Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
mPQW1NB2Px.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mPQW1NB2Px.exe_fe6ab0bc1a9e1537554667f42a75d5f58a55b3_d63839fe_77fd3ec4-57b5-45ba-ae07-e00e6663ed3e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB38.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:33:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD089.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD145.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\mPQW1NB2Px.exe
|
"C:\Users\user\Desktop\mPQW1NB2Px.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2544 --field-trial-handle=2332,i,10596624105070430740,12121365275626674710,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7296 -s 1396
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/34524
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
http://anglebug.com/7724;
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
http://anglebug.com/6876=
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://anglebug.com/7761e-data
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
http://anglebug.com/4836h
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
http://anglebug.com/4324m64/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://unisolated.invalid/x
|
unknown
|
||
http://anglebug.com/4551%
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://drive-daily-5.corp.go
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.132
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
ProgramId
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
FileId
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
LowerCaseLongPath
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
LongPathHash
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Name
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
OriginalFileName
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Publisher
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Version
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
BinFileVersion
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
BinaryType
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
ProductName
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
ProductVersion
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
LinkDate
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
BinProductVersion
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
AppxPackageFullName
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Size
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Language
|
||
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
606C02B14000
|
trusted library allocation
|
page read and write
|
||
606C025C0000
|
trusted library allocation
|
page read and write
|
||
606C024A8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02FCC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C028DC000
|
trusted library allocation
|
page read and write
|
||
24EAD5ED000
|
heap
|
page read and write
|
||
24EA9F88000
|
heap
|
page read and write
|
||
7E3C000
|
heap
|
page read and write
|
||
606C02A48000
|
trusted library allocation
|
page read and write
|
||
606C02CC0000
|
trusted library allocation
|
page read and write
|
||
769000270000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02F14000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C023AC000
|
trusted library allocation
|
page read and write
|
||
606C029E0000
|
trusted library allocation
|
page read and write
|
||
606C02EE8000
|
trusted library allocation
|
page read and write
|
||
606C02959000
|
trusted library allocation
|
page read and write
|
||
24EB3620000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
606C024A4000
|
trusted library allocation
|
page read and write
|
||
6C4800210000
|
trusted library allocation
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
24EAC830000
|
unkown
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7E3B000
|
heap
|
page read and write
|
||
606C02510000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
52117FD000
|
stack
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
52207FE000
|
stack
|
page read and write
|
||
606C03114000
|
trusted library allocation
|
page read and write
|
||
606C031A8000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
520CFFE000
|
unkown
|
page readonly
|
||
6C4800868000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
6C48006AC000
|
trusted library allocation
|
page read and write
|
||
18B4002E4000
|
direct allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
52017FB000
|
stack
|
page read and write
|
||
24EAD5F9000
|
heap
|
page read and write
|
||
24EB440E000
|
trusted library section
|
page read and write
|
||
521B7FE000
|
stack
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
7996000
|
heap
|
page read and write
|
||
527D9FE000
|
unkown
|
page readonly
|
||
24EAD5F9000
|
heap
|
page read and write
|
||
606C029A8000
|
trusted library allocation
|
page read and write
|
||
606C024C4000
|
trusted library allocation
|
page read and write
|
||
52287FE000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7690002E4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02420000
|
trusted library allocation
|
page read and write
|
||
6C48008B8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
17C0000
|
heap
|
page read and write
|
||
78A1000
|
heap
|
page read and write
|
||
6C4800728000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
24EB3F02000
|
trusted library section
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
606C02E20000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C030CC000
|
trusted library allocation
|
page read and write
|
||
606C02938000
|
trusted library allocation
|
page read and write
|
||
606C02334000
|
trusted library allocation
|
page read and write
|
||
52037FB000
|
stack
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
606C0280C000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
606C02994000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
11E0000
|
heap
|
page read and write
|
||
5212FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
6C48007C4000
|
trusted library allocation
|
page read and write
|
||
24EAA021000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02638000
|
trusted library allocation
|
page read and write
|
||
18B4002AC000
|
direct allocation
|
page read and write
|
||
606C024D0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
606C0298F000
|
trusted library allocation
|
page read and write
|
||
18DF000
|
stack
|
page read and write
|
||
606C031D0000
|
trusted library allocation
|
page read and write
|
||
6C48008C4000
|
trusted library allocation
|
page read and write
|
||
606C022E0000
|
