800BE4000
|
trusted library allocation
|
page read and write
|
||
4788002A0000
|
trusted library allocation
|
page read and write
|
||
478800384000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
3E0000
|
heap
|
page read and write
|
||
47880120C000
|
trusted library allocation
|
page read and write
|
||
478800314000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800F40000
|
trusted library allocation
|
page read and write
|
||
6C1000430000
|
trusted library allocation
|
page read and write
|
||
24CA7029000
|
heap
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788008C4000
|
trusted library allocation
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
478800654000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800174000
|
trusted library allocation
|
page read and write
|
||
7620000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
24CA74F6000
|
heap
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
4788004D0000
|
trusted library allocation
|
page read and write
|
||
185000288000
|
trusted library allocation
|
page read and write
|
||
4788008D8000
|
trusted library allocation
|
page read and write
|
||
478800FD4000
|
trusted library allocation
|
page read and write
|
||
47880078C000
|
trusted library allocation
|
page read and write
|
||
24CA7546000
|
heap
|
page read and write
|
||
24CA7544000
|
heap
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAD172000
|
trusted library section
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800B04000
|
trusted library allocation
|
page read and write
|
||
6392FFE000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
63F99FE000
|
unkown
|
page readonly
|
||
478801294000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C10002CC000
|
trusted library allocation
|
page read and write
|
||
6384FFE000
|
unkown
|
page readonly
|
||
4788010B0000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
6C10002C4000
|
trusted library allocation
|
page read and write
|
||
478800439000
|
trusted library allocation
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
24CAD27D000
|
trusted library section
|
page read and write
|
||
7280000
|
direct allocation
|
page execute and read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1850002D8000
|
trusted library allocation
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63817FD000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A00024C000
|
direct allocation
|
page read and write
|
||
47880005F000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800C9C000
|
trusted library allocation
|
page read and write
|
||
6C1000374000
|
trusted library allocation
|
page read and write
|
||
478800FC4000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
185000250000
|
trusted library allocation
|
page read and write
|
||
6C1000730000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA39C0000
|
heap
|
page readonly
|
||
47880116C000
|
trusted library allocation
|
page read and write
|
||
24CA750C000
|
heap
|
page read and write
|
||
6C10006EC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800228000
|
trusted library allocation
|
page read and write
|
||
478800044000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000744000
|
trusted library allocation
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
478800750000
|
trusted library allocation
|
page read and write
|
||
6C100075C000
|
trusted library allocation
|
page read and write
|
||
478800924000
|
trusted library allocation
|
page read and write
|
||
6C1000238000
|
trusted library allocation
|
page read and write
|
||
7A0002EC000
|
direct allocation
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
7626000
|
heap
|
page read and write
|
||
7A000290000
|
direct allocation
|
page read and write
|
||
63837FC000
|
stack
|
page read and write
|
||
63967FC000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788006DE000
|
trusted library allocation
|
page read and write
|
||
24CAB7DB000
|
heap
|
page read and write
|
||
7270000
|
direct allocation
|
page execute and read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6C1000330000
|
trusted library allocation
|
page read and write
|
||
478800B94000
|
trusted library allocation
|
page read and write
|
||
7A00025C000
|
direct allocation
|
page read and write
|
||
4788001BC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA751B000
|
heap
|
page read and write
|
||
7CF6000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000694000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
1ADB000
|
heap
|
page read and write
|
||
4788010DC000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
6C1000700000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6393FFE000
|
unkown
|
page readonly
|
||
478800320000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
47880040C000
|
trusted library allocation
|
page read and write
|
||
6C1000648000
|
trusted library allocation
|
page read and write
|
||
6C1000348000
|
trusted library allocation
|
page read and write
|
||
47880076A000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7620000
|
heap
|
page read and write
|
||
7620000
|
heap
|
page read and write
|
||
478800A01000
|
trusted library allocation
|
page read and write
|
||
6388FFE000
|
unkown
|
page readonly
|
||
