Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kFrGefsAK3.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_kFrGefsAK3.exe_71d7d36b2611530c69ddb8f49ab6d9892148_4b5bc6ba_5e39449e-084e-4963-9b16-48ae3216df9f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71A2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 09:34:44 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76D4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7713.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\kFrGefsAK3.exe
|
"C:\Users\user\Desktop\kFrGefsAK3.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2404 --field-trial-handle=2284,i,17304781938837466691,17340018191184435159,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Users\user\AppData\Local\Temp\service123.exe
|
|||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 1152
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
http://anglebug.com/8215O
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/3584H
|
unknown
|
||
http://anglebug.com/7724B
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore?hl=enH
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://chrome.google.com/webstoreCXJWwLrk=
|
unknown
|
||
https://issuetracker.google.com/issues/166475273/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/7279E
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/gjtp
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/5375;p
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://issuetracker.google.com/255411748tor
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/5281C
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/pti
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
https://anglebug.com/7369J
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivetk5sb.top
|
185.121.15.192
|
||
www.google.com
|
142.250.181.132
|
||
fivetk5sb.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.fivetk5sb.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
ProgramId
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
FileId
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
LowerCaseLongPath
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
LongPathHash
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Name
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
OriginalFileName
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Publisher
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Version
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
BinFileVersion
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
BinaryType
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
ProductName
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
ProductVersion
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
LinkDate
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
BinProductVersion
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
AppxPackageFullName
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Size
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Language
|
||
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
34FF000
|
stack
|
page read and write
|
||
7074003EC000
|
trusted library allocation
|
page read and write
|
||
CD8B7FE000
|
unkown
|
page readonly
|
||
24F2E6A2000
|
trusted library section
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
6F0002AC000
|
direct allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
8139000
|
heap
|
page read and write
|
||
A74024E0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
7074006BC000
|
trusted library allocation
|
page read and write
|
||
7074002E4000
|
trusted library allocation
|
page read and write
|
||
A7402628000
|
trusted library allocation
|
page read and write
|
||
A74032AC000
|
trusted library allocation
|
page read and write
|
||
7EC00201000
|
trusted library allocation
|
page read and write
|
||
1D11000
|
heap
|
page read and write
|
||
A7402864000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2791D000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A7402280000
|
trusted library allocation
|
page read and write
|
||
707400368000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
3BC000
|
stack
|
page read and write
|
||
1D26000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
7074007D0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
A74023AC000
|
trusted library allocation
|
page read and write
|
||
A7403168000
|
trusted library allocation
|
page read and write
|
||
CDF95FE000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
CD987FE000
|
unkown
|
page readonly
|
||
24F243C0000
|
heap
|
page read and write
|
||
7EC00248000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74026EB000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402254000
|
trusted library allocation
|
page read and write
|
||
A7402988000
|
trusted library allocation
|
page read and write
|
||
CD82FFE000
|
stack
|
page read and write
|
||
A7402B2C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2E5C0000
|
trusted library section
|
page read and write
|
||
A74026A0000
|
trusted library allocation
|
page read and write
|
||
81FF000
|
heap
|
page read and write
|
||
A7403174000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403314000
|
trusted library allocation
|
page read and write
|
||
CD827FE000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
7611000
|
heap
|
page read and write
|
||
A7402AB8000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
70740080C000
|
trusted library allocation
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
24F27F60000
|
trusted library section
|
page read and write
|
||
24F2DB80000
|
trusted library section
|
page read and write
|
||
1D26000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD80FFD000
|
stack
|
page read and write
|
||
78FA000
|
heap
|
page read and write
|
||
CD9FFFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
7F07000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A7400401000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
A7402F10000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
7F0D000
|
heap
|
page read and write
|
||
A7402F20000
|
trusted library allocation
|
page read and write
|
||
7EC00288000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A7402498000
|
trusted library allocation
|
page read and write
|
||
816C000
|
heap
|
page read and write
|
||
A7402678000
|
trusted library allocation
|
page read and write
|
||
A74024F4000
|
trusted library allocation
|
page read and write
|
||
7EC002C0000
|
trusted library allocation
|
page read and write
|
||
78F1000
|
heap
|
page read and write
|
||