trusted library allocation
|
page read and write
|
||
24EAD61B000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
78AF000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
606C023DC000
|
trusted library allocation
|
page read and write
|
||
606C031B4000
|
trusted library allocation
|
page read and write
|
||
24EB3EE1000
|
trusted library section
|
page read and write
|
||
230A000
|
stack
|
page read and write
|
||
606C02868000
|
trusted library allocation
|
page read and write
|
||
606C024A4000
|
trusted library allocation
|
page read and write
|
||
527F1FD000
|
stack
|
page read and write
|
||
527E9FE000
|
unkown
|
page readonly
|
||
7A0B000
|
heap
|
page read and write
|
||
606C022AE000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
24EAD5F1000
|
heap
|
page read and write
|
||
606C022D0000
|
trusted library allocation
|
page read and write
|
||
18B4002EC000
|
direct allocation
|
page read and write
|
||
78AE000
|
heap
|
page read and write
|
||
7A4A000
|
heap
|
page read and write
|
||
24EADB87000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02318000
|
trusted library allocation
|
page read and write
|
||
24EADBB7000
|
heap
|
page read and write
|
||
18B400201000
|
direct allocation
|
page read and write
|
||
606C02504000
|
trusted library allocation
|
page read and write
|
||
52791EF000
|
stack
|
page read and write
|
||
24EADB5D000
|
heap
|
page read and write
|
||
606C03001000
|
trusted library allocation
|
page read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C480085C000
|
trusted library allocation
|
page read and write
|
||
606C02FA4000
|
trusted library allocation
|
page read and write
|
||
24EB3F50000
|
trusted library section
|
page read and write
|
||
606C0262F000
|
trusted library allocation
|
page read and write
|
||
606C0240C000
|
trusted library allocation
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
6C48006BC000
|
trusted library allocation
|
page read and write
|
||
606C024AA000
|
trusted library allocation
|
page read and write
|
||
6C480039C000
|
trusted library allocation
|
page read and write
|
||
6C480084C000
|
trusted library allocation
|
page read and write
|
||
78AF000
|
heap
|
page read and write
|
||
6C480087C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7A7E000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
606C00801000
|
trusted library allocation
|
page read and write
|
||
6C480082C000
|
trusted library allocation
|
page read and write
|
||
6C48002ED000
|
trusted library allocation
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
606C02F0C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02D88000
|
trusted library allocation
|
page read and write
|
||
6C48007A0000
|
trusted library allocation
|
page read and write
|
||
24EAD5FE000
|
heap
|
page read and write
|
||
606C02428000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
24EAD5FF000
|
heap
|
page read and write
|
||
798E000
|
heap
|
page read and write
|
||
5227FFE000
|
unkown
|
page readonly
|
||
12BB000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
6C4800404000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02A1C000
|
trusted library allocation
|
page read and write
|
||
7B7C000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
24EADBE3000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
769000274000
|
trusted library allocation
|
page read and write
|
||
18B4002A8000
|
direct allocation
|
page read and write
|
||
6C48008F0000
|
trusted library allocation
|
page read and write
|
||
521A7FB000
|
stack
|
page read and write
|
||
24EAA1C0000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C031A8000
|
trusted library allocation
|
page read and write
|
||
520AFFE000
|
unkown
|
page readonly
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C030D0000
|
trusted library allocation
|
page read and write
|
||
606C02BBB000
|
trusted library allocation
|
page read and write
|
||
7945000
|
heap
|
page read and write
|
||
79A1000
|
heap
|
page read and write
|
||
7937000
|
heap
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
606C02F60000
|
trusted library allocation
|
page read and write
|
||
606C023B4000
|
trusted library allocation
|
page read and write
|
||
6C48008B4000
|
trusted library allocation
|
page read and write
|
||
606C02AF8000
|
trusted library allocation
|
page read and write
|
||
6C48002E4000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C028E4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C0235C000
|
trusted library allocation
|
page read and write
|
||
52107FB000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
520A7FD000
|
stack
|
page read and write
|
||
606C02774000
|
trusted library allocation
|
page read and write
|
||
606C023AC000
|
trusted library allocation
|
page read and write
|
||
18B400217000
|
direct allocation
|
page read and write
|
||
606C031D8000
|
trusted library allocation
|
page read and write
|
||
5203FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C023F4000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C02A01000
|
trusted library allocation
|
page read and write
|
||
606C0260C000
|
trusted library allocation
|
page read and write
|
||
606C02424000
|
trusted library allocation
|
page read and write
|
||
52277FE000
|
stack
|
page read and write
|
||
606C02550000
|
trusted library allocation
|
page read and write
|
||
18B400250000
|
direct allocation
|
page read and write
|
||
606C03140000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
606C02678000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
6C4800964000
|
trusted library allocation
|
page read and write
|
||
24EAD61B000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C029BC000
|
trusted library allocation
|
page read and write
|
||
6C48007BC000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
52057FC000
|
stack
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C02288000
|
trusted library allocation
|
page read and write
|
||
52027FE000
|
stack
|
page read and write
|
||
606C02E78000
|
trusted library allocation
|
page read and write
|
||
24EAFD10000
|
trusted library allocation
|
page read and write
|
||
606C02E58000
|
trusted library allocation
|
page read and write
|
||
606C02F70000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
52007FB000
|
stack
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C024A8000
|
trusted library allocation
|
page read and write
|
||
7958000
|
heap
|
page read and write
|
||
6C480025C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02DE0000
|
trusted library allocation
|
page read and write
|
||
24EAD5FF000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
606C03054000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
527F9FE000
|
unkown
|
page readonly