984000
|
heap
|
page read and write
|
||
478800C74000
|
trusted library allocation
|
page read and write
|
||
478801264000
|
trusted library allocation
|
page read and write
|
||
638F7FE000
|
stack
|
page read and write
|
||
6C100025C000
|
trusted library allocation
|
page read and write
|
||
478800D64000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
6C1000320000
|
trusted library allocation
|
page read and write
|
||
478800D20000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A000220000
|
direct allocation
|
page read and write
|
||
478800C01000
|
trusted library allocation
|
page read and write
|
||
24CA750F000
|
heap
|
page read and write
|
||
478801278000
|
trusted library allocation
|
page read and write
|
||
4788001D8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800398000
|
trusted library allocation
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
478800374000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6C1000724000
|
trusted library allocation
|
page read and write
|
||
478800E54000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800401000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800FA4000
|
trusted library allocation
|
page read and write
|
||
6C1000368000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CADC73000
|
trusted library section
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6C1000320000
|
trusted library allocation
|
page read and write
|
||
24CA59A0000
|
heap
|
page read and write
|
||
63F11FB000
|
stack
|
page read and write
|
||
6C1000210000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000630000
|
trusted library allocation
|
page read and write
|
||
DA000
|
stack
|
page read and write
|
||
1AF2000
|
heap
|
page read and write
|
||
24CA754D000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6380FFE000
|
unkown
|
page readonly
|
||
478800FD4000
|
trusted library allocation
|
page read and write
|
||
7CF5000
|
heap
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
24CA73C0000
|
trusted library section
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000784000
|
trusted library allocation
|
page read and write
|
||
47880050C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800B94000
|
trusted library allocation
|
page read and write
|
||
478801264000
|
trusted library allocation
|
page read and write
|
||
47880089C000
|
trusted library allocation
|
page read and write
|
||
63937FE000
|
stack
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
24CAD437000
|
unclassified section
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
638FFFE000
|
unkown
|
page readonly
|
||
6C1000698000
|
trusted library allocation
|
page read and write
|
||
24CA702E000
|
heap
|
page read and write
|
||
47880020C000
|
trusted library allocation
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788001DC000
|
trusted library allocation
|
page read and write
|
||
63827FC000
|
stack
|
page read and write
|
||
478800584000
|
trusted library allocation
|
page read and write
|
||
4788010C0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788001BC000
|
trusted library allocation
|
page read and write
|
||
63EE1FE000
|
stack
|
page read and write
|
||
24CA7032000
|
heap
|
page read and write
|
||
6C1000734000
|
trusted library allocation
|
page read and write
|
||
1850002C0000
|
trusted library allocation
|
page read and write
|
||
185000230000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA7029000
|
heap
|
page read and write
|
||
478800FF8000
|
trusted library allocation
|
page read and write
|
||
7411000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
185000220000
|
trusted library allocation
|
page read and write
|
||
63F09FE000
|
unkown
|
page readonly
|
||
7CFD000
|
heap
|
page read and write
|
||
6C1000401000
|
trusted library allocation
|
page read and write
|
||
24CA74AF000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880028C000
|
trusted library allocation
|
page read and write
|
||
1850002BD000
|
trusted library allocation
|
page read and write
|
||
63F41FB000
|
stack
|
page read and write
|
||
24CA7033000
|
heap
|
page read and write
|
||
4788001C4000
|
trusted library allocation
|
page read and write
|
||
1AF3000
|
heap
|
page read and write
|
||
478800D30000
|
trusted library allocation
|
page read and write
|
||
4788001E8000
|
trusted library allocation
|
page read and write
|
||
24CAD2B0000
|
trusted library section
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
478800944000
|
trusted library allocation
|
page read and write
|
||
76C1000
|
heap
|
page read and write
|
||
478800CDC000
|
trusted library allocation
|
page read and write
|
||
63997FE000
|
stack
|
page read and write
|
||
638EFFE000
|
unkown
|
page readonly
|
||
1850002C0000
|
trusted library allocation
|
page read and write
|
||
63927FE000
|
stack
|
page read and write
|
||
63F79FE000
|
unkown
|
page readonly
|
||
4788000CC000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
478800858000
|
trusted library allocation
|
page read and write
|
||
478800770000
|
trusted library allocation
|
page read and write
|
||
4788001F4000
|
trusted library allocation
|
page read and write
|
||
478800DDC000
|
trusted library allocation
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C10002DC000
