Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
u25XzKsRuY.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u25XzKsRuY.exe_d912b26a4f22b39a1ac63905abfec74ef9af42_012cb695_11be3652-9528-41c9-ba30-4315974fc19c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER92B7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:33:19 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER946D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94BC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\u25XzKsRuY.exe
|
"C:\Users\user\Desktop\u25XzKsRuY.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2428 --field-trial-handle=2132,i,4658029953640130748,9299250250525862020,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7996 -s 1236
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://docs.google.com/spreadsheets/?usp=installed_webapp5
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://www.youtube.coP
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icoeb
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://chrome.google.com/webstore?hl=en2
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b5
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.htmlr
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
https://chrome.google.com/webstore3NgtAZQc=
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://chrome.google.com/webstore?hl=enpS
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.132
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
ProgramId
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
FileId
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
LongPathHash
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Name
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
OriginalFileName
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Publisher
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Version
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
BinFileVersion
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
BinaryType
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
ProductName
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
ProductVersion
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
LinkDate
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
BinProductVersion
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
AppxPackageFullName
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Size
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Language
|
||
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
AEDA7FA000
|
stack
|
page read and write
|
||
20E000
|
unkown
|
page write copy
|
||
AECB7FD000
|
stack
|
page read and write
|
||
350C000EC000
|
trusted library allocation
|
page read and write
|
||
350C00401000
|
trusted library allocation
|
page read and write
|
||
32B000280000
|
direct allocation
|
page read and write
|
||
78FA000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7162000
|
heap
|
page read and write
|
||
6E70000
|
direct allocation
|
page execute and read and write
|
||
79B0000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
28A46595000
|
heap
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
1974000
|
heap
|
page read and write
|
||
350C00758000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00224000
|
trusted library allocation
|
page read and write
|
||
350C002A8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
14F7000
|
heap
|
page read and write
|
||
28A49F66000
|
heap
|
page read and write
|
||
350C006D4000
|
trusted library allocation
|
page read and write
|
||
28A499DD000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AED2FFE000
|
unkown
|
page readonly
|
||
AEC87FE000
|
stack
|
page read and write
|
||
350C00BD8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C004AC000
|
trusted library allocation
|
page read and write
|
||
350C001E0000
|
trusted library allocation
|
page read and write
|
||
716A000
|
heap
|
page read and write
|
||
79FC008E8000
|
trusted library allocation
|
page read and write
|
||
79FC008D8000
|
trusted library allocation
|
page read and write
|
||
75C9000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
1943000
|
heap
|
page read and write
|
||
28A4659C000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
350C00A84000
|
trusted library allocation
|
page read and write
|
||
79FC00878000
|
trusted library allocation
|
page read and write
|
||
350C001F8000
|
trusted library allocation
|
page read and write
|
||
1798000
|
heap
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
28A4FFC0000
|
trusted library section
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
79FC00848000
|
trusted library allocation
|
page read and write
|
||
350C00AB0000
|
trusted library allocation
|
page read and write
|
||
AED3FFE000
|
unkown
|
page readonly
|
||
350C00EE4000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
350C0016C000
|
trusted library allocation
|
page read and write
|
||
1979000
|
heap
|
page read and write
|
||
350C002C4000
|
trusted library allocation
|
page read and write
|
||
7166000
|
heap
|
page read and write
|
||
28A46460000
|
heap
|
page read and write
|
||
350C00EBC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00CC8000
|
trusted library allocation
|
page read and write
|
||
AED4FFE000
|
unkown
|
page readonly
|
||
1979000
|
heap
|
page read and write
|
||
75C3000
|
heap
|
page read and write
|
||
350C00C90000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC008A8000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
AEB6FFE000
|
unkown
|
page readonly
|
||
350C008A8000
|
trusted library allocation
|
page read and write
|
||
350C00FA8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
28A46546000
|
heap
|
page read and write
|
||
32B00020C000
|
direct allocation
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
79FC006E8000
|
trusted library allocation
|
page read and write
|
||
776A000
|
heap
|
page read and write
|
||
350C00D14000
|
trusted library allocation
|
page read and write
|
||
79FC00401000
|
trusted library allocation
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
350C0111C000
|
trusted library allocation
|
page read and write
|
||
716B000
|
heap
|
page read and write
|
||
350C00F20000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
28A5070E000
|
trusted library section
|
page read and write
|
||
AED97FD000
|
stack
|
page read and write
|
||
7163000
|
heap
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C00ED4000
|
trusted library allocation
|
page read and write
|
||
7163000
|
heap
|
page read and write
|
||
79FC007BC000
|
trusted library allocation
|
page read and write
|
||
350C00368000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00788000
|
trusted library allocation
|
page read and write
|
||
28A4D460000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
350C009E4000
|
trusted library allocation
|
page read and write
|
||
28A4FA07000
|
unclassified section
|
page read and write
|
||
79FC00898000
|
trusted library allocation
|
page read and write
|
||
67400201000
|
trusted library allocation
|
page read and write
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
350C0020C000