|
||
606C02F1C000
|
trusted library allocation
|
page read and write
|
||
6C48006E8000
|
trusted library allocation
|
page read and write
|
||
606C02F48000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
24EAA160000
|
heap
|
page readonly
|
||
6F80000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EADB6D000
|
heap
|
page read and write
|
||
606C02D60000
|
trusted library allocation
|
page read and write
|
||
606C0271C000
|
trusted library allocation
|
page read and write
|
||
5210FFE000
|
unkown
|
page readonly
|
||
606C0226C000
|
trusted library allocation
|
page read and write
|
||
606C02D50000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
F1F000
|
stack
|
page read and write
|
||
795B000
|
heap
|
page read and write
|
||
6C48008A8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
606C023F8000
|
trusted library allocation
|
page read and write
|
||
79DD000
|
heap
|
page read and write
|
||
606C02260000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
7B07000
|
heap
|
page read and write
|
||
24EB3557000
|
unclassified section
|
page read and write
|
||
7953000
|
heap
|
page read and write
|
||
78AA000
|
heap
|
page read and write
|
||
7B8C000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
7A20000
|
heap
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
606C02904000
|
trusted library allocation
|
page read and write
|
||
606C02EB8000
|
trusted library allocation
|
page read and write
|
||
5215FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C02C24000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
606C023D8000
|
trusted library allocation
|
page read and write
|
||
24EADBC8000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
18B4002DC000
|
direct allocation
|
page read and write
|
||
606C02728000
|
trusted library allocation
|
page read and write
|
||
24EAD60A000
|
heap
|
page read and write
|
||
24EAD60A000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C024F3000
|
trusted library allocation
|
page read and write
|
||
78AC000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C02328000
|
trusted library allocation
|
page read and write
|
||
6C480095C000
|
trusted library allocation
|
page read and write
|
||
6C480027C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48006E0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
26CB000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
606C023A0000
|
trusted library allocation
|
page read and write
|
||
6C48006F4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C0238C000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C03184000
|
trusted library allocation
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02784000
|
trusted library allocation
|
page read and write
|
||
24EAD5FF000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800864000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7976000
|
heap
|
page read and write
|
||
606C0253C000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
24EAD5ED000
|
heap
|
page read and write
|
||
606C022F0000
|
trusted library allocation
|
page read and write
|
||
521E7FD000
|
stack
|
page read and write
|
||
769000201000
|
trusted library allocation
|
page read and write
|
||
5216FFE000
|
unkown
|
page readonly
|
||
606C02A24000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
520BFFE000
|
unkown
|
page readonly
|
||
24EAD5E7000
|
heap
|
page read and write
|
||
79EC000
|
heap
|
page read and write
|
||
6C480039C000
|
trusted library allocation
|
page read and write
|
||
606C02EF0000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
52217FD000
|
stack
|
page read and write
|
||
606C0314C000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
6871000
|
heap
|
page read and write
|
||
5219FFE000
|
unkown
|
page readonly
|
||
24EADB51000
|
heap
|
page read and write
|
||
6C4800408000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
3370000
|
direct allocation
|
page read and write
|
||
6D00000
|
direct allocation
|
page read and write
|
||
606C02CCC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAD602000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C028E8000
|
trusted library allocation
|
page read and write
|
||
24EAA1A0000
|
heap
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C03099000
|
trusted library allocation
|
page read and write
|
||
606C02550000
|
trusted library allocation
|
page read and write
|
||
606C02601000
|
trusted library allocation
|
page read and write
|
||
24EADB00000
|
heap
|
page read and write
|
||
24EB40EE000
|
trusted library section
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
606C02500000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
5201FFE000
|
unkown
|
page readonly
|
||
6C48008E8000
|
trusted library allocation
|
page read and write
|
||
6C4800848000
|
trusted library allocation
|
page read and write
|
||
606C02434000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
606C02DE4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
79D7000
|
heap
|
page read and write
|
||
78A7000
|
heap
|
page read and write
|
||
606C023AC000
|
trusted library allocation
|
page read and write
|
||
606C024A8000
|
trusted library allocation
|
page read and write
|
||
6C4800601000
|
trusted library allocation
|
page read and write
|
||
24EAA305000
|
heap
|
page read and write
|
||
24EB1D90000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
5206FFE000
|
unkown
|
page readonly
|
||
6CE0000
|
heap
|
page read and write
|
||
606C02C70000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
unkown
|
page write copy
|
||
6871000
|
heap
|
page read and write
|
||
18B400274000
|
direct allocation
|
page read and write
|
||
78AE000
|
heap
|
page read and write
|
||
606C02DE4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800874000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C02898000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
7690002A0000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
12C7000
|
heap
|
page read and write
|
||
24EB3F0E000
|
trusted library section
|
page read and write
|
||
606C02C01000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
12CF000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
18B400270000
|
direct allocation
|
page read and write
|
||
606C02D90000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C0288C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5204FFE000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C02FB0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
79F3000
|
heap
|
page read and write
|
||
606C0255C000
|
trusted library allocation
|
page read and write
|
||
527A1FE000
|
unkown
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
527C1FE000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EADB8A000