|
trusted library allocation
|
page read and write
|
||
4788007C0000
|
trusted library allocation
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
unkown
|
page write copy
|
||
478801094000
|
trusted library allocation
|
page read and write
|
||
24CA3A20000
|
trusted library allocation
|
page read and write
|
||
24CA3AB0000
|
heap
|
page read and write
|
||
478800CA0000
|
trusted library allocation
|
page read and write
|
||
6C10003EC000
|
trusted library allocation
|
page read and write
|
||
7628000
|
heap
|
page read and write
|
||
6C100080C000
|
trusted library allocation
|
page read and write
|
||
7626000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA3B17000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
478800734000
|
trusted library allocation
|
page read and write
|
||
478800904000
|
trusted library allocation
|
page read and write
|
||
63F81FE000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800530000
|
trusted library allocation
|
page read and write
|
||
18500020C000
|
trusted library allocation
|
page read and write
|
||
1AF7000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
774D000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
479000
|
heap
|
page read and write
|
||
4788002BC000
|
trusted library allocation
|
page read and write
|
||
24CAD720000
|
trusted library section
|
page read and write
|
||
6C100033C000
|
trusted library allocation
|
page read and write
|
||
478800A98000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6C10007E0000
|
trusted library allocation
|
page read and write
|
||
6C1000678000
|
trusted library allocation
|
page read and write
|
||
63FC1FA000
|
stack
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478801034000
|
trusted library allocation
|
page read and write
|
||
478800D64000
|
trusted library allocation
|
page read and write
|
||
478800D44000
|
trusted library allocation
|
page read and write
|
||
4788008B4000
|
trusted library allocation
|
page read and write
|
||
7CF7000
|
heap
|
page read and write
|
||
7A000280000
|
direct allocation
|
page read and write
|
||
478800801000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000248000
|
trusted library allocation
|
page read and write
|
||
6C1000601000
|
trusted library allocation
|
page read and write
|
||
4788001B0000
|
trusted library allocation
|
page read and write
|
||
7A00020C000
|
direct allocation
|
page read and write
|
||
478800FF8000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
24CA702E000
|
heap
|
page read and write
|
||
7621000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63ED9FE000
|
unkown
|
page readonly
|
||
3720000
|
direct allocation
|
page read and write
|
||
63FB1FD000
|
stack
|
page read and write
|
||
478800194000
|
trusted library allocation
|
page read and write
|
||
1850002A0000
|
trusted library allocation
|
page read and write
|
||
7010000
|
direct allocation
|
page read and write
|
||
478800ED0000
|
trusted library allocation
|
page read and write
|
||
24CA7460000
|
heap
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
478801054000
|
trusted library allocation
|
page read and write
|
||
4788002BC000
|
trusted library allocation
|
page read and write
|
||
4788000BC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A0002E4000
|
direct allocation
|
page read and write
|
||
478801178000
|
trusted library allocation
|
page read and write
|
||
478800CF4000
|
trusted library allocation
|
page read and write
|
||
63867FC000
|
stack
|
page read and write
|
||
24CA7040000
|
heap
|
page read and write
|
||
478800964000
|
trusted library allocation
|
page read and write
|
||
4788001BC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
76B4000
|
heap
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
4788004E8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
478800348000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
4788010A8000
|
trusted library allocation
|
page read and write
|
||
478800BD0000
|
trusted library allocation
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
1850002A0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000354000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA7530000
|
heap
|
page read and write
|
||
478800CC0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
478800F74000
|
trusted library allocation
|
page read and write
|
||
478800F4C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
7010000
|
direct allocation
|
page read and write
|
||
1850002C0000
|
trusted library allocation
|
page read and write
|
||
6C1000230000
|
trusted library allocation
|
page read and write
|
||
478801084000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7CF3000
|
heap
|
page read and write
|
||
478800AC8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800BBC000
|
trusted library allocation
|
page read and write
|
||
24CA7720000
|
trusted library section
|
page read and write
|
||
478800DB8000
|
trusted library allocation
|
page read and write
|
||
4788002B0000
|
trusted library allocation
|
page read and write
|
||
24CAD99E000
|
trusted library section
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800601000
|
trusted library allocation
|
page read and write
|
||
4788001C4000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