|
trusted library allocation
|
page read and write
|
||
350C00374000
|
trusted library allocation
|
page read and write
|
||
350C00BA4000
|
trusted library allocation
|
page read and write
|
||
AEC97FC000
|
stack
|
page read and write
|
||
79FC00430000
|
trusted library allocation
|
page read and write
|
||
350C0081C000
|
trusted library allocation
|
page read and write
|
||
AECF7FE000
|
stack
|
page read and write
|
||
75C8000
|
heap
|
page read and write
|
||
32B00023C000
|
direct allocation
|
page read and write
|
||
350C00E6C000
|
trusted library allocation
|
page read and write
|
||
75C5000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
201000
|
unkown
|
page execute read
|
||
67A1000
|
heap
|
page read and write
|
||
28A4FC1E000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
32B000217000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00F60000
|
trusted library allocation
|
page read and write
|
||
AED27FE000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00ED8000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
32B0002A8000
|
direct allocation
|
page read and write
|
||
75CD000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
716A000
|
heap
|
page read and write
|
||
75C8000
|
heap
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
776A000
|
heap
|
page read and write
|
||
350C00CB4000
|
trusted library allocation
|
page read and write
|
||
AECC7FB000
|
stack
|
page read and write
|
||
AEC27FE000
|
stack
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
79FC0039C000
|
trusted library allocation
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0014C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00D54000
|
trusted library allocation
|
page read and write
|
||
350C0027C000
|
trusted library allocation
|
page read and write
|
||
79FC007A0000
|
trusted library allocation
|
page read and write
|
||
6C840000
|
unkown
|
page readonly
|
||
350C00FC4000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00540000
|
trusted library allocation
|
page read and write
|
||
AED6FFE000
|
unkown
|
page readonly
|
||
79FC00238000
|
trusted library allocation
|
page read and write
|
||
79FC007E0000
|
trusted library allocation
|
page read and write
|
||
28A46584000
|
heap
|
page read and write
|
||
67400278000
|
trusted library allocation
|
page read and write
|
||
350C00214000
|
trusted library allocation
|
page read and write
|
||
350C00680000
|
trusted library allocation
|
page read and write
|
||
28A49F68000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75C4000
|
heap
|
page read and write
|
||
350C012F4000
|
trusted library allocation
|
page read and write
|
||
79FC002F0000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
75CB000
|
heap
|
page read and write
|
||
AEC1FFE000
|
unkown
|
page readonly
|
||
79FC00201000
|
trusted library allocation
|
page read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AECBFFE000
|
unkown
|
page readonly
|
||
79FC008EC000
|
trusted library allocation
|
page read and write
|
||
AEDF7FE000
|
stack
|
page read and write
|
||
79FC008C8000
|
trusted library allocation
|
page read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
350C004CC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A465A4000
|
heap
|
page read and write
|
||
3DF000
|
unkown
|
page read and write
|
||
79FC00601000
|
trusted library allocation
|
page read and write
|
||
350C0034C000
|
trusted library allocation
|
page read and write
|
||
79FC002EE000
|
trusted library allocation
|
page read and write
|
||
350C0015C000
|
trusted library allocation
|
page read and write
|
||
350C0102C000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
7163000
|
heap
|
page read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
350C001DC000
|
trusted library allocation
|
page read and write
|
||
350C00724000
|
trusted library allocation
|
page read and write
|
||
28A4FD12000
|
trusted library section
|
page read and write
|
||
28A499C9000
|
heap
|
page read and write
|
||
350C007B1000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
7897000
|
heap
|
page read and write
|
||
674002F0000
|
trusted library allocation
|
page read and write
|
||
350C002A4000
|
trusted library allocation
|
page read and write
|
||
350C00FE0000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
350C00744000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C00710000
|
trusted library allocation
|
page read and write
|
||
28A50626000
|
trusted library section
|
page read and write
|
||
79FC006C8000
|
trusted library allocation
|
page read and write
|
||
350C002A4000
|
trusted library allocation
|
page read and write
|
||
79FC0071C000
|
trusted library allocation
|
page read and write
|
||
350C00AC8000
|
trusted library allocation
|
page read and write
|
||
350C001CC000
|
trusted library allocation
|
page read and write
|
||
AEC5FFE000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00F6C000
|
trusted library allocation
|
page read and write
|
||
350C007BC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7164000
|
heap
|
page read and write
|
||
75C3000
|
heap
|
page read and write
|
||
28A464B8000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
674002C0000
|
trusted library allocation
|
page read and write
|
||
7161000
|
heap
|
page read and write
|
||
350C00CD4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEC3FFE000
|
unkown
|
page readonly
|
||
674002D8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEBDFFE000
|
unkown
|
page readonly
|
||
79FC002CC000
|
trusted library allocation
|
page read and write
|
||
716F000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75CE000
|
heap
|
page read and write
|
||
28A499D6000
|
heap
|
page read and write
|
||
AECEFFE000
|
unkown
|
page readonly
|
||
28A49F6A000
|
heap
|
page read and write
|
||
350C009CB000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
28A49F01000
|
heap
|
page read and write
|
||
772C000
|
heap
|
page read and write
|
||
350C00D4C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
716C000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
7878000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
AEB77FB000
|
stack
|
page read and write
|
||
AED57FD000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
350C00DD4000
|
trusted library allocation
|
page read and write
|
||
AEDEFFE000
|
unkown
|
page readonly
|
||
350C00FC4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
20E000
|
unkown
|
page read and write
|
||
AEDFFFE000
|
unkown
|
page readonly
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
75C6000
|
heap
|
page read and write
|
||
350C00E01000
|
trusted library allocation
|
page read and write
|
||
79FC00948000
|
trusted library allocation
|
page read and write
|
||
350C00EE4000
|
trusted library allocation
|
page read and write
|
||
79FC00248000
|
trusted library allocation
|
page read and write
|
||
350C003F8000
|
trusted library allocation
|
page read and write
|
||
79FC00404000
|
trusted library allocation
|
page read and write
|
||
AEDBFFE000
|
unkown
|
page readonly
|
||
350C0039C000
|
trusted library allocation
|
page read and write
|
||
350C00704000
|
trusted library allocation