|
heap
|
page read and write
|
||
606C00001000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EB3623000
|
heap
|
page read and write
|
||
606C025B0000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
7690002B0000
|
trusted library allocation
|
page read and write
|
||
606C02D50000
|
trusted library allocation
|
page read and write
|
||
79B1000
|
heap
|
page read and write
|
||
52077FE000
|
stack
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
606C0300C000
|
trusted library allocation
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C0253C000
|
trusted library allocation
|
page read and write
|
||
6C48006C8000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
13F7000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page execute and write copy
|
||
6C48008EC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7AAB000
|
heap
|
page read and write
|
||
606C02980000
|
trusted library allocation
|
page read and write
|
||
606C031EC000
|
trusted library allocation
|
page read and write
|
||
18B400210000
|
direct allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
6C480079C000
|
trusted library allocation
|
page read and write
|
||
6C888000
|
unkown
|
page readonly
|
||
606C02BEC000
|
trusted library allocation
|
page read and write
|
||
52177FC000
|
stack
|
page read and write
|
||
7BAB000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02530000
|
trusted library allocation
|
page read and write
|
||
7690002A0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
78AE000
|
heap
|
page read and write
|
||
527D1FE000
|
stack
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
7A4A000
|
heap
|
page read and write
|
||
24EAD5FF000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
78A7000
|
heap
|
page read and write
|
||
18B400303000
|
direct allocation
|
page read and write
|
||
6C760000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
24EB3F40000
|
trusted library section
|
page read and write
|
||
24EAD5FA000
|
heap
|
page read and write
|
||
527C9FE000
|
unkown
|
page readonly
|
||
1054000
|
unkown
|
page execute and write copy
|
||
52267FC000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
6C4800880000
|
trusted library allocation
|
page read and write
|
||
52127FC000
|
stack
|
page read and write
|
||
606C02B04000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
24EADB5A000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
606C0315C000
|
trusted library allocation
|
page read and write
|
||
24EAD5F2000
|
heap
|
page read and write
|
||
606C031C0000
|
trusted library allocation
|
page read and write
|
||
7436000
|
direct allocation
|
page read and write
|
||
128C000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02544000
|
trusted library allocation
|
page read and write
|
||
606C026BF000
|
trusted library allocation
|
page read and write
|
||
606C02490000
|
trusted library allocation
|
page read and write
|
||
24EB375E000
|
trusted library section
|
page read and write
|
||
606C02EA4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAA080000
|
heap
|
page read and write
|
||
7970000
|
heap
|
page read and write
|
||
79B7000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800904000
|
trusted library allocation
|
page read and write
|
||
24EAD61B000
|
heap
|
page read and write
|
||
606C02674000
|
trusted library allocation
|
page read and write
|
||
18B400290000
|
direct allocation
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
769000238000
|
trusted library allocation
|
page read and write
|
||
5214FFE000
|
unkown
|
page readonly
|
||
11FC000
|
stack
|
page read and write
|
||
6C4800220000
|
trusted library allocation
|
page read and write
|
||
71AC000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
527A9FE000
|
unkown
|
page readonly
|
||
606C02A74000
|
trusted library allocation
|
page read and write
|
||
606C0251C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
7A45000
|
heap
|
page read and write
|
||
606C02DA4000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02418000
|
trusted library allocation
|
page read and write
|
||
6C48002B8000
|
trusted library allocation
|
page read and write
|
||
606C02414000
|
trusted library allocation
|
page read and write
|
||
24EADB10000
|
heap
|
page read and write
|
||
24EADB8E000
|
heap
|
page read and write
|
||
6C4800788000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
12B9000
|
heap
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
78A3000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
ACC000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5222FFD000
|
stack
|
page read and write
|
||
23BE000
|
unkown
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
24EADBC6000
|
heap
|
page read and write
|
||
5213FFE000
|
unkown
|
page readonly
|
||
76900020D000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
D6C000
|
stack
|
page read and write
|
||
26DC000
|
heap
|
page read and write
|
||
7A73000
|
heap
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
606C02580000
|
trusted library allocation
|
page read and write
|
||
52047FB000
|
stack
|
page read and write
|
||
606C02410000
|
trusted library allocation
|
page read and write
|
||
24EAA200000
|
trusted library section
|
page readonly
|
||
24EAD5F2000
|
heap
|
page read and write
|
||
5225FFE000
|
unkown
|
page readonly
|
||
24EAA300000
|
heap
|
page read and write
|
||
7690002B0000
|
trusted library allocation
|
page read and write
|
||
6C4800894000
|
trusted library allocation
|
page read and write
|
||
78A7000
|
heap
|
page read and write
|
||
606C023B4000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
18B400260000
|
direct allocation
|
page read and write
|
||
7A15000
|
heap
|
page read and write
|
||
606C02954000
|
trusted library allocation
|
page read and write
|
||
606C02E88000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02AE4000
|
trusted library allocation
|
page read and write
|
||
7690002B0000
|
trusted library allocation
|
page read and write
|
||
606C02278000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48007C0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
6C4800424000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
52157FC000
|
stack
|
page read and write
|
||
606C00201000
|
trusted library allocation
|
page read and write
|
||
6C480040C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800828000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5211FFE000
|
unkown
|
page readonly
|
||
606C02504000
|
trusted library allocation
|
page read and write
|
||
606C02674000
|
trusted library allocation
|
page read and write
|
||
606C02694000
|
trusted library allocation
|
page read and write
|
||
606C02A90000
|
