Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rGABp2MFj4.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rGABp2MFj4.exe_5021269d1b91148d215487fae3e2978b8ef25858_46079964_5e4b9f07-1aa6-4893-b1cd-551eb5cb1d15\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B22.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 07:43:17 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43ED.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44E8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rGABp2MFj4.exe
|
"C:\Users\user\Desktop\rGABp2MFj4.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2532 --field-trial-handle=2272,i,11391944935882270509,647615027426193092,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1212
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/5750~
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://anglebug.com/7899MS
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://chrome.google.com/webstoreS
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/3625Vulkan
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webappS
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://anglebug.com/7369St
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://drive-daily-5.corp.go
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
172.217.19.228
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
172.217.19.228
|
www.google.com
|
United States
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
ProgramId
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
FileId
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
LongPathHash
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Name
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
OriginalFileName
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Publisher
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Version
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
BinFileVersion
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
BinaryType
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
ProductName
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
ProductVersion
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
LinkDate
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
BinProductVersion
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
AppxPackageFullName
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Size
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Language
|
||
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6E61000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C800238000
|
trusted library allocation
|
page read and write
|
||
131D05FD000
|
heap
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
7831000
|
heap
|
page read and write
|
||
318B1FE000
|
unkown
|
page read and write
|
||
7F05000
|
heap
|
page read and write
|
||
5300005C4000
|
trusted library allocation
|
page read and write
|
||
80F7000
|
heap
|
page read and write
|
||
150800290000
|
direct allocation
|
page read and write
|
||
530000DB0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
55C800920000
|
trusted library allocation
|
page read and write
|
||
131D73E3000
|
trusted library section
|
page read and write
|
||
131CCF80000
|
heap
|
page read and write
|
||
7F22000
|
heap
|
page read and write
|
||
53000030C000
|
trusted library allocation
|
page read and write
|
||
7EFA000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31AC9FE000
|
unkown
|
page readonly
|
||
5300007B1000
|
trusted library allocation
|
page read and write
|
||
31AA9FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
55C8007E4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000560000
|
trusted library allocation
|
page read and write
|
||
31949FE000
|
unkown
|
page readonly
|
||
7A04000
|
direct allocation
|
page read and write
|
||
55C800890000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D6CC0000
|
trusted library section
|
page read and write
|
||
7F32000
|
heap
|
page read and write
|
||
530000904000
|
trusted library allocation
|
page read and write
|
||
131D7351000
|
trusted library section
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
318D9FE000
|
unkown
|
page readonly
|
||
31A29FE000
|
unkown
|
page readonly
|
||
530000DC8000
|
trusted library allocation
|
page read and write
|
||
5E0000294000
|
trusted library allocation
|
page read and write
|
||
55C800848000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
8134000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8007AC000
|
trusted library allocation
|
page read and write
|
||
530000AB8000
|
trusted library allocation
|
page read and write
|
||
530000CB8000
|
trusted library allocation
|
page read and write
|
||
530001080000
|
trusted library allocation
|
page read and write
|
||
5300005AC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
530001090000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000E4C000
|
trusted library allocation
|
page read and write
|
||
55C800960000
|
trusted library allocation
|
page read and write
|
||
318F9FE000
|
unkown
|
page readonly
|
||
6C6A0000
|
unkown
|
page readonly
|
||
530000988000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
5300001A0000
|
trusted library allocation
|
page read and write
|
||
31A31FC000
|
stack
|
page read and write
|
||
530000364000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
55C8008E8000
|
trusted library allocation
|
page read and write
|
||
7F00000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
5300008F4000
|
trusted library allocation
|
page read and write
|
||
530000300000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000D08000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
31989FE000
|
unkown
|
page readonly
|
||
70A000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
530000A18000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31979FE000
|
unkown
|
page readonly
|
||
150800274000
|
direct allocation
|
page read and write
|
||
31A99FE000
|
unkown
|
page readonly
|
||
131D2DE0000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
heap
|
page read and write
|
||
530000C54000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001AC000
|
trusted library allocation
|
page read and write
|
||
131D0B28000
|
heap
|
page read and write
|
||
530000E2C000
|
trusted library allocation
|
page read and write
|
||
31B59FE000
|
unkown
|
page readonly
|
||
31A39FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
530000700000
|
trusted library allocation
|
page read and write
|
||
55C8002B8000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
55C80079C000
|
trusted library allocation
|
page read and write
|
||