|
page read and write
|
||
28A49F57000
|
heap
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00CA8000
|
trusted library allocation
|
page read and write
|
||
20E000
|
unkown
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0022C000
|
trusted library allocation
|
page read and write
|
||
350C002F0000
|
trusted library allocation
|
page read and write
|
||
350C00734000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC002B8000
|
trusted library allocation
|
page read and write
|
||
20E000
|
unkown
|
page write copy
|
||
824000
|
heap
|
page read and write
|
||
28A49E20000
|
trusted library section
|
page read and write
|
||
350C00F49000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0039C000
|
trusted library allocation
|
page read and write
|
||
350C0101C000
|
trusted library allocation
|
page read and write
|
||
350C00228000
|
trusted library allocation
|
page read and write
|
||
79FC0040C000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00868000
|
trusted library allocation
|
page read and write
|
||
AEBC7FA000
|
stack
|
page read and write
|
||
75C8000
|
heap
|
page read and write
|
||
350C01198000
|
trusted library allocation
|
page read and write
|
||
716B000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
28A481C0000
|
heap
|
page read and write
|
||
350C008E0000
|
trusted library allocation
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
28A50583000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
32B0002DC000
|
direct allocation
|
page read and write
|
||
67400238000
|
trusted library allocation
|
page read and write
|
||
350C002AA000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00220000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
heap
|
page read and write
|
||
350C01001000
|
trusted library allocation
|
page read and write
|
||
28A499E3000
|
heap
|
page read and write
|
||
674002C0000
|
trusted library allocation
|
page read and write
|
||
350C00648000
|
trusted library allocation
|
page read and write
|
||
350C001E8000
|
trusted library allocation
|
page read and write
|
||
350C00388000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
AEBD7FE000
|
stack
|
page read and write
|
||
350C00784000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00B3C000
|
trusted library allocation
|
page read and write
|
||
28A4FBA1000
|
trusted library section
|
page read and write
|
||
350C00954000
|
trusted library allocation
|
page read and write
|
||
75CC000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7EC1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A499C9000
|
heap
|
page read and write
|
||
AECE7FB000
|
stack
|
page read and write
|
||
79FC00250000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00844000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
32B0002AC000
|
direct allocation
|
page read and write
|
||
79FC002C4000
|
trusted library allocation
|
page read and write
|
||
79FC0027C000
|
trusted library allocation
|
page read and write
|
||
350C005AC000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
350C00F49000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
28A46340000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
AEB2FFE000
|
unkown
|
page readonly
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
350C00675000
|
trusted library allocation
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
350C0001C000
|
trusted library allocation
|
page read and write
|
||
AEBFFFE000
|
unkown
|
page readonly
|
||
350C00E4C000
|
trusted library allocation
|
page read and write
|
||
79FC006AC000
|
trusted library allocation
|
page read and write
|
||
79FC006BC000
|
trusted library allocation
|
page read and write
|
||
350C0091C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AECDFFE000
|
unkown
|
page readonly
|
||
350C00E98000
|
trusted library allocation
|
page read and write
|
||
674002B0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C004A4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
350C004A4000
|
trusted library allocation
|
page read and write
|
||
67400260000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00840000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C007A4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
7163000
|
heap
|
page read and write
|
||
28A46589000
|
heap
|
page read and write
|
||
28A481A0000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C00230000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
7163000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00A4C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
716B000
|
heap
|
page read and write
|
||
350C00044000
|
trusted library allocation
|
page read and write
|
||
674002C0000
|
trusted library allocation
|
page read and write
|
||
79FC00884000
|
trusted library allocation
|
page read and write
|
||
79FC002B0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC0025C000
|
trusted library allocation
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
350C01154000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
1965000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
6C20000
|
direct allocation
|
page read and write
|
||
20E000
|
unkown
|
page write copy
|
||
AEC2FFE000
|
unkown
|
page readonly
|
||
153F000
|
unkown
|
page execute and write copy
|
||
32B000284000
|
direct allocation
|
page read and write
|
||
350C00DD4000
|
trusted library allocation
|
page read and write
|
||
71FD000
|
heap
|
page read and write
|
||
28A49F9B000
|
heap
|
page read and write
|
||
350C002C7000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
28A46595000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
28A49F17000
|
heap
|
page read and write
|
||
79FC00220000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00D8C000
|
trusted library allocation
|
page read and write
|
||
75CA000
|
heap
|
page read and write
|
||
350C00520000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
350C00FB8000
|
trusted library allocation
|
page read and write
|
||
350C001C4000
|
trusted library allocation
|
page read and write
|
||
32B000294000
|
direct allocation
|
page read and write
|
||
28A50560000
|
trusted library section
|
page read and write
|
||
28A5095E000
|
trusted library section
|
page read and write
|
||
28A46780000
|
heap
|
page read and write
|
||
AEBAFFE000
|
unkown
|
page readonly
|
||
350C01044000
|
trusted library allocation
|
page read and write
|
||
28A4DEA2000
|
trusted library allocation
|
page read and write
|
||
75C8000
|
heap
|
page read and write
|
||
350C00514000
|
trusted library allocation
|
page read and write
|
||
350C00DC0000
|
trusted library allocation
|
page read and write
|
||
350C00801000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
28A49F3A000
|
heap
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
32B000201000
|
direct allocation
|
page read and write
|
||
79FC006C8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEB27FE000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00074000
|
trusted library allocation
|
page read and write
|
||
350C00090000
|
trusted library allocation
|
page read and write
|
||
350C00B90000
|
trusted library allocation
|
page read and write