trusted library allocation
|
page read and write
|
||
606C02564000
|
trusted library allocation
|
page read and write
|
||
52137FD000
|
stack
|
page read and write
|
||
78A2000
|
heap
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
52097FE000
|
stack
|
page read and write
|
||
606C0302C000
|
trusted library allocation
|
page read and write
|
||
606C027C0000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
78A0000
|
heap
|
page read and write
|
||
7690002C0000
|
trusted library allocation
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAA170000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
606C02CA0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48002FC000
|
trusted library allocation
|
page read and write
|
||
606C023C4000
|
trusted library allocation
|
page read and write
|
||
78A1000
|
heap
|
page read and write
|
||
6C4800948000
|
trusted library allocation
|
page read and write
|
||
7BE3000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
606C02570000
|
trusted library allocation
|
page read and write
|
||
606C0311C000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
606C023D4000
|
trusted library allocation
|
page read and write
|
||
70C2000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page execute and read and write
|
||
606C02F34000
|
trusted library allocation
|
page read and write
|
||
24EB403D000
|
trusted library section
|
page read and write
|
||
606C0220C000
|
trusted library allocation
|
page read and write
|
||
606C0227E000
|
trusted library allocation
|
page read and write
|
||
24EAA044000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5220FFE000
|
unkown
|
page readonly
|
||
606C024B8000
|
trusted library allocation
|
page read and write
|
||
78AB000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
6C48007E0000
|
trusted library allocation
|
page read and write
|
||
606C02A0F000
|
trusted library allocation
|
page read and write
|
||
606C03120000
|
trusted library allocation
|
page read and write
|
||
606C02FD4000
|
trusted library allocation
|
page read and write
|
||
5200FFE000
|
unkown
|
page readonly
|
||
6C48006E8000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
stack
|
page read and write
|
||
606C03104000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7690002A0000
|
trusted library allocation
|
page read and write
|
||
6C761000
|
unkown
|
page execute read
|
||
606C02798000
|
trusted library allocation
|
page read and write
|
||
606C028F4000
|
trusted library allocation
|
page read and write
|
||
606C022B0000
|
trusted library allocation
|
page read and write
|
||
6C4800201000
|
trusted library allocation
|
page read and write
|
||
6C4800778000
|
trusted library allocation
|
page read and write
|
||
606C02910000
|
trusted library allocation
|
page read and write
|
||
52237FE000
|
unkown
|
page readonly
|
||
24EB36E0000
|
trusted library section
|
page read and write
|
||
24EB4400000
|
trusted library section
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7690002D8000
|
trusted library allocation
|
page read and write
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C024A4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
18B4002D0000
|
direct allocation
|
page read and write
|
||
7A05000
|
heap
|
page read and write
|
||
606C02394000
|
trusted library allocation
|
page read and write
|
||
769000294000
|
trusted library allocation
|
page read and write
|
||
6C480080C000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
606C030B8000
|
trusted library allocation
|
page read and write
|
||
79F0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
18B400234000
|
direct allocation
|
page read and write
|
||
606C024A4000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
18B400284000
|
direct allocation
|
page read and write
|
||
6C4800401000
|
trusted library allocation
|
page read and write
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
606C03060000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
606C02DE4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAD5D0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
606C02EC8000
|
trusted library allocation
|
page read and write
|
||
52227FE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
5208FFE000
|
unkown
|
page readonly
|
||
7A3C000
|
heap
|
page read and write
|
||
6C4800884000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800288000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
direct allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
6C4800844000
|
trusted library allocation
|
page read and write
|
||
520DFFE000
|
unkown
|
page readonly
|
||
24EB1BE0000
|
trusted library section
|
page read and write
|
||
6D00000
|
direct allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
606C02CB0000
|
trusted library allocation
|
page read and write
|
||
52187FC000
|
stack
|
page read and write
|
||
24EB3752000
|
trusted library section
|
page read and write
|
||
606C02E90000
|
trusted library allocation
|
page read and write
|
||
24EAD5F9000
|
heap
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
6C48002B0000
|
trusted library allocation
|
page read and write
|
||
606C023F0000
|
trusted library allocation
|
page read and write
|
||
606C02680000
|
trusted library allocation
|
page read and write
|
||
6C4800238000
|
trusted library allocation
|
page read and write
|
||
520C7FE000
|
stack
|
page read and write
|
||
128C000
|
heap
|
page read and write
|
||
520B7FA000
|
stack
|
page read and write
|
||
24EADB7F000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
24EADB8C000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
606C02C1C000
|
trusted library allocation
|
page read and write
|
||
24EADC30000
|
trusted library section
|
page read and write
|
||
606C02ECB000
|
trusted library allocation
|
page read and write
|
||
24EADBC9000
|
heap
|
page read and write
|
||
606C02ACC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
71A5000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
769000260000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
606C02F54000
|
trusted library allocation
|
page read and write
|
||
606C02E0C000
|
trusted library allocation
|
page read and write
|
||
6C4800418000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800818000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
18B400215000
|
direct allocation
|
page read and write
|
||
24EB1D60000
|
heap
|
page read and write
|
||
5209FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C02658000
|
trusted library allocation
|
page read and write
|
||
606C02580000
|
trusted library allocation
|
page read and write
|
||
6C48002D4000
|
trusted library allocation
|
page read and write
|
||
606C0281C000
|
trusted library allocation