31A81FD000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001EC000
|
trusted library allocation
|
page read and write
|
||
150800217000
|
direct allocation
|
page read and write
|
||
55C8008D8000
|
trusted library allocation
|
page read and write
|
||
55C8006C8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
530000CB0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300010C0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000029E000
|
trusted library allocation
|
page read and write
|
||
530000294000
|
trusted library allocation
|
page read and write
|
||
5300001D8000
|
trusted library allocation
|
page read and write
|
||
31999FE000
|
unkown
|
page readonly
|
||
530000340000
|
trusted library allocation
|
page read and write
|
||
530000324000
|
trusted library allocation
|
page read and write
|
||
31969FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
53000003C000
|
trusted library allocation
|
page read and write
|
||
8049000
|
heap
|
page read and write
|
||
530000C01000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
143A000
|
unkown
|
page write copy
|
||
5E00002C0000
|
trusted library allocation
|
page read and write
|
||
530000494000
|
trusted library allocation
|
page read and write
|
||
530000294000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300009EC000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
1D6A000
|
heap
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
5E00002F0000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000D4C000
|
trusted library allocation
|
page read and write
|
||
131D67B6000
|
trusted library section
|
page read and write
|
||
530000194000
|
trusted library allocation
|
page read and write
|
||
131D0B85000
|
heap
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
31B19FE000
|
unkown
|
page readonly
|
||
55C800250000
|
trusted library allocation
|
page read and write
|
||
131D05D0000
|
heap
|
page read and write
|
||
319C1FE000
|
stack
|
page read and write
|
||
774F000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D6850000
|
trusted library section
|
page read and write
|
||
530000D78000
|
trusted library allocation
|
page read and write
|
||
31961FD000
|
stack
|
page read and write
|
||
131D0B65000
|
heap
|
page read and write
|
||
530000864000
|
trusted library allocation
|
page read and write
|
||
530000298000
|
trusted library allocation
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
55C800230000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1D6B000
|
heap
|
page read and write
|
||
55C800868000
|
trusted library allocation
|
page read and write
|
||
530000C7F000
|
trusted library allocation
|
page read and write
|
||
77A3000
|
heap
|
page read and write
|
||
15080023C000
|
direct allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
7F00000
|
heap
|
page read and write
|
||
31AE9FE000
|
unkown
|
page readonly
|
||
55C800220000
|
trusted library allocation
|
page read and write
|
||
1D74000
|
heap
|
page read and write
|
||
530000014000
|
trusted library allocation
|
page read and write
|
||
5300008BC000
|
trusted library allocation
|
page read and write
|
||
55C80095C000
|
trusted library allocation
|
page read and write
|
||
146D000
|
stack
|
page read and write
|
||
80ED000
|
heap
|
page read and write
|
||
7FB5000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7F5E000
|
heap
|
page read and write
|
||
7F22000
|
heap
|
page read and write
|
||
530001110000
|
trusted library allocation
|
page read and write
|
||
55C8006AC000
|
trusted library allocation
|
page read and write
|
||
530000C7C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000780000
|
trusted library allocation
|
page read and write
|
||
530000401000
|
trusted library allocation
|
page read and write
|
||
131D713E000
|
trusted library section
|
page read and write
|
||
530000949000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
530000648000
|
trusted library allocation
|
page read and write
|
||
53000080C000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
530000594000
|
trusted library allocation
|
page read and write
|
||
5300009CC000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
530000338000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DCE000
|
heap
|
page read and write
|
||
31939FE000
|
unkown
|
page readonly
|
||
131CEE43000
|
heap
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300002E0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8008F4000
|
trusted library allocation
|
page read and write
|
||
131CCFF0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D05EE000
|
heap
|
page read and write
|
||
55C800404000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300005DC000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
53000020C000
|
trusted library allocation
|
page read and write
|
||
7E76000
|
heap
|
page read and write
|
||
31AD1FD000
|
stack
|
page read and write
|
||
55C800430000
|
trusted library allocation
|
page read and write
|
||
55C8002E4000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
530000EF4000
|
trusted library allocation
|
page read and write
|
||
31AF9FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
5300010D8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D05C0000
|
heap
|
page read and write
|
||
55C80027C000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
direct allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000F44000
|
trusted library allocation
|
page read and write
|
||
318E9FE000
|
unkown
|
page readonly
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
530001144000
|
trusted library allocation
|
page read and write
|
||
55C80084C000
|
trusted library allocation
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
7DCF000
|
heap
|
page read and write
|
||
530000A8C000
|
trusted library allocation
|
page read and write
|
||
55C8008A8000
|
trusted library allocation
|
page read and write
|
||
5300010B4000
|
trusted library allocation
|
page read and write
|
||
131D05F2000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E00002C0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000018C000
|
trusted library allocation
|
page read and write
|
||
131D0BDF000
|
heap
|
page read and write
|
||
5300002F7000
|
trusted library allocation
|
page read and write
|
||
530000FD0000
|
trusted library allocation
|
page read and write
|
||
55C80087C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C800964000
|
trusted library allocation
|
page read and write
|
||
5300007EC000
|
trusted library allocation
|
page read and write
|
||
53000081C000
|
trusted library allocation
|
page read and write
|
||
55C8008F0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D05FB000
|
heap