B9E000
|
unkown
|
page read and write
|
||
6C1000220000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
478800334000
|
trusted library allocation
|
page read and write
|
||
24CABEC0000
|
heap
|
page read and write
|
||
478800CB0000
|
trusted library allocation
|
page read and write
|
||
7A000303000
|
direct allocation
|
page read and write
|
||
63917FD000
|
stack
|
page read and write
|
||
6387FFE000
|
unkown
|
page readonly
|
||
6C100020C000
|
trusted library allocation
|
page read and write
|
||
7623000
|
heap
|
page read and write
|
||
24CA63F0000
|
unkown
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800E98000
|
trusted library allocation
|
page read and write
|
||
6C100040C000
|
trusted library allocation
|
page read and write
|
||
7746000
|
direct allocation
|
page read and write
|
||
24CAD990000
|
trusted library section
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
7A00026C000
|
direct allocation
|
page read and write
|
||
638A7FE000
|
stack
|
page read and write
|
||
6399FFE000
|
unkown
|
page readonly
|
||
4788004CC000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
478801034000
|
trusted library allocation
|
page read and write
|
||
478800220000
|
trusted library allocation
|
page read and write
|
||
24CADC02000
|
trusted library section
|
page read and write
|
||
24CA74F2000
|
heap
|
page read and write
|
||
47880013C000
|
trusted library allocation
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
1AF2000
|
heap
|
page read and write
|
||
1AF7000
|
heap
|
page read and write
|
||
6C100069C000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880001C000
|
trusted library allocation
|
page read and write
|
||
6C1000610000
|
trusted library allocation
|
page read and write
|
||
24CAB7C6000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7A0002D0000
|
direct allocation
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
63F71FB000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800614000
|
trusted library allocation
|
page read and write
|
||
24CAB537000
|
unclassified section
|
page read and write
|
||
47880106C000
|
trusted library allocation
|
page read and write
|
||
478800D24000
|
trusted library allocation
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
4788004A7000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880022C000
|
trusted library allocation
|
page read and write
|
||
6C1000364000
|
trusted library allocation
|
page read and write
|
||
63FE9FE000
|
unkown
|
page readonly
|
||
7707000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C100039C000
|
trusted library allocation
|
page read and write
|
||
478800490000
|
trusted library allocation
|
page read and write
|
||
7621000
|
heap
|
page read and write
|
||
478800490000
|
trusted library allocation
|
page read and write
|
||
762C000
|
heap
|
page read and write
|
||
478800EDC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800910000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C100035C000
|
trusted library allocation
|
page read and write
|
||
7ED6000
|
heap
|
page read and write
|
||
7020000
|
direct allocation
|
page read and write
|
||
478800088000
|
trusted library allocation
|
page read and write
|
||
478800F7C000
|
trusted library allocation
|
page read and write
|
||
478800224000
|
trusted library allocation
|
page read and write
|
||
4788011B0000
|
trusted library allocation
|
page read and write
|
||
24CA74C1000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
478800E8C000
|
trusted library allocation
|
page read and write
|
||
24CA703F000
|
heap
|
page read and write
|
||
478800EB8000
|
trusted library allocation
|
page read and write
|
||
63F91FE000
|
stack
|
page read and write
|
||
24CA702E000
|
heap
|
page read and write
|
||
478800990000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
7A0002A8000
|
direct allocation
|
page read and write
|
||
24CA74F2000
|
heap
|
page read and write
|
||
478800DD4000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
6382FFE000
|
unkown
|
page readonly
|
||
7A00023C000
|
direct allocation
|
page read and write
|
||
1AF2000
|
heap
|
page read and write
|
||
4788009B0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAB520000
|
trusted library allocation
|
page read and write
|
||
185000235000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
478800E44000
|
trusted library allocation
|
page read and write
|
||
24CADC61000
|
trusted library section
|
page read and write
|
||
478800EFC000
|
trusted library allocation
|
page read and write
|
||
6C10006E4000
|
trusted library allocation
|
page read and write
|
||
6C10006B8000
|
trusted library allocation
|
page read and write
|
||
24CA3B64000
|
heap
|
page read and write
|
||
24CA7470000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
6B81000
|
heap
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
7A000284000
|
direct allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
4788000AC000
|
trusted library allocation
|
page read and write
|
||
24CA3CC0000
|
heap
|
page read and write
|
||
4788002C8000
|
trusted library allocation
|
page read and write
|
||
638C7FB000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800348000
|
trusted library allocation
|
page read and write