|
page read and write
|
||
606C0298A000
|
trusted library allocation
|
page read and write
|
||
1F0F000
|
stack
|
page read and write
|
||
5226FFE000
|
unkown
|
page readonly
|
||
606C02E01000
|
trusted library allocation
|
page read and write
|
||
78A5000
|
heap
|
page read and write
|
||
606C024C4000
|
trusted library allocation
|
page read and write
|
||
24EB4610000
|
trusted library section
|
page read and write
|
||
79EC000
|
heap
|
page read and write
|
||
7A8C000
|
heap
|
page read and write
|
||
24EB3CC0000
|
trusted library section
|
page read and write
|
||
18B40024C000
|
direct allocation
|
page read and write
|
||
5223FFA000
|
stack
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
606C02DF4000
|
trusted library allocation
|
page read and write
|
||
606C0240C000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
6C4800790000
|
trusted library allocation
|
page read and write
|
||
796D000
|
heap
|
page read and write
|
||
606C0237C000
|
trusted library allocation
|
page read and write
|
||
606C02E70000
|
trusted library allocation
|
page read and write
|
||
6C4800430000
|
trusted library allocation
|
page read and write
|
||
7690002C0000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
606C0246C000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
606C030E8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48006AC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
24EB3793000
|
trusted library section
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
606C03095000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48008C8000
|
trusted library allocation
|
page read and write
|
||
606C02F7C000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
606C02D68000
|
trusted library allocation
|
page read and write
|
||
7B3A000
|
heap
|
page read and write
|
||
18B400294000
|
direct allocation
|
page read and write
|
||
606C02594000
|
trusted library allocation
|
page read and write
|
||
606C02A58000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
606C02A18000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
24EA9F80000
|
heap
|
page read and write
|
||
606C022B8000
|
trusted library allocation
|
page read and write
|
||
606C02DD8000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAA230000
|
heap
|
page read and write
|
||
606C0253C000
|
trusted library allocation
|
page read and write
|
||
6C48006AC000
|
trusted library allocation
|
page read and write
|
||
606C0314C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
79D2000
|
heap
|
page read and write
|
||
6C48006D4000
|
trusted library allocation
|
page read and write
|
||
606C030F4000
|
trusted library allocation
|
page read and write
|
||
606C02528000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7E3C000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
606C0241C000
|
trusted library allocation
|
page read and write
|
||
606C030DC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
52257FE000
|
unkown
|
page readonly
|
||
5224FFE000
|
stack
|
page read and write
|
||
24EAD5F5000
|
heap
|
page read and write
|
||
606C02F00000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
23FF000
|
unkown
|
page read and write
|
||
79B1000
|
heap
|
page read and write
|
||
6C83F000
|
unkown
|
page readonly
|
||
541000
|
unkown
|
page readonly
|
||
18B40020C000
|
direct allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
76A1000
|
heap
|
page read and write
|
||
52247FE000
|
unkown
|
page readonly
|
||
606C023E4000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
heap
|
page read and write
|
||
24EADAB0000
|
trusted library section
|
page read and write
|
||
70A1000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5228FFE000
|
unkown
|
page readonly
|
||
606C02648000
|
trusted library allocation
|
page read and write
|
||
6C48008E4000
|
trusted library allocation
|
page read and write
|
||
6C48006F0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
78AF000
|
heap
|
page read and write
|
||
521D7FE000
|
stack
|
page read and write
|
||
606C02FE8000
|
trusted library allocation
|
page read and write
|
||
521CFFE000
|
unkown
|
page readonly
|
||
520E7FE000
|
stack
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
520FFFE000
|
unkown
|
page readonly
|
||
606C02FA8000
|
trusted library allocation
|
page read and write
|
||
606C02BDC000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
6C48007AC000
|
trusted library allocation
|
page read and write
|
||
606C02E64000
|
trusted library allocation
|
page read and write
|
||
7690002C0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
18B400280000
|
direct allocation
|
page read and write
|
||
606C02DE0000
|
trusted library allocation
|
page read and write
|
||
606C02F60000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800878000
|
trusted library allocation
|
page read and write
|
||
24EADB78000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
520D7FE000
|
stack
|
page read and write
|
||
5217FFE000
|
unkown
|
page readonly
|
||
606C03100000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
78AD000
|
heap
|
page read and write
|
||
606C03140000
|
trusted library allocation
|
page read and write
|
||
24EAA025000
|
heap
|
page read and write
|
||
7690002C0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02E48000
|
trusted library allocation
|
page read and write
|
||
6C4800840000
|
trusted library allocation
|
page read and write
|
||
24EAD5E8000
|
heap
|
page read and write
|
||
527B1FE000
|
stack
|
page read and write
|
||
769000278000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02F90000
|
trusted library allocation
|
page read and write
|
||
78A1000
|
heap
|
page read and write
|
||
6C480060C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6C4800700000
|
trusted library allocation
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C02401000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7690002F8000
|
trusted library allocation
|
page read and write
|
||
606C024B4000
|
trusted library allocation
|
page read and write
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
606C025A0000
|
trusted library allocation
|
page read and write
|
||
606C02504000
|
trusted library allocation
|
page read and write
|
||
6C480091C000
|
trusted library allocation
|
page read and write
|
||
769000235000
|
trusted library allocation
|
page read and write
|
||
78A1000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C00601000
|
trusted library allocation
|
page read and write
|
||
606C030C4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7434000
|
direct allocation
|
page read and write
|
||
521BFFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
521AFFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C4800230000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
606C027A8000
|
trusted library allocation
|
page read and write
|
||
606C02C64000
|
trusted library allocation
|
page read and write
|
||
24EB4016000
|
trusted library section
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
6C480078C000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
6C4800960000
|
trusted library allocation
|
page read and write
|
||
24EADB99000
|
heap
|
page read and write
|
||
606C02DD8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
521FFFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C03074000
|
trusted library allocation
|
page read and write
|
||
606C02840000
|
trusted library allocation
|
page read and write
|
||
5207FFE000
|
unkown
|
page readonly
|
||
53E000
|
unkown
|
page read and write
|
||
6C4800850000
|
trusted library allocation
|
page read and write
|
||
606C0266A000
|
trusted library allocation
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
5221FFD000
|
stack
|
page read and write
|
||
606C02544000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02A30000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
606C02550000
|
trusted library allocation
|
page read and write
|
||
24EAD830000
|
heap
|
page read and write
|
||
606C02A9C000
|
trusted library allocation
|
page read and write
|
||
78A2000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7AC7000
|
heap
|
page read and write
|
||
6C48008F4000
|
trusted library allocation
|
page read and write
|
||
24EAD5F1000
|
heap
|
page read and write
|
||
606C02FD8000
|
trusted library allocation
|
page read and write
|
||
606C02F8C000
|
trusted library allocation
|
page read and write
|
||
78A2000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
6C4800860000
|
trusted library allocation
|
page read and write
|
||
24EB3ED0000
|
trusted library section
|
page read and write
|
||
72D0000
|
direct allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
521EFFE000
|
unkown
|
page readonly
|
||
606C02FE4000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
769000250000
|
trusted library allocation
|
page read and write
|
||
606C02830000
|
trusted library allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
78AD000
|
heap
|
page read and write
|
||
6C480070C000
|
trusted library allocation
|
page read and write
|
||
6C4800890000
|
trusted library allocation
|
page read and write
|
||
71A9000
|
heap
|
page read and write
|
||
24EB1792000
|
trusted library allocation
|
page read and write
|
||
606C02220000
|
trusted library allocation
|
page read and write
|
||
7690002F0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02FBC000
|
trusted library allocation
|
page read and write
|
||
606C02430000
|
trusted library allocation
|
page read and write
|
||
606C026B8000
|
trusted library allocation
|
page read and write
|
||
5205FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
769000264000
|
trusted library allocation
|
page read and write
|
||
606C031E0000
|
trusted library allocation
|
page read and write
|
||
6C889000
|
unkown
|
page read and write
|
||
18B40023C000
|
direct allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
7690002BC000
|
trusted library allocation
|
page read and write
|
||
527E1FE000
|
stack
|
page read and write
|
||
606C02AB8000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
606C028E8000
|
trusted library allocation
|
page read and write
|
||
52147FA000
|
stack
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C02B54000
|
trusted library allocation
|
page read and write
|
||
606C02E54000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
12B8000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
606C00401000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAA233000
|
heap
|
page read and write
|
||
606C0271C000
|
trusted library allocation
|
page read and write
|
||
606C02964000
|
trusted library allocation
|
page read and write
|
||
78A2000
|
heap
|
page read and write
|
||
24EAA1D0000
|
trusted library allocation
|
page read and write
|
||
606C02FE8000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAD61B000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C023B4000
|
trusted library allocation
|
page read and write
|
||
6C480081C000
|
trusted library allocation
|
page read and write
|
||
606C02544000
|
trusted library allocation
|
page read and write
|
||
606C02ED8000
|
trusted library allocation
|
page read and write
|
||
7A74000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EB4070000
|
trusted library section
|
page read and write
|
||
52197FD000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02928000
|
trusted library allocation
|
page read and write
|
||
78A9000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
C2E000
|
heap
|
page read and write
|
||
24EB4307000
|
unclassified section
|
page read and write
|
||
606C024F0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EAD5F1000
|
heap
|
page read and write
|
||
24EB3F73000
|
trusted library section
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
24EB1D8A000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
606C0242C000
|
trusted library allocation
|
page read and write
|
||
6C88C000
|
unkown
|
page readonly
|
||
24EB3527000
|
unclassified section
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
5202FFE000
|
unkown
|
page readonly
|
||
6C4800898000
|
trusted library allocation
|
page read and write
|
||
521DFFE000
|
unkown
|
page readonly
|
||
6C48002CC000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
6C4800920000
|
trusted library allocation
|
page read and write
|
||
606C00E01000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
606C0301C000
|
trusted library allocation
|
page read and write
|
||
521C7FE000
|
stack
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C480020C000
|
trusted library allocation
|
page read and write
|
||
24EB35E0000
|
heap
|
page read and write
|
||
606C02244000
|
trusted library allocation
|
page read and write
|
||
78A2000
|
heap
|
page read and write
|
||
79E1000
|
heap
|
page read and write
|
||
606C023EC000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
24EAD5F6000
|
heap
|
page read and write
|
||
6C48007D4000
|
trusted library allocation
|
page read and write
|
||
18B400220000
|
direct allocation
|
page read and write
|
||
606C030A0000
|
trusted library allocation
|
page read and write
|
||
606C02CDC000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
1500000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
606C02E98000
|
trusted library allocation
|
page read and write
|
||
6C48002F4000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
24EADBA5000
|
heap
|
page read and write
|
||