|
page read and write
|
||
31A79FE000
|
unkown
|
page readonly
|
||
530000720000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
530000F98000
|
trusted library allocation
|
page read and write
|
||
530000D94000
|
trusted library allocation
|
page read and write
|
||
131D05F3000
|
heap
|
page read and write
|
||
530000690000
|
trusted library allocation
|
page read and write
|
||
530000B98000
|
trusted library allocation
|
page read and write
|
||
530000F88000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000A48000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31A31FA000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
298E000
|
unkown
|
page read and write
|
||
7FDA000
|
heap
|
page read and write
|
||
31B01FD000
|
stack
|
page read and write
|
||
55C80078C000
|
trusted library allocation
|
page read and write
|
||
5E00002E4000
|
trusted library allocation
|
page read and write
|
||
5E00002B0000
|
trusted library allocation
|
page read and write
|
||
530000DBC000
|
trusted library allocation
|
page read and write
|
||
1D97000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31B11FE000
|
stack
|
page read and write
|
||
31B39FE000
|
unkown
|
page readonly
|
||
1D8C000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
530000ED8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000884000
|
trusted library allocation
|
page read and write
|
||
814B000
|
heap
|
page read and write
|
||
530000BE8000
|
trusted library allocation
|
page read and write
|
||
31AB9FE000
|
unkown
|
page readonly
|
||
5300001F0000
|
trusted library allocation
|
page read and write
|
||
28BA000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1D11000
|
heap
|
page read and write
|
||
530000BF8000
|
trusted library allocation
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
5300009A4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7932000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
1C74000
|
heap
|
page read and write
|
||
55C800974000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
131D2DF0000
|
trusted library section
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
530000224000
|
trusted library allocation
|
page read and write
|
||
150800250000
|
direct allocation
|
page read and write
|
||
530000430000
|
trusted library allocation
|
page read and write
|
||
530000C7C000
|
trusted library allocation
|
page read and write
|
||
530000F6C000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
7DC0000
|
heap
|
page read and write
|
||
131CCF90000
|
heap
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
530000494000
|
trusted library allocation
|
page read and write
|
||
150800280000
|
direct allocation
|
page read and write
|
||
530000954000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E00002A0000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
7E54000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31A49FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
530000484000
|
trusted library allocation
|
page read and write
|
||
7E8B000
|
heap
|
page read and write
|
||
131D0C00000
|
trusted library section
|
page read and write
|
||
1508002DC000
|
direct allocation
|
page read and write
|
||
530000C58000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
31A61FB000
|
stack
|
page read and write
|
||
5300000DC000
|
trusted library allocation
|
page read and write
|
||
55C800801000
|
trusted library allocation
|
page read and write
|
||
53000032C000
|
trusted library allocation
|
page read and write
|
||
5300006D0000
|
trusted library allocation
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
5300009BC000
|
trusted library allocation
|
page read and write
|
||
131D0B43000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
711000
|
unkown
|
page readonly
|
||
530000201000
|
trusted library allocation
|
page read and write
|
||
131D6812000
|
trusted library section
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
1C74000
|
heap
|
page read and write
|
||
7EB4000
|
heap
|
page read and write
|
||
1508002AC000
|
direct allocation
|
page read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
150800210000
|
direct allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131CD295000
|
heap
|
page read and write
|
||
530000434000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C80039C000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
70E000
|
unkown
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DC9000
|
heap
|
page read and write
|
||
5300001C8000
|
trusted library allocation
|
page read and write
|
||
530000858000
|
trusted library allocation
|
page read and write
|
||
131CD0ED000
|
heap
|
page read and write
|
||
530000D94000
|
trusted library allocation
|
page read and write
|
||
55C8007BC000
|
trusted library allocation
|
page read and write
|
||
53000096C000
|
trusted library allocation
|
page read and write
|
||
530000978000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
5E00002C0000
|
trusted library allocation
|
page read and write
|
||
5300007D0000
|
trusted library allocation
|
page read and write
|
||
55C8006F4000
|
trusted library allocation
|
page read and write
|
||
55C80081C000
|
trusted library allocation
|
page read and write
|
||
131D7486000
|
trusted library section
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
1D74000
|
heap
|
page read and write
|
||
55C800874000
|
trusted library allocation
|
page read and write
|
||
530000ACC000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
55C8002FC000
|
trusted library allocation
|
page read and write
|
||
530000C7C000
|
trusted library allocation
|
page read and write
|
||
5300009D4000
|
trusted library allocation
|
page read and write
|
||
802C000
|
heap
|
page read and write
|
||
131D0BE7000
|
heap
|
page read and write
|
||
530000C1C000
|
trusted library allocation
|
page read and write
|
||
131CD124000
|
heap
|
page read and write
|
||
7FA3000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
55C8006C8000
|
trusted library allocation
|
page read and write
|
||
53000021C000
|
trusted library allocation
|
page read and write
|
||
318C1FE000
|
stack
|
page read and write
|
||
15080024C000
|
direct allocation
|
page read and write
|
||
131D0B72000
|
heap
|
page read and write
|
||
131CCFD0000
|
heap
|
page read and write
|
||
530000F50000
|
trusted library allocation
|
page read and write
|
||
530000950000
|
trusted library allocation
|
page read and write
|
||
530000AC8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7EB5000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
5E0000270000
|
trusted library allocation
|
page read and write
|
||
530000FC0000
|
trusted library allocation