|
||
350C0040C000
|
trusted library allocation
|
page read and write
|
||
11BA000
|
unkown
|
page write copy
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
350C00535000
|
trusted library allocation
|
page read and write
|
||
350C0004C000
|
trusted library allocation
|
page read and write
|
||
28A50410000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
79FC00850000
|
trusted library allocation
|
page read and write
|
||
AEC07FE000
|
stack
|
page read and write
|
||
674002C8000
|
trusted library allocation
|
page read and write
|
||
777F000
|
heap
|
page read and write
|
||
350C001B4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00700000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
350C00960000
|
trusted library allocation
|
page read and write
|
||
674002A0000
|
trusted library allocation
|
page read and write
|
||
6740020C000
|
trusted library allocation
|
page read and write
|
||
28A499D0000
|
heap
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A49EFA000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00118000
|
trusted library allocation
|
page read and write
|
||
350C00C58000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0087C000
|
trusted library allocation
|
page read and write
|
||
6C91D000
|
unkown
|
page read and write
|
||
350C003D8000
|
trusted library allocation
|
page read and write
|
||
79FC006F0000
|
trusted library allocation
|
page read and write
|
||
7165000
|
heap
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67400248000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
350C00E64000
|
trusted library allocation
|
page read and write
|
||
350C00001000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00418000
|
trusted library allocation
|
page read and write
|
||
AEDB7FC000
|
stack
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C00A60000
|
trusted library allocation
|
page read and write
|
||
AEB37FE000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
6FA1000
|
heap
|
page read and write
|
||
AEB67FB000
|
stack
|
page read and write
|
||
350C001F0000
|
trusted library allocation
|
page read and write
|
||
28A50512000
|
trusted library section
|
page read and write
|
||
674002A0000
|
trusted library allocation
|
page read and write
|
||
350C00D7C000
|
trusted library allocation
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
78B8000
|
heap
|
page read and write
|
||
32B000270000
|
direct allocation
|
page read and write
|
||
350C00E18000
|
trusted library allocation
|
page read and write
|
||
32B0002EC000
|
direct allocation
|
page read and write
|
||
AEDAFFE000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page readonly
|
||
350C00677000
|
trusted library allocation
|
page read and write
|
||
6C96C000
|
unkown
|
page readonly
|
||
20A000
|
unkown
|
page readonly
|
||
79FC006AC000
|
trusted library allocation
|
page read and write
|
||
1991000
|
heap
|
page read and write
|
||
AEB87FE000
|
stack
|
page read and write
|
||
79FC00844000
|
trusted library allocation
|
page read and write
|
||
75CB000
|
heap
|
page read and write
|
||
350C004FC000
|
trusted library allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AECAFFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
67400230000
|
trusted library allocation
|
page read and write
|
||
350C001B4000
|
trusted library allocation
|
page read and write
|
||
75CD000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75CC000
|
heap
|
page read and write
|
||
79FC00248000
|
trusted library allocation
|
page read and write
|
||
79FC00920000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C002D0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
196C000
|
heap
|
page read and write
|
||
28A501C0000
|
trusted library section
|
page read and write
|
||
28A4E2D7000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
28A4FD50000
|
trusted library section
|
page read and write
|
||
32B000303000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
28A4FBB0000
|
heap
|
page read and write
|
||
350C0009C000
|
trusted library allocation
|
page read and write
|
||
350C009B4000
|
trusted library allocation
|
page read and write
|
||
79FC002DC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A49EF2000
|
heap
|
page read and write
|
||
39E000
|
unkown
|
page read and write
|
||
350C0000C000
|
trusted library allocation
|
page read and write
|
||
350C00DA0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00F00000
|
trusted library allocation
|
page read and write
|
||
350C00020000
|
trusted library allocation
|
page read and write
|
||
350C00FB8000
|
trusted library allocation
|
page read and write
|
||
AEB47FE000
|
stack
|
page read and write
|
||
28A46584000
|
heap
|
page read and write
|
||
28A465A3000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A50C20000
|
trusted library section
|
page read and write
|
||
AEC6FFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C00A01000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
28A49EFE000
|
heap
|
page read and write
|
||
350C005EC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A46750000
|
trusted library section
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
350C002A4000
|
trusted library allocation
|
page read and write
|
||
79FC00801000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C001B4000
|
trusted library allocation
|
page read and write
|
||
350C003C8000
|
trusted library allocation
|
page read and write
|
||
79FC0087C000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
79FC008F0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75C6000
|
heap
|
page read and write
|
||
350C00474000
|
trusted library allocation
|
page read and write
|
||
350C001A0000
|
trusted library allocation
|
page read and write
|
||
28A465A0000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEB8FFE000
|
unkown
|
page readonly
|
||
6C841000
|
unkown
|
page execute read
|
||
350C00A24000
|
trusted library allocation
|
page read and write
|
||
350C00AD4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67400270000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4FC12000
|
trusted library section
|
page read and write
|
||
350C00128000
|
trusted library allocation
|
page read and write
|
||
28A49EF0000
|
heap
|
page read and write
|
||
20E000
|
unkown
|
page write copy
|
||
196B000
|
heap
|
page read and write
|
||
10EE000
|
heap
|
page read and write
|
||
AEBB7FC000
|
stack
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C0120C000
|
trusted library allocation
|
page read and write
|
||
350C001AC000
|
trusted library allocation
|
page read and write
|
||
79FC00880000
|
trusted library allocation
|
page read and write
|
||
350C00694000
|
trusted library allocation
|
page read and write
|
||
79FC008B4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
32B000215000
|
direct allocation
|
page read and write
|
||
AED17FD000
|
stack
|
page read and write
|
||
350C0097C000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
AEB4FFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
28A46490000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AED5FFE000
|
unkown
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