|
||
478800A48000
|
trusted library allocation
|
page read and write
|
||
4788009E0000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
B90000
|
unkown
|
page readonly
|
||
24CA3B4F000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63877FC000
|
stack
|
page read and write
|
||
6C10006B4000
|
trusted library allocation
|
page read and write
|
||
1850002B0000
|
trusted library allocation
|
page read and write
|
||
478800CDC000
|
trusted library allocation
|
page read and write
|
||
478800B04000
|
trusted library allocation
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
1AE1000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
B9E000
|
unkown
|
page write copy
|
||
24CA38E0000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
6C10006E8000
|
trusted library allocation
|
page read and write
|
||
7CFA000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
478800490000
|
trusted library allocation
|
page read and write
|
||
4788002A5000
|
trusted library allocation
|
page read and write
|
||
24CA74FD000
|
heap
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
1850002C0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1492000
|
unkown
|
page execute and write copy
|
||
478800638000
|
trusted library allocation
|
page read and write
|
||
6C100027C000
|
trusted library allocation
|
page read and write
|
||
7620000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1AF2000
|
heap
|
page read and write
|
||
6C10002F4000
|
trusted library allocation
|
page read and write
|
||
1B08000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800FB4000
|
trusted library allocation
|
page read and write
|
||
478801018000
|
trusted library allocation
|
page read and write
|
||
24CAB513000
|
heap
|
page read and write
|
||
24CA7555000
|
heap
|
page read and write
|
||
478800C70000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA755C000
|
heap
|
page read and write
|
||
478800ECD000
|
trusted library allocation
|
page read and write
|
||
4788001F8000
|
trusted library allocation
|
page read and write
|
||
478800CDF000
|
trusted library allocation
|
page read and write
|
||
6C10006D4000
|
trusted library allocation
|
page read and write
|
||
24CA3A30000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
478800917000
|
trusted library allocation
|
page read and write
|
||
478800340000
|
trusted library allocation
|
page read and write
|
||
24CA7010000
|
heap
|
page read and write
|
||
76E0000
|
heap
|
page read and write
|
||
478800C2C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000330000
|
trusted library allocation
|
page read and write
|
||
478800F30000
|
trusted library allocation
|
page read and write
|
||
4788005B8000
|
trusted library allocation
|
page read and write
|
||
478800AE4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7624000
|
heap
|
page read and write
|
||
478800C70000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
478800868000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
478800C0C000
|
trusted library allocation
|
page read and write
|
||
6C1000320000
|
trusted library allocation
|
page read and write
|
||
6C1000658000
|
trusted library allocation
|
page read and write
|
||
63FF1FE000
|
stack
|
page read and write
|
||
63F01FD000
|
stack
|
page read and write
|
||
1850002A0000
|
trusted library allocation
|
page read and write
|
||
1850002C0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800705000
|
trusted library allocation
|
page read and write
|
||
478801188000
|
trusted library allocation
|
page read and write
|
||
6C1000754000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800E7C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000248000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800518000
|
trusted library allocation
|
page read and write
|
||
47880032C000
|
trusted library allocation
|
page read and write
|
||
4788004CC000
|
trusted library allocation
|
page read and write
|
||
478800214000
|
trusted library allocation
|
page read and write
|
||
1850002C8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000664000
|
trusted library allocation
|
page read and write
|
||
185000238000
|
trusted library allocation
|
page read and write
|
||
478800CDC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800DAC000
|
trusted library allocation
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CA7033000
|
heap
|
page read and write
|
||
762B000
|
heap
|
page read and write
|
||
478800CE4000
|
trusted library allocation
|
page read and write
|
||
63F39FE000
|
unkown
|
page readonly
|
||
1CF000
|
unkown
|
page read and write
|
||
478800C90000
|
trusted library allocation
|
page read and write
|
||
185000248000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788009BF000
|
trusted library allocation
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
4788001C4000
|
trusted library allocation
|
page read and write
|
||
7A000270000
|
direct allocation
|
page read and write
|
||
63907FD000
|
stack
|
page read and write
|
||
6C10006E0000
|
trusted library allocation
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
638BFFE000
|
unkown
|
page readonly
|
||
63EE9FE000
|
unkown
|
page readonly
|
||
478800384000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