|
page read and write
|
||
530000CD0000
|
trusted library allocation
|
page read and write
|
||
55C800401000
|
trusted library allocation
|
page read and write
|
||
7DCC000
|
heap
|
page read and write
|
||
530000B48000
|
trusted library allocation
|
page read and write
|
||
131D4F51000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
7DC7000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E0000260000
|
trusted library allocation
|
page read and write
|
||
5300003A4000
|
trusted library allocation
|
page read and write
|
||
319F9FE000
|
unkown
|
page readonly
|
||
530000AA8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
131D4A52000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
55C800248000
|
trusted library allocation
|
page read and write
|
||
530000F04000
|
trusted library allocation
|
page read and write
|
||
530000A01000
|
trusted library allocation
|
page read and write
|
||
55C8008B4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000017C000
|
trusted library allocation
|
page read and write
|
||
55C8006D4000
|
trusted library allocation
|
page read and write
|
||
7DC7000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000738000
|
trusted library allocation
|
page read and write
|
||
31B71FC000
|
stack
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300006E0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DCD000
|
heap
|
page read and write
|
||
6C7CC000
|
unkown
|
page readonly
|
||
530000601000
|
trusted library allocation
|
page read and write
|
||
55C8006E0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300002B4000
|
trusted library allocation
|
page read and write
|
||
5300000A8000
|
trusted library allocation
|
page read and write
|
||
7DC7000
|
heap
|
page read and write
|
||
5300001E0000
|
trusted library allocation
|
page read and write
|
||
131D66B2000
|
trusted library section
|
page read and write
|
||
55C800860000
|
trusted library allocation
|
page read and write
|
||
530000300000
|
trusted library allocation
|
page read and write
|
||
53000100C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
7DC7000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000F80000
|
trusted library allocation
|
page read and write
|
||
5300010E4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
1CFF000
|
stack
|
page read and write
|
||
31931FE000
|
stack
|
page read and write
|
||
131D73B0000
|
trusted library section
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31B41FE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
5E00002F4000
|
trusted library allocation
|
page read and write
|
||
131D0B7D000
|
heap
|
page read and write
|
||
5E0000230000
|
trusted library allocation
|
page read and write
|
||
530000F60000
|
trusted library allocation
|
page read and write
|
||
530000A0C000
|
trusted library allocation
|
page read and write
|
||
31A01FD000
|
stack
|
page read and write
|
||
530000429000
|
trusted library allocation
|
page read and write
|
||
55C80039C000
|
trusted library allocation
|
page read and write
|
||
5E00002A0000
|
trusted library allocation
|
page read and write
|
||
530000C7C000
|
trusted library allocation
|
page read and write
|
||
530000768000
|
trusted library allocation
|
page read and write
|
||
530000E58000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DC0000
|
heap
|
page read and write
|
||
31A91FB000
|
stack
|
page read and write
|
||
530000E8C000
|
trusted library allocation
|
page read and write
|
||
319B9FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
31941FB000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7E57000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
131D0B16000
|
heap
|
page read and write
|
||
5300006F4000
|
trusted library allocation
|
page read and write
|
||
2C8B000
|
heap
|
page read and write
|
||
530000CA8000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
direct allocation
|
page read and write
|
||
55C8002D4000
|
trusted library allocation
|
page read and write
|
||
7F80000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D5367000
|
unclassified section
|
page read and write
|
||
131D0B6E000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
5E0000274000
|
trusted library allocation
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
55C8006E8000
|
trusted library allocation
|
page read and write
|
||
5300007B3000
|
trusted library allocation
|
page read and write
|
||
5300008C0000
|
trusted library allocation
|
page read and write
|
||
80BD000
|
heap
|
page read and write
|
||
1508002E4000
|
direct allocation
|
page read and write
|
||
530000218000
|
trusted library allocation
|
page read and write
|
||
131D05FF000
|
heap
|
page read and write
|
||
7EB6000
|
heap
|
page read and write
|
||
131D6743000
|
trusted library section
|
page read and write
|
||
7F64000
|
heap
|
page read and write
|
||
530000474000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000030C000
|
trusted library allocation
|
page read and write
|
||
530000B94000
|
trusted library allocation
|
page read and write
|
||
5300002A4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000E20000
|
trusted library allocation
|
page read and write
|
||
530000CF9000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7ED5000
|
heap
|
page read and write
|
||
5300006D4000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
530000FC0000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000230000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
7DC5000
|
heap
|
page read and write
|
||
530000B5C000
|
trusted library allocation
|
page read and write
|
||
55C800700000
|
trusted library allocation
|
page read and write
|
||
7E92000
|
heap
|
page read and write
|
||
530000D71000
|
trusted library allocation
|
page read and write
|
||
7DC9000
|
heap
|
page read and write
|
||
530000318000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C80085C000
|
trusted library allocation
|
page read and write
|
||
55C8002F0000
|
trusted library allocation
|
page read and write
|
||
530000EE8000
|
trusted library allocation
|
page read and write
|
||
7DC4000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
530000927000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131CD030000
|
heap
|
page read and write
|
||
55C8008C8000
|
trusted library allocation
|
page read and write
|
||
530000AF4000
|
trusted library allocation
|
page read and write
|
||
530000F44000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000118000
|
trusted library allocation
|
page read and write
|
||
5300006B0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
5300001D4000
|
trusted library allocation
|
page read and write
|
||
131D6EC7000
|
unclassified section