7166000
|
heap
|
page read and write
|
||
350C00D30000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEAF7EF000
|
stack
|
page read and write
|
||
350C003D8000
|
trusted library allocation
|
page read and write
|
||
350C012F4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00FA0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
71FB000
|
heap
|
page read and write
|
||
716D000
|
heap
|
page read and write
|
||
350C003D8000
|
trusted library allocation
|
page read and write
|
||
28A499D0000
|
heap
|
page read and write
|
||
75C1000
|
heap
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
350C00AE8000
|
trusted library allocation
|
page read and write
|
||
75CF000
|
heap
|
page read and write
|
||
350C00FF0000
|
trusted library allocation
|
page read and write
|
||
350C010F8000
|
trusted library allocation
|
page read and write
|
||
28A4FC73000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7FC1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A49F6C000
|
heap
|
page read and write
|
||
28A46551000
|
heap
|
page read and write
|
||
350C00D84000
|
trusted library allocation
|
page read and write
|
||
79FC007E4000
|
trusted library allocation
|
page read and write
|
||
AEB3FFE000
|
unkown
|
page readonly
|
||
28A499D5000
|
heap
|
page read and write
|
||
350C005BC000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
350C01148000
|
trusted library allocation
|
page read and write
|
||
350C008E8000
|
trusted library allocation
|
page read and write
|
||
350C00588000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
350C00210000
|
trusted library allocation
|
page read and write
|
||
350C00ED0000
|
trusted library allocation
|
page read and write
|
||
2EA000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A49EC6000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
AEB0FFE000
|
unkown
|
page readonly
|
||
75C3000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
AEC77FC000
|
stack
|
page read and write
|
||
79FC006AC000
|
trusted library allocation
|
page read and write
|
||
75C4000
|
heap
|
page read and write
|
||
350C003EF000
|
trusted library allocation
|
page read and write
|
||
350C00B50000
|
trusted library allocation
|
page read and write
|
||
350C00FD4000
|
trusted library allocation
|
page read and write
|
||
350C005D0000
|
trusted library allocation
|
page read and write
|
||
79FC008E4000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
20E000
|
unkown
|
page read and write
|
||
AEBA7FB000
|
stack
|
page read and write
|
||
AEDDFFE000
|
unkown
|
page readonly
|
||
75C1000
|
heap
|
page read and write
|
||
350C0074C000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C00DF0000
|
trusted library allocation
|
page read and write
|
||
AED7FFE000
|
unkown
|
page readonly
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C00C78000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
716E000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute and write copy
|
||
28A50642000
|
trusted library section
|
page read and write
|
||
79FC00894000
|
trusted library allocation
|
page read and write
|
||
350C00D0C000
|
trusted library allocation
|
page read and write
|
||
350C00134000
|
trusted library allocation
|
page read and write
|
||
350C00C14000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
AED9FFE000
|
unkown
|
page readonly
|
||
AEDE7FE000
|
stack
|
page read and write
|
||
79FC00424000
|
trusted library allocation
|
page read and write
|
||
350C001AC000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
350C00BC8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC002FC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75C1000
|
heap
|
page read and write
|
||
350C00C98000
|
trusted library allocation
|
page read and write
|
||
350C00F54000
|
trusted library allocation
|
page read and write
|
||
AEDCFFE000
|
unkown
|
page readonly
|
||
28A46586000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C00ED0000
|
trusted library allocation
|
page read and write
|
||
28A465AA000
|
heap
|
page read and write
|
||
79FC0082C000
|
trusted library allocation
|
page read and write
|
||
75C6000
|
heap
|
page read and write
|
||
350C00AF8000
|
trusted library allocation
|
page read and write
|
||
28A4FB87000
|
unclassified section
|
page read and write
|
||
32B000210000
|
direct allocation
|
page read and write
|
||
28A49F01000
|
heap
|
page read and write
|
||
28A49F3E000
|
heap
|
page read and write
|
||
AEBEFFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
75C0000
|
heap
|
page read and write
|
||
350C00B90000
|
trusted library allocation
|
page read and write
|
||
674002A0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
7717000
|
heap
|
page read and write
|
||
716C000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00890000
|
trusted library allocation
|
page read and write
|
||
350C00C3C000
|
trusted library allocation
|
page read and write
|
||
1975000
|
heap
|
page read and write
|
||
350C0039C000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
28A46591000
|
heap
|
page read and write
|
||
28A49EB0000
|
heap
|
page read and write
|
||
777D000
|
heap
|
page read and write
|
||
350C001EC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC00960000
|
trusted library allocation
|
page read and write
|
||
350C00E0C000
|
trusted library allocation
|
page read and write
|
||
32B00024C000
|
direct allocation
|
page read and write
|
||
28A4FD1D000
|
trusted library section
|
page read and write
|
||
350C00D00000
|
trusted library allocation
|
page read and write
|
||
350C0018C000
|
trusted library allocation
|
page read and write
|
||
79FC006E0000
|
trusted library allocation
|
page read and write
|
||
AEC67FA000
|
stack
|
page read and write
|
||
350C004A7000
|
trusted library allocation
|
page read and write
|
||
28A49F73000
|
heap
|
page read and write
|
||
28A49EBF000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C01034000
|
trusted library allocation
|
page read and write
|
||
79FC00210000
|
trusted library allocation
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
7344000
|
direct allocation
|
page read and write
|
||
28A465A8000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A46591000
|
heap
|
page read and write
|
||
28A4654A000
|
heap
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
350C00D5C000
|
trusted library allocation
|
page read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page read and write
|
||
674002E4000
|
trusted library allocation
|
page read and write
|
||
28A499DD000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A50680000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
350C00F49000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
350C00C8C000
|
trusted library allocation
|
page read and write
|
||
350C00D28000
|
trusted library allocation
|
page read and write
|
||
28A499E3000
|
heap
|
page read and write
|
||
2AD000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00D20000
|
trusted library allocation
|
page read and write
|
||
75CB000
|
heap
|
page read and write
|
||
350C00380000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
AED47FE000
|
stack
|
page read and write
|
||