4788011A8000
|
trusted library allocation
|
page read and write
|
||
24CADD32000
|
trusted library section
|
page read and write
|
||
1AF7000
|
heap
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800E85000
|
trusted library allocation
|
page read and write
|
||
7625000
|
heap
|
page read and write
|
||
478800348000
|
trusted library allocation
|
page read and write
|
||
24CA74EE000
|
heap
|
page read and write
|
||
4788007A0000
|
trusted library allocation
|
page read and write
|
||
478800780000
|
trusted library allocation
|
page read and write
|
||
478800D3C000
|
trusted library allocation
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
6C1000758000
|
trusted library allocation
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
478800058000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
478800E28000
|
trusted library allocation
|
page read and write
|
||
63EF1FE000
|
stack
|
page read and write
|
||
7626000
|
heap
|
page read and write
|
||
478800EDC000
|
trusted library allocation
|
page read and write
|
||
478800CDC000
|
trusted library allocation
|
page read and write
|
||
24CA74F5000
|
heap
|
page read and write
|
||
B9A000
|
unkown
|
page readonly
|
||
478801118000
|
trusted library allocation
|
page read and write
|
||
63FB9FE000
|
unkown
|
page readonly
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6B81000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
4788009EC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000310000
|
trusted library allocation
|
page read and write
|
||
63857FC000
|
stack
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
19A0000
|
heap
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CADBE1000
|
trusted library section
|
page read and write
|
||
478801084000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
762F000
|
heap
|
page read and write
|
||
24CAE090000
|
trusted library section
|
page read and write
|
||
478800BB4000
|
trusted library allocation
|
page read and write
|
||
185000201000
|
trusted library allocation
|
page read and write
|
||
1AF2000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
63897FB000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
63FA1FE000
|
stack
|
page read and write
|
||
63F21FA000
|
stack
|
page read and write
|
||
478800360000
|
trusted library allocation
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
4788008FC000
|
trusted library allocation
|
page read and write
|
||
762F000
|
heap
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
639B7FE000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
76E8000
|
heap
|
page read and write
|
||
47880113C000
|
trusted library allocation
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
4788007AC000
|
trusted library allocation
|
page read and write
|
||
24CA750B000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
7621000
|
heap
|
page read and write
|
||
7CF3000
|
heap
|
page read and write
|
||
24CAB9C2000
|
trusted library allocation
|
page read and write
|
||
478801110000
|
trusted library allocation
|
page read and write
|
||
6C10007C8000
|
trusted library allocation
|
page read and write
|
||
6C1000750000
|
trusted library allocation
|
page read and write
|
||
6389FFE000
|
unkown
|
page readonly
|
||
6B81000
|
heap
|
page read and write
|
||
478800ED0000
|
trusted library allocation
|
page read and write
|
||
1AF7000
|
heap
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
478800E01000
|
trusted library allocation
|
page read and write
|
||
762D000
|
heap
|
page read and write
|
||
478800C74000
|
trusted library allocation
|
page read and write
|
||
6C10006F0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000390000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
63EC1FE000
|
stack
|
page read and write
|
||
24CA7560000
|
trusted library section
|
page read and write
|
||
478800FA8000
|
trusted library allocation
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880126C000
|
trusted library allocation
|
page read and write
|
||
7CF8000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800765000
|
trusted library allocation
|
page read and write
|
||
24CA3AB8000
|
heap
|
page read and write
|
||
4788004D8000
|
trusted library allocation
|
page read and write
|
||
478800F4C000
|
trusted library allocation
|
page read and write
|
||
6C1000760000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
185000294000
|
trusted library allocation
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
478800D10000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
24CADC50000
|
trusted library section
|
page read and write
|
||
1AE1000
|
heap
|
page read and write
|
||
478800DA4000
|
trusted library allocation
|
page read and write
|
||
63EB1FF000
|
unkown
|
page read and write
|
||
6397FFE000
|
unkown
|
page readonly
|
||
6C10007D0000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7706000
|
heap
|
page read and write
|
||
63F69FE000
|
unkown
|
page readonly
|
||
6C1000688000
|
trusted library allocation
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
4788002B0000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
1AE6000
|
heap
|
page read and write
|
||
24CA74C8000
|
heap
|
page read and write
|
||
47880014C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880021C000