|
page read and write
|
||
5300000FC000
|
trusted library allocation
|
page read and write
|
||
131D2E77000
|
unclassified section
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530001001000
|
trusted library allocation
|
page read and write
|
||
53000015C000
|
trusted library allocation
|
page read and write
|
||
530000F20000
|
trusted library allocation
|
page read and write
|
||
31901FD000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000C48000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
8056000
|
heap
|
page read and write
|
||
31A21FA000
|
stack
|
page read and write
|
||
131CD000000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
131D4F20000
|
heap
|
page read and write
|
||
530000ECC000
|
trusted library allocation
|
page read and write
|
||
319F1FB000
|
stack
|
page read and write
|
||
31B81FE000
|
stack
|
page read and write
|
||
31A11FA000
|
stack
|
page read and write
|
||
318E1FE000
|
stack
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
55C800828000
|
trusted library allocation
|
page read and write
|
||
55C800894000
|
trusted library allocation
|
page read and write
|
||
53000014C000
|
trusted library allocation
|
page read and write
|
||
55C800408000
|
trusted library allocation
|
page read and write
|
||
530000BB0000
|
trusted library allocation
|
page read and write
|
||
55C800790000
|
trusted library allocation
|
page read and write
|
||
7F6A000
|
heap
|
page read and write
|
||
131CD0C9000
|
heap
|
page read and write
|
||
131D0B19000
|
heap
|
page read and write
|
||
530000EA8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000B54000
|
trusted library allocation
|
page read and write
|
||
7540000
|
direct allocation
|
page execute and read and write
|
||
55C8008B8000
|
trusted library allocation
|
page read and write
|
||
7530000
|
direct allocation
|
page execute and read and write
|
||
530000A24000
|
trusted library allocation
|
page read and write
|
||
7DCD000
|
heap
|
page read and write
|
||
131D0600000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
150800270000
|
direct allocation
|
page read and write
|
||
5300002B4000
|
trusted library allocation
|
page read and write
|
||
150800201000
|
direct allocation
|
page read and write
|
||
7F2F000
|
heap
|
page read and write
|
||
17AB000
|
unkown
|
page execute and write copy
|
||
131D74E0000
|
trusted library section
|
page read and write
|
||
530000584000
|
trusted library allocation
|
page read and write
|
||
53000016C000
|
trusted library allocation
|
page read and write
|
||
131D681D000
|
trusted library section
|
page read and write
|
||
53000060C000
|
trusted library allocation
|
page read and write
|
||
5300010F4000
|
trusted library allocation
|
page read and write
|
||
55C800918000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31A19FE000
|
unkown
|
page readonly
|
||
701000
|
unkown
|
page execute read
|
||
5E0000248000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31AD9FE000
|
unkown
|
page readonly
|
||
530000134000
|
trusted library allocation
|
page read and write
|
||
150800303000
|
direct allocation
|
page read and write
|
||
5300001F4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530001080000
|
trusted library allocation
|
page read and write
|
||
318D1FE000
|
stack
|
page read and write
|
||
530000A58000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1D9A000
|
heap
|
page read and write
|
||
31971FE000
|
stack
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
55C80060C000
|
trusted library allocation
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000032C000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
530000B48000
|
trusted library allocation
|
page read and write
|
||
7A06000
|
direct allocation
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
1508002EC000
|
direct allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000074000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001B4000
|
trusted library allocation
|
page read and write
|
||
7DC5000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page write copy
|
||
5300001E4000
|
trusted library allocation
|
page read and write
|
||
530000F2C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000F8C000
|
trusted library allocation
|
page read and write
|
||
530000CE0000
|
trusted library allocation
|
page read and write
|
||
530000C84000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
8154000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000022C000
|
trusted library allocation
|
page read and write
|
||
7F34000
|
heap
|
page read and write
|
||
31919FE000
|
unkown
|
page readonly
|
||
318B9FE000
|
unkown
|
page readonly
|
||
530000D64000
|
trusted library allocation
|
page read and write
|
||
5300010A0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C800418000
|
trusted library allocation
|
page read and write
|
||
319D9FE000
|
unkown
|
page readonly
|
||
711000
|
unkown
|
page readonly
|
||
131D6F00000
|
trusted library section
|
page read and write
|
||
53000037C000
|
trusted library allocation
|
page read and write
|
||
319C9FE000
|
unkown
|
page readonly
|
||
7DC9000
|
heap
|
page read and write
|
||
530000298000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000300000
|
trusted library allocation
|
page read and write
|
||
530000D18000
|
trusted library allocation
|
page read and write
|
||
5300000EC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C800248000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8002ED000
|
trusted library allocation
|
page read and write
|
||
6C77F000
|
unkown
|
page readonly
|
||
530000A6C000
|
trusted library allocation
|
page read and write
|
||
5E00002B0000
|
trusted library allocation
|
page read and write
|
||
131D7340000
|
trusted library section
|
page read and write
|
||
5300001B4000
|
trusted library allocation
|
page read and write
|
||
131D74AD000
|
trusted library section
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C80070C000
|
trusted library allocation
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
55C80091C000
|
trusted library allocation
|
page read and write
|
||
1AFF000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300008B8000
|
trusted library allocation
|
page read and write
|
||
131CD290000
|
heap
|
page read and write
|
||
530000DD9000
|
trusted library allocation
|
page read and write
|
||
530000E01000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E00002A0000
|
trusted library allocation
|
page read and write
|
||
1CCF000
|
stack
|
page read and write
|
||
530000C68000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300008B5000
|
trusted library allocation
|
page read and write
|