350C0074C000
|
trusted library allocation
|
page read and write
|
||
28A46785000
|
heap
|
page read and write
|
||
350C001AC000
|
trusted library allocation
|
page read and write
|
||
28A50550000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C012F4000
|
trusted library allocation
|
page read and write
|
||
28A4FCB6000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEBBFFE000
|
unkown
|
page readonly
|
||
28A46420000
|
heap
|
page readonly
|
||
350C00F20000
|
trusted library allocation
|
page read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
7166000
|
heap
|
page read and write
|
||
350C001D0000
|
trusted library allocation
|
page read and write
|
||
350C009A4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC0020C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
20E000
|
unkown
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
28A4FDC7000
|
unclassified section
|
page read and write
|
||
AEB5FFE000
|
unkown
|
page readonly
|
||
3280000
|
direct allocation
|
page execute and read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0105C000
|
trusted library allocation
|
page read and write
|
||
28A465A8000
|
heap
|
page read and write
|
||
350C00484000
|
trusted library allocation
|
page read and write
|
||
32B000290000
|
direct allocation
|
page read and write
|
||
79FC0039C000
|
trusted library allocation
|
page read and write
|
||
7779000
|
heap
|
page read and write
|
||
79FC0095C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C01050000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4FA17000
|
unclassified section
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4A220000
|
trusted library section
|
page read and write
|
||
350C000B4000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
28A4E284000
|
heap
|
page read and write
|
||
75CA000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
71FD000
|
heap
|
page read and write
|
||
674002B0000
|
trusted library allocation
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
350C00C0C000
|
trusted library allocation
|
page read and write
|
||
AECD7FC000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
7160000
|
heap
|
page read and write
|
||
350C00FB8000
|
trusted library allocation
|
page read and write
|
||
79FC00418000
|
trusted library allocation
|
page read and write
|
||
28A49F07000
|
heap
|
page read and write
|
||
6C91F000
|
unkown
|
page readonly
|
||
350C00C24000
|
trusted library allocation
|
page read and write
|
||
28A46480000
|
trusted library allocation
|
page read and write
|
||
350C0086C000
|
trusted library allocation
|
page read and write
|
||
350C01160000
|
trusted library allocation
|
page read and write
|
||
28A49F48000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC0084C000
|
trusted library allocation
|
page read and write
|
||
350C00304000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
79FC0080C000
|
trusted library allocation
|
page read and write
|
||
350C002B8000
|
trusted library allocation
|
page read and write
|
||
79FC002EC000
|
trusted library allocation
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
79FC00828000
|
trusted library allocation
|
page read and write
|
||
28A465A0000
|
heap
|
page read and write
|
||
AEB07FE000
|
unkown
|
page read and write
|
||
79FC00230000
|
trusted library allocation
|
page read and write
|
||
350C00DD4000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
350C00EA0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
28A49F4F000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
350C00A0C000
|
trusted library allocation
|
page read and write
|
||
350C00080000
|
trusted library allocation
|
page read and write
|
||
7FC2000
|
heap
|
page read and write
|
||
716B000
|
heap
|
page read and write
|
||
AED67FD000
|
stack
|
page read and write
|
||
79FC006F4000
|
trusted library allocation
|
page read and write
|
||
350C00BE8000
|
trusted library allocation
|
page read and write
|
||
1A8E000
|
stack
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
674002B0000
|
trusted library allocation
|
page read and write
|
||
AECFFFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
7FC2000
|
heap
|
page read and write
|
||
196B000
|
heap
|
page read and write
|
||
350C006F4000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C0059C000
|
trusted library allocation
|
page read and write
|
||
350C01201000
|
trusted library allocation
|
page read and write
|
||
75C3000
|
heap
|
page read and write
|
||
D6C000
|
stack
|
page read and write
|
||
350C003BC000
|
trusted library allocation
|
page read and write
|
||
350C01084000
|
trusted library allocation
|
page read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
350C0060C000
|
trusted library allocation
|
page read and write
|
||
AEB97FB000
|
stack
|
page read and write
|
||
350C00464000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
28A4658E000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
350C01084000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0006A000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page readonly
|
||
79FC008C4000
|
trusted library allocation
|
page read and write
|
||
28A49EF6000
|
heap
|
page read and write
|
||
350C0020C000
|
trusted library allocation
|
page read and write
|
||
28A5051E000
|
trusted library section
|
page read and write
|
||
79FC00964000
|
trusted library allocation
|
page read and write
|
||
350C00BB8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A499D6000
|
heap
|
page read and write
|
||
32B000234000
|
direct allocation
|
page read and write
|
||
674002F4000
|
trusted library allocation
|
page read and write
|
||
79FC007D4000
|
trusted library allocation
|
page read and write
|
||
350C010A8000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
AEDC7FE000
|
stack
|
page read and write
|
||
350C0100C000
|
trusted library allocation
|
page read and write
|
||
AEDD7FE000
|
stack
|
page read and write
|
||
79FC00288000
|
trusted library allocation
|
page read and write
|
||
350C0119C000
|
trusted library allocation
|
page read and write
|
||
350C00710000
|
trusted library allocation
|
page read and write
|
||
350C010C4000
|
trusted library allocation
|
page read and write
|
||
7167000
|
heap
|
page read and write
|
||
350C011A8000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
79FC006D4000
|
trusted library allocation
|
page read and write
|
||
350C00201000
|
trusted library allocation
|
page read and write
|
||
350C00FB4000
|
trusted library allocation
|
page read and write
|
||
350C004F0000
|
trusted library allocation
|
page read and write
|
||
350C00218000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
75C9000
|
heap
|
page read and write
|
||
350C01098000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00C68000
|
trusted library allocation
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
772F000
|
heap
|
page read and write
|
||
350C00BE0000
|
trusted library allocation
|
page read and write
|
||
1971000
|
heap
|
page read and write
|
||
350C008C4000
|
trusted library allocation
|
page read and write
|
||
350C001D4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
75C4000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