|
trusted library allocation
|
page read and write
|
||
478800728000
|
trusted library allocation
|
page read and write
|
||
478800D98000
|
trusted library allocation
|
page read and write
|
||
63947FE000
|
stack
|
page read and write
|
||
24CAD1D3000
|
trusted library section
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
639BFFE000
|
unkown
|
page readonly
|
||
1AF2000
|
heap
|
page read and write
|
||
478800775000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
unkown
|
page readonly
|
||
9E0000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
1AE2000
|
heap
|
page read and write
|
||
7EEE000
|
heap
|
page read and write
|
||
478800368000
|
trusted library allocation
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
4788005E0000
|
trusted library allocation
|
page read and write
|
||
7628000
|
heap
|
page read and write
|
||
63FD1FE000
|
stack
|
page read and write
|
||
478800D6C000
|
trusted library allocation
|
page read and write
|
||
6386FFE000
|
unkown
|
page readonly
|
||
7CFE000
|
heap
|
page read and write
|
||
478800384000
|
trusted library allocation
|
page read and write
|
||
7CF9000
|
heap
|
page read and write
|
||
478800494000
|
trusted library allocation
|
page read and write
|
||
478800F1C000
|
trusted library allocation
|
page read and write
|
||
7290000
|
direct allocation
|
page execute and read and write
|
||
4788002A7000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
478800BE0000
|
trusted library allocation
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
6C10006C8000
|
trusted library allocation
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
1850002F4000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
6B81000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
6C10002EC000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800A38000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63F31FE000
|
stack
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6C1000668000
|
trusted library allocation
|
page read and write
|
||
24CA59A3000
|
heap
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
7CF9000
|
heap
|
page read and write
|
||
4788002AC000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
unkown
|
page write copy
|
||
7CFD000
|
heap
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
478800BE4000
|
trusted library allocation
|
page read and write
|
||
4788006F4000
|
trusted library allocation
|
page read and write
|
||
6C1000201000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAD216000
|
trusted library section
|
page read and write
|
||
4788001EC000
|
trusted library allocation
|
page read and write
|
||
7744000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6C10006CC000
|
trusted library allocation
|
page read and write
|
||
24CA703A000
|
heap
|
page read and write
|
||
7629000
|
heap
|
page read and write
|
||
63F89FE000
|
unkown
|
page readonly
|
||
7A000210000
|
direct allocation
|
page read and write
|
||
7CF7000
|
heap
|
page read and write
|
||
24CA7000000
|
heap
|
page read and write
|
||
478800915000
|
trusted library allocation
|
page read and write
|
||
4788007E0000
|
trusted library allocation
|
page read and write
|
||
6C1000704000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
478800E54000
|
trusted library allocation
|
page read and write
|
||
478800CD0000
|
trusted library allocation
|
page read and write
|
||
478800448000
|
trusted library allocation
|
page read and write
|
||
6C1000330000
|
trusted library allocation
|
page read and write
|
||
24CA7512000
|
heap
|
page read and write
|
||
A8C000
|
stack
|
page read and write
|
||
4788001D4000
|
trusted library allocation
|
page read and write
|
||
7A000201000
|
direct allocation
|
page read and write
|
||
24CA74F2000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
4788003AC000
|
trusted library allocation
|
page read and write
|
||
6C1000640000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
770B000
|
heap
|
page read and write
|
||
47880081C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478801001000
|
trusted library allocation
|
page read and write
|
||
63F59FE000
|
unkown
|
page readonly
|
||
63F61FC000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478801120000
|
trusted library allocation
|
page read and write
|
||
6C10006B0000
|
trusted library allocation
|
page read and write
|
||
185000270000
|
trusted library allocation
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
4788006C0000
|
trusted library allocation
|
page read and write
|
||
63EF9FE000
|
unkown
|
page readonly
|
||
1850002F8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C10006C4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
B9E000
|
unkown
|
page read and write
|
||
478800FB4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
63F51FB000
|
stack
|
page read and write
|
||
478800974000
|
trusted library allocation
|
page read and write
|
||
24CA7032000
|
heap
|
page read and write
|
||
7CF5000
|
heap
|
page read and write
|
||
7A0002AC000
|
direct allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
24CAD17E000
|
trusted library section
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
7A0002DC000
|
direct allocation
|
page read and write
|
||
185000264000