||
131D7107000
|
unclassified section
|
page read and write
|
||
530000D94000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000850000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001F8000
|
trusted library allocation
|
page read and write
|
||
7E9B000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
530000D20000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
31BA9FE000
|
unkown
|
page readonly
|
||
8088000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
147F000
|
stack
|
page read and write
|
||
53000040C000
|
trusted library allocation
|
page read and write
|
||
55C800844000
|
trusted library allocation
|
page read and write
|
||
530000220000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8008EC000
|
trusted library allocation
|
page read and write
|
||
131CD038000
|
heap
|
page read and write
|
||
530000234000
|
trusted library allocation
|
page read and write
|
||
5300002F3000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
150800220000
|
direct allocation
|
page read and write
|
||
5E00002F8000
|
trusted library allocation
|
page read and write
|
||
131D73C0000
|
trusted library section
|
page read and write
|
||
530000E70000
|
trusted library allocation
|
page read and write
|
||
530000340000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
530001038000
|
trusted library allocation
|
page read and write
|
||
31A71FC000
|
stack
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
5E00002C0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1808000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
131D53F3000
|
heap
|
page read and write
|
||
801B000
|
heap
|
page read and write
|
||
55C800601000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
150800294000
|
direct allocation
|
page read and write
|
||
7F78000
|
heap
|
page read and write
|
||
55C80080C000
|
trusted library allocation
|
page read and write
|
||
5300006C0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000037C000
|
trusted library allocation
|
page read and write
|
||
55C80082C000
|
trusted library allocation
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
131D05F5000
|
heap
|
page read and write
|
||
5300001B4000
|
trusted library allocation
|
page read and write
|
||
131D7372000
|
trusted library section
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000228000
|
trusted library allocation
|
page read and write
|
||
5300002A8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1D9B000
|
heap
|
page read and write
|
||
131D0B39000
|
heap
|
page read and write
|
||
31911FB000
|
stack
|
page read and write
|
||
319B1FA000
|
stack
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
55C800858000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
53000020C000
|
trusted library allocation
|
page read and write
|
||
31929FE000
|
unkown
|
page readonly
|
||
53000000C000
|
trusted library allocation
|
page read and write
|
||
131D6F0E000
|
trusted library section
|
page read and write
|
||
530000E4C000
|
trusted library allocation
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
5E0000238000
|
trusted library allocation
|
page read and write
|
||
150800215000
|
direct allocation
|
page read and write
|
||
7F80000
|
heap
|
page read and write
|
||
7DC9000
|
heap
|
page read and write
|
||
530000128000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
6C7C8000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000008C000
|
trusted library allocation
|
page read and write
|
||
530000E0C000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
530000E80000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E0000201000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C800288000
|
trusted library allocation
|
page read and write
|
||
5300008A0000
|
trusted library allocation
|
page read and write
|
||
5E0000220000
|
trusted library allocation
|
page read and write
|
||
530000FD0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000C6C000
|
trusted library allocation
|
page read and write
|
||
5300004A0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
55C800948000
|
trusted library allocation
|
page read and write
|
||
7EB7000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
31921FA000
|
stack
|
page read and write
|
||
1508002A8000
|
direct allocation
|
page read and write
|
||
530000E3C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C80071C000
|
trusted library allocation
|
page read and write
|
||
319E9FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
55C800880000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
530000B70000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
55C8002F4000
|
trusted library allocation
|
page read and write
|
||
131D0830000
|
heap
|
page read and write
|
||
530000F98000
|
trusted library allocation
|
page read and write
|
||
530000214000
|
trusted library allocation
|
page read and write
|
||
150800260000
|
direct allocation
|
page read and write
|
||
31A69FE000
|
unkown
|
page readonly
|
||
530000001000
|
trusted library allocation
|
page read and write
|
||
1508002D0000
|
direct allocation
|
page read and write
|
||
530000620000
|
trusted library allocation
|
page read and write
|
||
55C800788000
|
trusted library allocation
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
31B89FE000
|
unkown
|
page readonly
|
||
530000EB8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8006F4000
|
trusted library allocation
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
31951FB000
|
stack
|
page read and write
|
||
530000300000
|
trusted library allocation
|
page read and write
|
||
131D0B00000
|
heap
|
page read and write
|
||
5300001AC000
|
trusted library allocation
|
page read and write
|
||
131D05E8000
|
heap
|
page read and write
|
||
530000801000
|
trusted library allocation
|
page read and write
|
||
318F1FE000
|
stack
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
319D1FE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8008E4000
|
trusted library allocation
|
page read and write
|
||
5300005EC000
|
trusted library allocation
|
page read and write
|
||
5300000B4000
|
trusted library allocation
|
page read and write
|
||
31959FE000
|
unkown
|
page readonly
|
||
55C8006E8000
|
trusted library allocation
|
page read and write
|
||
55C8006BC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300009EC000
|
trusted library allocation
|
page read and write
|
||
55C800898000
|
trusted library allocation
|
page read and write
|
||
530000080000
|
trusted library allocation
|
page read and write
|
||
1D74000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
C2E000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page write copy
|