674002C0000
|
trusted library allocation
|
page read and write
|
||
1974000
|
heap
|
page read and write
|
||
771B000
|
heap
|
page read and write
|
||
350C006DC000
|
trusted library allocation
|
page read and write
|
||
28A46430000
|
heap
|
page read and write
|
||
1979000
|
heap
|
page read and write
|
||
79FC007C0000
|
trusted library allocation
|
page read and write
|
||
28A464B0000
|
heap
|
page read and write
|
||
AEC57FB000
|
stack
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AED8FFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
350C00FA0000
|
trusted library allocation
|
page read and write
|
||
79FC00790000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC0085C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67400288000
|
trusted library allocation
|
page read and write
|
||
79FC00864000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AED77FE000
|
stack
|
page read and write
|
||
350C00E68000
|
trusted library allocation
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00DE4000
|
trusted library allocation
|
page read and write
|
||
350C011B4000
|
trusted library allocation
|
page read and write
|
||
350C002B4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
720A000
|
heap
|
page read and write
|
||
7161000
|
heap
|
page read and write
|
||
28A499B0000
|
heap
|
page read and write
|
||
350C00EF0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
AEC0FFE000
|
unkown
|
page readonly
|
||
350C002C4000
|
trusted library allocation
|
page read and write
|
||
350C0034C000
|
trusted library allocation
|
page read and write
|
||
AECCFFE000
|
unkown
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
79FC00830000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C004A4000
|
trusted library allocation
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write
|
||
79FC0091C000
|
trusted library allocation
|
page read and write
|
||
350C001F4000
|
trusted library allocation
|
page read and write
|
||
350C002A4000
|
trusted library allocation
|
page read and write
|
||
1928000
|
heap
|
page read and write
|
||
350C01178000
|
trusted library allocation
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
79FC006F4000
|
trusted library allocation
|
page read and write
|
||
6C969000
|
unkown
|
page read and write
|
||
350C00F6C000
|
trusted library allocation
|
page read and write
|
||
350C002A8000
|
trusted library allocation
|
page read and write
|
||
79FC00974000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
75CB000
|
heap
|
page read and write
|
||
79FC00778000
|
trusted library allocation
|
page read and write
|
||
350C00D64000
|
trusted library allocation
|
page read and write
|
||
350C002FB000
|
trusted library allocation
|
page read and write
|
||
350C003B4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0021C000
|
trusted library allocation
|
page read and write
|
||
AEB7FFE000
|
unkown
|
page readonly
|
||
28A49ECE000
|
heap
|
page read and write
|
||
AEC17FE000
|
stack
|
page read and write
|
||
350C001E4000
|
trusted library allocation
|
page read and write
|
||
350C00B30000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
28A4FB20000
|
heap
|
page read and write
|
||
32B0002D0000
|
direct allocation
|
page read and write
|
||
79FC00728000
|
trusted library allocation
|
page read and write
|
||
28A50950000
|
trusted library section
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
1975000
|
heap
|
page read and write
|
||
350C00EAC000
|
trusted library allocation
|
page read and write
|
||
350C00C01000
|
trusted library allocation
|
page read and write
|
||
AEC9FFE000
|
unkown
|
page readonly
|
||
32B000274000
|
direct allocation
|
page read and write
|
||
350C001AC000
|
trusted library allocation
|
page read and write
|
||
7161000
|
heap
|
page read and write
|
||
79FC008F4000
|
trusted library allocation
|
page read and write
|
||
79FC00408000
|
trusted library allocation
|
page read and write
|
||
350C00300000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C00CE0000
|
trusted library allocation
|
page read and write
|
||
AED07FE000
|
stack
|
page read and write
|
||
350C002CC000
|
trusted library allocation
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
350C00DF0000
|
trusted library allocation
|
page read and write
|
||
350C00BC0000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00904000
|
trusted library allocation
|
page read and write
|
||
AEC37FC000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AED1FFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEC8FFE000
|
unkown
|
page readonly
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00ED8000
|
trusted library allocation
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
350C01184000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C0098C000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
67A1000
|
heap
|
page read and write
|
||
350C00D74000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
350C00F60000
|
trusted library allocation
|
page read and write
|
||
AED87FE000
|
stack
|
page read and write
|
||
67400220000
|
trusted library allocation
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
79FC0060C000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
350C00CF0000
|
trusted library allocation
|
page read and write
|
||
28A4659C000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C01100000
|
trusted library allocation
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C006A4000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
79FC007C4000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
350C01264000
|
trusted library allocation
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
350C0051A000
|
trusted library allocation
|
page read and write
|
||
28A48C10000
|
unkown
|
page read and write
|
||
350C00E30000
|
trusted library allocation
|
page read and write
|
||
67400294000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C01300000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
350C0080C000
|
trusted library allocation
|
page read and write
|
||
79FC008B8000
|
trusted library allocation
|
page read and write
|
||
AEC7FFE000
|
unkown
|
page readonly
|
||
28A46591000
|
heap
|
page read and write
|
||
28A499D0000
|
heap
|
page read and write
|
||
67400250000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C003A8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00388000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEC4FFE000
|
unkown
|
page readonly
|
||
7916000
|
heap
|
page read and write
|
||
AEB9FFE000
|
unkown
|
page readonly
|
||
350C00194000
|
trusted library allocation
|
page read and write
|
||
28A499D8000
|
heap
|
page read and write
|
||
79FC007AC000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4FB90000
|
trusted library section
|
page read and write
|
||
350C0034C000
|
trusted library allocation
|
page read and write
|
||
350C002F0000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00DB9000
|
trusted library allocation
|
page read and write
|
||
350C00ED4000
|
trusted library allocation
|
page read and write
|
||
1979000
|
heap
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