|
trusted library allocation
|
page read and write
|
||
478801050000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880040C000
|
trusted library allocation
|
page read and write
|
||
63F19FE000
|
unkown
|
page readonly
|
||
24CA3B7C000
|
heap
|
page read and write
|
||
18E000
|
unkown
|
page read and write
|
||
63FF9FE000
|
unkown
|
page readonly
|
||
7483000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478801201000
|
trusted library allocation
|
page read and write
|
||
6395FFE000
|
unkown
|
page readonly
|
||
478800230000
|
trusted library allocation
|
page read and write
|
||
4788004A4000
|
trusted library allocation
|
page read and write
|
||
478800CE4000
|
trusted library allocation
|
page read and write
|
||
47880129C000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
478800E64000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C1000408000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6C10006D0000
|
trusted library allocation
|
page read and write
|
||
1850002B0000
|
trusted library allocation
|
page read and write
|
||
478800F5C000
|
trusted library allocation
|
page read and write
|
||
478801284000
|
trusted library allocation
|
page read and write
|
||
48C000
|
heap
|
page read and write
|
||
6C1000250000
|
trusted library allocation
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
24CA7540000
|
heap
|
page read and write
|
||
6396FFE000
|
unkown
|
page readonly
|
||
24CA3B6A000
|
heap
|
page read and write
|
||
6C10007B4000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
24CA7032000
|
heap
|
page read and write
|
||
7AF1000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
4788006D8000
|
trusted library allocation
|
page read and write
|
||
762B000
|
heap
|
page read and write
|
||
47880102C000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
478800718000
|
trusted library allocation
|
page read and write
|
||
24CADC0E000
|
trusted library section
|
page read and write
|
||
24CA7535000
|
heap
|
page read and write
|
||
7A000215000
|
direct allocation
|
page read and write
|
||
478800D50000
|
trusted library allocation
|
page read and write
|
||
4788005A4000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
7625000
|
heap
|
page read and write
|
||
24CAD160000
|
trusted library section
|
page read and write
|
||
6C10002B0000
|
trusted library allocation
|
page read and write
|
||
478800660000
|
trusted library allocation
|
page read and write
|
||
6C1000380000
|
trusted library allocation
|
page read and write
|
||
24CADC40000
|
trusted library section
|
page read and write
|
||
4788002F8000
|
trusted library allocation
|
page read and write
|
||
24CADDBE000
|
trusted library section
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
478800308000
|
trusted library allocation
|
page read and write
|
||
762D000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880000C000
|
trusted library allocation
|
page read and write
|
||
478800354000
|
trusted library allocation
|
page read and write
|
||
4788002E8000
|
trusted library allocation
|
page read and write
|
||
4788002D8000
|
trusted library allocation
|
page read and write
|
||
478801060000
|
trusted library allocation
|
page read and write
|
||
75EA000
|
heap
|
page read and write
|
||
24CADB97000
|
unclassified section
|
page read and write
|
||
478800AA8000
|
trusted library allocation
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
24CAB799000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
75E0000
|
heap
|
page read and write
|
||
47880070C000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6C1000714000
|
trusted library allocation
|
page read and write
|
||
24CADBD0000
|
trusted library section
|
page read and write
|
||
478800EAC000
|
trusted library allocation
|
page read and write
|
||
6C1000644000
|
trusted library allocation
|
page read and write
|
||
478800E0C000
|
trusted library allocation
|
page read and write
|
||
24CA3A00000
|
heap
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
6B81000
|
heap
|
page read and write
|
||
47880023C000
|
trusted library allocation
|
page read and write
|
||
478800A20000
|
trusted library allocation
|
page read and write
|
||
478801044000
|
trusted library allocation
|
page read and write
|
||
478800448000
|
trusted library allocation
|
page read and write
|
||
47880080C000
|
trusted library allocation
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
6394FFE000
|
unkown
|
page readonly
|
||
24CA74F6000
|
heap
|
page read and write
|
||
1AE9000
|
heap
|
page read and write
|
||
B9E000
|
unkown
|
page write copy
|
||
63FA9FE000
|
unkown
|
page readonly
|
||
4788006A0000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
3720000
|
direct allocation
|
page read and write
|
||
1850002A0000
|
trusted library allocation
|
page read and write
|
||
1850002BC000
|
trusted library allocation
|
page read and write
|
||
6385FFE000
|
unkown
|
page readonly
|
||
6C1000424000
|
trusted library allocation
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
6C1000788000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
6C1000614000
|
trusted library allocation
|
page read and write
|
||
63F49FE000
|
unkown
|
page readonly
|
There are 1265 hidden memdumps, click here to show them.