A74025E8000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
A74024F4000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
CD8BFFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
CDF5DFE000
|
stack
|
page read and write
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
7EC002F8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2A130000
|
trusted library section
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
A7402778000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
8036000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
CD9DFFA000
|
stack
|
page read and write
|
||
A7402DC4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74023DC000
|
trusted library allocation
|
page read and write
|
||
707400330000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
A7402F3C000
|
trusted library allocation
|
page read and write
|
||
A7402BDC000
|
trusted library allocation
|
page read and write
|
||
A7403060000
|
trusted library allocation
|
page read and write
|
||
707400248000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F24480000
|
heap
|
page read and write
|
||
A7402560000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
7074002ED000
|
trusted library allocation
|
page read and write
|
||
A740340C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2DB60000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74023B4000
|
trusted library allocation
|
page read and write
|
||
707400714000
|
trusted library allocation
|
page read and write
|
||
24F2D463000
|
heap
|
page read and write
|
||
A74024F4000
|
trusted library allocation
|
page read and write
|
||
6F00020C000
|
direct allocation
|
page read and write
|
||
24F244C0000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
A7402A38000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74030EC000
|
trusted library allocation
|
page read and write
|
||
A74026E4000
|
trusted library allocation
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402AE4000
|
trusted library allocation
|
page read and write
|
||
A7402D90000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
A7402740000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400248000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1D34000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
806B000
|
heap
|
page read and write
|
||
A740341C000
|
trusted library allocation
|
page read and write
|
||
A7402BD4000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
direct allocation
|
page execute and read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
7B01000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403040000
|
trusted library allocation
|
page read and write
|
||
7F04000
|
heap
|
page read and write
|
||
CD96FFD000
|
stack
|
page read and write
|
||
CD84FFE000
|
stack
|
page read and write
|
||
7260000
|
direct allocation
|
page read and write
|
||
CD8CFFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
7FC7000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
7074006B0000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A74027F8000
|
trusted library allocation
|
page read and write
|
||
24F27915000
|
heap
|
page read and write
|
||
A7402910000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A90000
|
unkown
|
page readonly
|
||
CD98FFD000
|
stack
|
page read and write
|
||
7EC002A0000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
707400250000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006C8000
|
trusted library allocation
|
page read and write
|
||
24F27910000
|
heap
|
page read and write
|
||
24F27EB2000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
CD807FE000
|
unkown
|
page readonly
|
||
A7402CF0000
|
trusted library allocation
|
page read and write
|
||
807B000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2DC36000
|
trusted library section
|
page read and write
|
||
24F2E6E0000
|
trusted library section
|
page read and write
|
||
805C000
|
heap
|
page read and write
|
||
24F27E80000
|
heap
|
page read and write
|
||
1D47000
|
heap
|
page read and write
|
||
24F2DF50000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
A7402908000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F244BA000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74033E0000
|
trusted library allocation
|
page read and write
|
||
6F00026C000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
CD897FE000
|
unkown
|
page readonly
|
||
A7402594000
|
trusted library allocation
|
page read and write
|
||
707400430000
|
trusted library allocation
|
page read and write
|
||
CD947FE000
|
unkown
|
page readonly
|
||
A740237C000
|
trusted library allocation
|
page read and write
|
||
A7402DA0000
|
trusted library allocation
|
page read and write
|
||
A74033EC000
|
trusted library allocation
|
page read and write
|
||
24F2E790000
|
trusted library section
|
page read and write
|
||
CD86FFE000
|
stack
|
page read and write
|
||
8207000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
A7402EC8000
|
trusted library allocation
|
page read and write
|
||
707400330000
|
trusted library allocation
|
page read and write
|
||
707400348000
|
trusted library allocation
|
page read and write
|
||
7F07000
|
heap
|
page read and write
|
||
CDF1DEF000
|
stack
|
page read and write
|
||
80C7000
|
heap
|
page read and write
|
||
801D000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
A7402C94000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27B60000
|
heap
|
page read and write
|
||
A74030E0000
|
trusted library allocation
|
page read and write
|
||
A740260C000
|
trusted library allocation
|
page read and write
|
||
70740078C000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
A74026C0000
|
trusted library allocation
|
page read and write
|
||
7F0F000
|
heap
|
page read and write
|
||
7074002CC000
|
trusted library allocation
|
page read and write
|
||
707400648000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7EC002D8000
|
trusted library allocation
|
page read and write
|
||
A7402270000
|
trusted library allocation
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
A7402735000
|
trusted library allocation
|
page read and write
|
||
7FA3000
|
heap
|
page read and write
|
||
A7402BF8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400220000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CDF7DFD000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7F0E000
|
heap
|
page read and write
|
||
A7402A01000
|
trusted library allocation
|
page read and write
|
||
24F2DC9D000
|
trusted library section
|
page read and write
|
||
A7402F48000
|
trusted library allocation
|
page read and write
|
||
7EC002C0000
|
trusted library allocation
|