||
5300006B0000
|
trusted library allocation
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
55C80020C000
|
trusted library allocation
|
page read and write
|
||
7550000
|
direct allocation
|
page execute and read and write
|
||
55C800210000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D0B1E000
|
heap
|
page read and write
|
||
55C80025C000
|
trusted library allocation
|
page read and write
|
||
55C800424000
|
trusted library allocation
|
page read and write
|
||
5E00002C8000
|
trusted library allocation
|
page read and write
|
||
7E67000
|
heap
|
page read and write
|
||
53000093D000
|
trusted library allocation
|
page read and write
|
||
5300007BC000
|
trusted library allocation
|
page read and write
|
||
131D66BE000
|
trusted library section
|
page read and write
|
||
31AF1FE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000C58000
|
trusted library allocation
|
page read and write
|
||
530000CEC000
|
trusted library allocation
|
page read and write
|
||
131D4F30000
|
heap
|
page read and write
|
||
131D0B3B000
|
heap
|
page read and write
|
||
131CEE40000
|
heap
|
page read and write
|
||
15080020C000
|
direct allocation
|
page read and write
|
||
7DC4000
|
heap
|
page read and write
|
||
530000500000
|
trusted library allocation
|
page read and write
|
||
7EDB000
|
heap
|
page read and write
|
||
131D53F0000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page write copy
|
||
6E61000
|
heap
|
page read and write
|
||
5300002A8000
|
trusted library allocation
|
page read and write
|
||
55C800878000
|
trusted library allocation
|
page read and write
|
||
31991FE000
|
stack
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
5E0000288000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300007AC000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
55C800818000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
53000034C000
|
trusted library allocation
|
page read and write
|
||
319A9FE000
|
unkown
|
page readonly
|
||
55C8007A0000
|
trusted library allocation
|
page read and write
|
||
5300000A2000
|
trusted library allocation
|
page read and write
|
||
55C8006AC000
|
trusted library allocation
|
page read and write
|
||
31A09FE000
|
unkown
|
page readonly
|
||
530000294000
|
trusted library allocation
|
page read and write
|
||
5E00002B0000
|
trusted library allocation
|
page read and write
|
||
131CF890000
|
unkown
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
1D64000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D0B7B000
|
heap
|
page read and write
|
||
530000498000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
70E000
|
unkown
|
page write copy
|
||
1C74000
|
heap
|
page read and write
|
||
318A1EF000
|
stack
|
page read and write
|
||
530000D40000
|
trusted library allocation
|
page read and write
|
||
7DC1000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31B31FE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000058000
|
trusted library allocation
|
page read and write
|
||
53000036C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
131D7130000
|
trusted library section
|
page read and write
|
||
150800284000
|
direct allocation
|
page read and write
|
||
530000E40000
|
trusted library allocation
|
page read and write
|
||
31B69FE000
|
unkown
|
page readonly
|
||
5E00002C0000
|
trusted library allocation
|
page read and write
|
||
5300006E5000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
131D5320000
|
heap
|
page read and write
|
||
31B51FB000
|
stack
|
page read and write
|
||
5E00002BC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
55C8006F0000
|
trusted library allocation
|
page read and write
|
||
55C800728000
|
trusted library allocation
|
page read and write
|
||
6C7C9000
|
unkown
|
page read and write
|
||
31B61FE000
|
stack
|
page read and write
|
||
530001030000
|
trusted library allocation
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
5300002B4000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7F58000
|
heap
|
page read and write
|
||
131D05FF000
|
heap
|
page read and write
|
||
55C8006AC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
53000075C000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
55C8007C0000
|
trusted library allocation
|
page read and write
|
||
55C800201000
|
trusted library allocation
|
page read and write
|
||
55C8008C4000
|
trusted library allocation
|
page read and write
|
||
530000DA0000
|
trusted library allocation
|
page read and write
|
||
31B49FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
5E0000278000
|
trusted library allocation
|
page read and write
|
||
7DC7000
|
heap
|
page read and write
|
||
55C800840000
|
trusted library allocation
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001AC000
|
trusted library allocation
|
page read and write
|
||
530001030000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
31A41FC000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000E0C000
|
trusted library allocation
|
page read and write
|
||
530000338000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
530000C6C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000BF8000
|
trusted library allocation
|
page read and write
|
||
530000290000
|
trusted library allocation
|
page read and write
|
||
5E00002D8000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000D5E000
|
trusted library allocation
|
page read and write
|
||
31909FE000
|
unkown
|
page readonly
|
||
530000300000
|
trusted library allocation
|
page read and write
|
||
131D0A60000
|
trusted library section
|
page read and write
|
||
131D737E000
|
trusted library section
|
page read and write
|
||
31B79FE000
|
unkown
|
page readonly
|
||
55C8007D4000
|
trusted library allocation
|
page read and write
|
||
55C8007C4000
|
trusted library allocation
|
page read and write
|
||
55C800904000
|
trusted library allocation
|
page read and write
|
||
31AC1FE000
|
stack
|
page read and write
|
||
31AB1FE000
|
stack
|
page read and write
|
||
131D0BA1000
|
heap
|
page read and write
|
||
53000037C000
|
trusted library allocation
|
page read and write
|
||
7BC1000
|
heap
|
page read and write
|
||
53000093F000
|
trusted library allocation
|
page read and write
|
||
53000062C000
|
trusted library allocation
|
page read and write
|
||
530000570000
|
trusted library allocation
|
page read and write
|
||
55C800778000
|
trusted library allocation
|
page read and write
|
||
80DA000
|
heap
|
page read and write
|
||
55C8002B0000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000DE4000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7E8C000
|
heap
|
page read and write
|
||
5300004F4000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