350C0106C000
|
trusted library allocation
|
page read and write
|
||
28A50700000
|
trusted library section
|
page read and write
|
||
350C00618000
|
trusted library allocation
|
page read and write
|
||
793B000
|
heap
|
page read and write
|
||
350C0017C000
|
trusted library allocation
|
page read and write
|
||
674002A0000
|
trusted library allocation
|
page read and write
|
||
28A50571000
|
trusted library section
|
page read and write
|
||
350C00710000
|
trusted library allocation
|
page read and write
|
||
75CF000
|
heap
|
page read and write
|
||
28A4E2C3000
|
heap
|
page read and write
|
||
350C003EC000
|
trusted library allocation
|
page read and write
|
||
79FC00980000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEB17FF000
|
stack
|
page read and write
|
||
674002F8000
|
trusted library allocation
|
page read and write
|
||
716F000
|
heap
|
page read and write
|
||
350C00B9C000
|
trusted library allocation
|
page read and write
|
||
79FC0078C000
|
trusted library allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
32B000230000
|
direct allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
67400235000
|
trusted library allocation
|
page read and write
|
||
350C00517000
|
trusted library allocation
|
page read and write
|
||
AEBE7FE000
|
stack
|
page read and write
|
||
28A49EF4000
|
heap
|
page read and write
|
||
AEB57FD000
|
stack
|
page read and write
|
||
79FC00874000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
32B000250000
|
direct allocation
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
AEBCFFE000
|
unkown
|
page readonly
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00E24000
|
trusted library allocation
|
page read and write
|
||
67400264000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4657C000
|
heap
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
28A4FBB3000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
28A4A1A0000
|
trusted library section
|
page read and write
|
||
32B000220000
|
direct allocation
|
page read and write
|
||
79FC00904000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C002F3000
|
trusted library allocation
|
page read and write
|
||
32B0002E4000
|
direct allocation
|
page read and write
|
||
AECA7FC000
|
stack
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
79FC0070C000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
AEBF7FE000
|
stack
|
page read and write
|
||
350C00B08000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00DD4000
|
trusted library allocation
|
page read and write
|
||
350C00290000
|
trusted library allocation
|
page read and write
|
||
28A499D5000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00F7C000
|
trusted library allocation
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
28A4E289000
|
heap
|
page read and write
|
||
28A499D5000
|
heap
|
page read and write
|
||
79FC0081C000
|
trusted library allocation
|
page read and write
|
||
20A000
|
unkown
|
page readonly
|
||
824000
|
heap
|
page read and write
|
||
79FC002F4000
|
trusted library allocation
|
page read and write
|
||
28A5064D000
|
trusted library section
|
page read and write
|
||
350C0034C000
|
trusted library allocation
|
page read and write
|
||
350C00E40000
|
trusted library allocation
|
page read and write
|
||
716F000
|
heap
|
page read and write
|
||
79FC00818000
|
trusted library allocation
|
page read and write
|
||
350C0053B000
|
trusted library allocation
|
page read and write
|
||
AED37FD000
|
stack
|
page read and write
|
||
350C01194000
|
trusted library allocation
|
page read and write
|
||
773A000
|
heap
|
page read and write
|
||
28A49F64000
|
heap
|
page read and write
|
||
350C000DC000
|
trusted library allocation
|
page read and write
|
||
350C01190000
|
trusted library allocation
|
page read and write
|
||
28A499A0000
|
heap
|
page read and write
|
||
67400274000
|
trusted library allocation
|
page read and write
|
||
350C002AA000
|
trusted library allocation
|
page read and write
|
||
350C01110000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
direct allocation
|
page execute and read and write
|
||
350C0035C000
|
trusted library allocation
|
page read and write
|
||
350C00F7C000
|
trusted library allocation
|
page read and write
|
||
28A481C3000
|
heap
|
page read and write
|
||
7719000
|
heap
|
page read and write
|
||
350C007DC000
|
trusted library allocation
|
page read and write
|
||
32B000260000
|
direct allocation
|
page read and write
|
||
79FC00918000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C01264000
|
trusted library allocation
|
page read and write
|
||
75CA000
|
heap
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C009D4000
|
trusted library allocation
|
page read and write
|
||
79FC0079C000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
350C0084C000
|
trusted library allocation
|
page read and write
|
||
28A4FC00000
|
trusted library section
|
page read and write
|
||
AEC47FC000
|
stack
|
page read and write
|
||
350C00E88000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00E7C000
|
trusted library allocation
|
page read and write
|
||
674002C0000
|
trusted library allocation
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
79FC00860000
|
trusted library allocation
|
page read and write
|
||
1971000
|
heap
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
1918000
|
heap
|
page read and write
|
||
674002BC000
|
trusted library allocation
|
page read and write
|
||
1998000
|
heap
|
page read and write
|
||
350C0034C000
|
trusted library allocation
|
page read and write
|
||
350C00394000
|
trusted library allocation
|
page read and write
|
||
6FC2000
|
heap
|
page read and write
|
||
350C00A38000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
1C8F000
|
stack
|
page read and write
|
||
350C0112C000
|
trusted library allocation
|
page read and write
|
||
28A49F7B000
|
heap
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
350C00910000
|
trusted library allocation
|
page read and write
|
||
350C006B4000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
350C00ED8000
|
trusted library allocation
|
page read and write
|
||
350C001D8000
|
trusted library allocation
|
page read and write
|
||
6C968000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C00660000
|
trusted library allocation
|
page read and write
|
||
716A000
|
heap
|
page read and write
|
||
350C00FC4000
|
trusted library allocation
|
page read and write
|
||
AED0FFE000
|
unkown
|
page readonly
|
||
67A1000
|
heap
|
page read and write
|
||
350C000FC000
|
trusted library allocation
|
page read and write
|
||
79FC006E8000
|
trusted library allocation
|
page read and write
|
||
67A1000
|
heap
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
28A50907000
|
unclassified section
|
page read and write
|
||
28A4A0C0000
|
trusted library section
|
page read and write
|
||
350C003D8000
|
trusted library allocation
|
page read and write
|
||
350C00D98000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
7346000
|
direct allocation
|
page read and write
|
||
350C00601000
|
trusted library allocation
|
page read and write
|
There are 1271 hidden memdumps, click here to show them.