606C026C8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
520EFFE000
|
unkown
|
page readonly
|
||
7A1F000
|
heap
|
page read and write
|
||
6C4800250000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
53E000
|
unkown
|
page read and write
|
||
6CEA000
|
heap
|
page read and write
|
||
172F000
|
stack
|
page read and write
|
||
24EB1C77000
|
unclassified section
|
page read and write
|
||
606C03084000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
12D5000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7A5C000
|
heap
|
page read and write
|
||
606C02D04000
|
trusted library allocation
|
page read and write
|
||
18B400230000
|
direct allocation
|
page read and write
|
||
6C4800248000
|
trusted library allocation
|
page read and write
|
||
606C028D8000
|
trusted library allocation
|
page read and write
|
||
606C02BBF000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page execute and read and write
|
||
769000230000
|
trusted library allocation
|
page read and write
|
||
606C02530000
|
trusted library allocation
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
769000288000
|
trusted library allocation
|
page read and write
|
||
24EAA03F000
|
heap
|
page read and write
|
||
606C01001000
|
trusted library allocation
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C00A01000
|
trusted library allocation
|
page read and write
|
||
521F7FE000
|
stack
|
page read and write
|
||
24EB3EF0000
|
trusted library section
|
page read and write
|
||
606C023E8000
|
trusted library allocation
|
page read and write
|
||
24EAD5C0000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
6C4800830000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
7BDD000
|
heap
|
page read and write
|
||
606C027D4000
|
trusted library allocation
|
page read and write
|
||
606C02878000
|
trusted library allocation
|
page read and write
|
||
606C02D14000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C030AC000
|
trusted library allocation
|
page read and write
|
||
606C025A0000
|
trusted library allocation
|
page read and write
|
||
606C02670000
|
trusted library allocation
|
page read and write
|
||
24EADBE1000
|
heap
|
page read and write
|
||
24EADBC4000
|
heap
|
page read and write
|
||
78A3000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
606C02201000
|
trusted library allocation
|
page read and write
|
||
24EB40E0000
|
trusted library section
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
606C0271C000
|
trusted library allocation
|
page read and write
|
||
520F7FE000
|
stack
|
page read and write
|
||
606C023B4000
|
trusted library allocation
|
page read and write
|
||
6C4800248000
|
trusted library allocation
|
page read and write
|
||
6C480071C000
|
trusted library allocation
|
page read and write
|
||
7A37000
|
heap
|
page read and write
|
||
606C02B84000
|
trusted library allocation
|
page read and write
|
||
7690002F4000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
606C03130000
|
trusted library allocation
|
page read and write
|
||
606C028E8000
|
trusted library allocation
|
page read and write
|
||
606C02BC4000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02B9C000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
7690002C0000
|
trusted library allocation
|
page read and write
|
||
606C023E0000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02C40000
|
trusted library allocation
|
page read and write
|
||
52087FE000
|
stack
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
769000248000
|
trusted library allocation
|
page read and write
|
||
606C0236C000
|
trusted library allocation
|
page read and write
|
||
5218FFE000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
24EAD5F7000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
606C0234C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02B90000
|
trusted library allocation
|
page read and write
|
||
6C4800918000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
71A6000
|
heap
|
page read and write
|
||
769000220000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6C48008D8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C031DC000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
6C48007E4000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
24EB4032000
|
trusted library section
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
B6E000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7A14000
|
heap
|
page read and write
|
||
6C83D000
|
unkown
|
page read and write
|
||
6C4800974000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
78A9000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
78AE000
|
heap
|
page read and write
|
||
24EB3F61000
|
trusted library section
|
page read and write
|
||
606C02C0C000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page write copy
|
||
6871000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
6871000
|
heap
|
page read and write
|
||
7690002A0000
|
trusted library allocation
|
page read and write
|
||
52067FB000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
7690002C8000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page readonly
|
||
24EADBE1000
|
heap
|
page read and write
|
||
6C4800801000
|
trusted library allocation
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
606C00C01000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02CE8000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
78A8000
|
heap
|
page read and write
|
||
606C024F7000
|
trusted library allocation
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C023C8000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02D7C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute read
|
||
606C02B64000
|
trusted library allocation
|
page read and write
|
||
167F000
|
stack
|
page read and write
|
||
198F000
|
stack
|
page read and write
|
||
52167FD000
|
stack
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
BEC000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
606C0253C000
|
trusted library allocation
|
page read and write
|
||
7A38000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
606C02801000
|
trusted library allocation
|
page read and write
|
||
606C03034000
|
trusted library allocation
|
page read and write
|
||
6C48006C8000
|
trusted library allocation
|
page read and write
|
||
606C0221C000
|
trusted library allocation
|
page read and write
|
||
24EADB92000
|
heap
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
3370000
|
direct allocation
|
page read and write
|
||
24EADB90000
|
heap
|
page read and write
|
||
606C0271C000
|
trusted library allocation
|
page read and write
|
||
6871000
|
heap
|
page read and write
|
||
7997000
|
heap
|
page read and write
|
There are 1278 hidden memdumps, click here to show them.