190F000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001AC000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000338000
|
trusted library allocation
|
page read and write
|
||
131D0B99000
|
heap
|
page read and write
|
||
5300006C5000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
83D000
|
stack
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
53000091B000
|
trusted library allocation
|
page read and write
|
||
7EEA000
|
heap
|
page read and write
|
||
31BA1FE000
|
stack
|
page read and write
|
||
7731000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
31A51FC000
|
stack
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
FDE000
|
stack
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
55C800864000
|
trusted library allocation
|
page read and write
|
||
31A89FE000
|
unkown
|
page readonly
|
||
319A1FD000
|
stack
|
page read and write
|
||
131D7360000
|
trusted library section
|
page read and write
|
||
31A59FE000
|
unkown
|
page readonly
|
||
55C8002CC000
|
trusted library allocation
|
page read and write
|
||
31B09FE000
|
unkown
|
page readonly
|
||
319E1FE000
|
stack
|
page read and write
|
||
530000484000
|
trusted library allocation
|
page read and write
|
||
131CCFA0000
|
heap
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
7EED000
|
heap
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page readonly
|
||
1C74000
|
heap
|
page read and write
|
||
794A000
|
heap
|
page read and write
|
||
530000C9C000
|
trusted library allocation
|
page read and write
|
||
5E000020C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7F0A000
|
heap
|
page read and write
|
||
29CF000
|
unkown
|
page read and write
|
||
530000F7C000
|
trusted library allocation
|
page read and write
|
||
7EF1000
|
heap
|
page read and write
|
||
530000B7C000
|
trusted library allocation
|
page read and write
|
||
31B21FE000
|
stack
|
page read and write
|
||
530000EBC000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000C0C000
|
trusted library allocation
|
page read and write
|
||
31AA1FE000
|
stack
|
page read and write
|
||
131D66A0000
|
trusted library section
|
page read and write
|
||
D11000
|
unkown
|
page execute and write copy
|
||
31981FE000
|
stack
|
page read and write
|
||
530000294000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E0000250000
|
trusted library allocation
|
page read and write
|
||
5300002F0000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
53000034C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000390000
|
trusted library allocation
|
page read and write
|
||
530000F10000
|
trusted library allocation
|
page read and write
|
||
31B29FE000
|
unkown
|
page readonly
|
||
6E61000
|
heap
|
page read and write
|
||
131CD0CD000
|
heap
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
530000934000
|
trusted library allocation
|
page read and write
|
||
1C74000
|
heap
|
page read and write
|
||
530000518000
|
trusted library allocation
|
page read and write
|
||
5300004D0000
|
trusted library allocation
|
page read and write
|
||
530000D88000
|
trusted library allocation
|
page read and write
|
||
131CD260000
|
trusted library section
|
page readonly
|
||
31AE1FD000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7940000
|
heap
|
page read and write
|
||
55C80040C000
|
trusted library allocation
|
page read and write
|
||
55C800830000
|
trusted library allocation
|
page read and write
|
||
7560000
|
direct allocation
|
page execute and read and write
|
||
77A1000
|
heap
|
page read and write
|
||
7F36000
|
heap
|
page read and write
|
||
31A11FC000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
530000E40000
|
trusted library allocation
|
page read and write
|
||
530000210000
|
trusted library allocation
|
page read and write
|
||
6C6A1000
|
unkown
|
page execute read
|
||
5E0000235000
|
trusted library allocation
|
page read and write
|
||
7DC4000
|
heap
|
page read and write
|
||
53000009E000
|
trusted library allocation
|
page read and write
|
||
1D6A000
|
heap
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5300001C4000
|
trusted library allocation
|
page read and write
|
||
530001080000
|
trusted library allocation
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
7FAE000
|
heap
|
page read and write
|
||
530000F6C000
|
trusted library allocation
|
page read and write
|
||
55C800884000
|
trusted library allocation
|
page read and write
|
||
7FF3000
|
heap
|
page read and write
|
||
530000D6C000
|
trusted library allocation
|
page read and write
|
||
5300002C0000
|
trusted library allocation
|
page read and write
|
||
530000B08000
|
trusted library allocation
|
page read and write
|
||
131D0B43000
|
heap
|
page read and write
|
||
53000026C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
530000C94000
|
trusted library allocation
|
page read and write
|
||
131D73D1000
|
trusted library section
|
page read and write
|
||
5300001E8000
|
trusted library allocation
|
page read and write
|
||
7F27000
|
heap
|
page read and write
|
||
5300001DC000
|
trusted library allocation
|
page read and write
|
||
530000828000
|
trusted library allocation
|
page read and write
|
||
530000318000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
7DC5000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
530000D94000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
BFC000
|
stack
|
page read and write
|
||
31B99FE000
|
unkown
|
page readonly
|
||
1180000
|
heap
|
page read and write
|
||
6C77D000
|
unkown
|
page read and write
|
||
530000D30000
|
trusted library allocation
|
page read and write
|
||
31B91FE000
|
stack
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
131D74A2000
|
trusted library section
|
page read and write
|
||
5E00002A0000
|
trusted library allocation
|
page read and write
|
||
131D05FB000
|
heap
|
page read and write
|
||
1D83000
|
heap
|
page read and write
|
||
150800230000
|
direct allocation
|
page read and write
|
||
150800234000
|
direct allocation
|
page read and write
|
||
530000E98000
|
trusted library allocation
|
page read and write
|
||
55C8007E0000
|
trusted library allocation
|
page read and write
|
||
7ECC000
|
heap
|
page read and write
|
||
1D82000
|
heap
|
page read and write
|
||
8108000
|
heap
|
page read and write
|
||
530000C6C000
|
trusted library allocation
|
page read and write
|
||
6E61000
|
heap
|
page read and write
|
||
5E0000264000
|
trusted library allocation
|
page read and write
|
||
530000358000
|
trusted library allocation
|
page read and write
|
||
53000066C000
|
trusted library allocation
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
There are 1183 hidden memdumps, click here to show them.