page read and write
|
||
70740025C000
|
trusted library allocation
|
page read and write
|
||
A7400C01000
|
trusted library allocation
|
page read and write
|
||
707400624000
|
trusted library allocation
|
page read and write
|
||
A7402894000
|
trusted library allocation
|
page read and write
|
||
A74022F0000
|
trusted library allocation
|
page read and write
|
||
A74023AC000
|
trusted library allocation
|
page read and write
|
||
A740235C000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
6F000210000
|
direct allocation
|
page read and write
|
||
A7403304000
|
trusted library allocation
|
page read and write
|
||
A740329C000
|
trusted library allocation
|
page read and write
|
||
A7402B8F000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
A7402C84000
|
trusted library allocation
|
page read and write
|
||
24F27ED6000
|
heap
|
page read and write
|
||
A7402ED8000
|
trusted library allocation
|
page read and write
|
||
24F2E35E000
|
trusted library section
|
page read and write
|
||
A74030EC000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
CDF55FE000
|
unkown
|
page readonly
|
||
7074002B8000
|
trusted library allocation
|
page read and write
|
||
A7402EE8000
|
trusted library allocation
|
page read and write
|
||
80AC000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
CD81FFD000
|
stack
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
707400424000
|
trusted library allocation
|
page read and write
|
||
CDF75FE000
|
unkown
|
page readonly
|
||
A7402A30000
|
trusted library allocation
|
page read and write
|
||
7074006EC000
|
trusted library allocation
|
page read and write
|
||
24F2E350000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400310000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A7402B80000
|
trusted library allocation
|
page read and write
|
||
A7402500000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD837FE000
|
unkown
|
page readonly
|
||
A7401001000
|
trusted library allocation
|
page read and write
|
||
24F27914000
|
heap
|
page read and write
|
||
707400801000
|
trusted library allocation
|
page read and write
|
||
6F000280000
|
direct allocation
|
page read and write
|
||
707400374000
|
trusted library allocation
|
page read and write
|
||
A7403154000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7F06000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
707400630000
|
trusted library allocation
|
page read and write
|
||
6F0002A8000
|
direct allocation
|
page read and write
|
||
A7402428000
|
trusted library allocation
|
page read and write
|
||
CD91FFC000
|
stack
|
page read and write
|
||
A7402F18000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402E31000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6F000294000
|
direct allocation
|
page read and write
|
||
7F05000
|
heap
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
CD9F7FE000
|
unkown
|
page readonly
|
||
A74023E0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
2F8A000
|
stack
|
page read and write
|
||
A7402CDC000
|
trusted library allocation
|
page read and write
|
||
707400320000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC002F0000
|
trusted library allocation
|
page read and write
|
||
A7402264000
|
trusted library allocation
|
page read and write
|
||
7074006CC000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
heap
|
page read and write
|
||
24F245E0000
|
trusted library section
|
page readonly
|
||
7F0D000
|
heap
|
page read and write
|
||
804B000
|
heap
|
page read and write
|
||
CDF85FE000
|
unkown
|
page readonly
|
||
FFC000
|
stack
|
page read and write
|
||
CDA0FFE000
|
stack
|
page read and write
|
||
A740314C000
|
trusted library allocation
|
page read and write
|
||
A74028A4000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
A7402EC8000
|
trusted library allocation
|
page read and write
|
||
24F27EC4000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A90000
|
unkown
|
page readonly
|
||
707400730000
|
trusted library allocation
|
page read and write
|
||
7F05000
|
heap
|
page read and write
|
||
782F000
|
direct allocation
|
page read and write
|
||
1200000
|
unkown
|
page write copy
|
||
70740069C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD887FE000
|
unkown
|
page readonly
|
||
7FC000
|
stack
|
page read and write
|
||
A74024F4000
|
trusted library allocation
|
page read and write
|
||
8072000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740242C000
|
trusted library allocation
|
page read and write
|
||
7EC002B0000
|
trusted library allocation
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400330000
|
trusted library allocation
|
page read and write
|
||
A7402ADC000
|
trusted library allocation
|
page read and write
|
||
1CEB000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2E79E000
|
trusted library section
|
page read and write
|
||
707400354000
|
trusted library allocation
|
page read and write
|
||
A74028FD000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A7402D90000
|
trusted library allocation
|
page read and write
|
||
819E000
|
heap
|
page read and write
|
||
A7402E6C000
|
trusted library allocation
|
page read and write
|
||
7EC002A0000
|
trusted library allocation
|
page read and write
|
||
8005000
|
heap
|
page read and write
|
||
7EC00294000
|
trusted library allocation
|
page read and write
|
||
A7402490000
|
trusted library allocation
|
page read and write
|
||
7611000
|
heap
|
page read and write
|
||
7FB7000
|
heap
|
page read and write
|
||
A7403058000
|
trusted library allocation
|
page read and write
|
||
CDFADFE000
|
stack
|
page read and write
|
||
8189000
|
heap
|
page read and write
|
||
A7402C9A000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
24F24685000
|
heap
|
page read and write
|
||
24F2447B000
|
heap
|
page read and write
|
||
A74027BC000
|
trusted library allocation
|
page read and write
|
||
A7402F84000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
707400664000
|
trusted library allocation
|
page read and write
|
||
CDF4DFE000
|
stack
|
page read and write
|
||
A7402B54000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402F54000
|
trusted library allocation
|
page read and write
|
||
A74029F0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
A7402AF0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006D4000
|
trusted library allocation
|
page read and write
|
||
CDFFDFE000
|
stack
|
page read and write
|
||
707400404000
|
trusted library allocation
|
page read and write
|
||
A7402CB4000
|
trusted library allocation
|
page read and write
|
||
A74030C4000
|
trusted library allocation
|
page read and write
|
||
A7403070000
|
trusted library allocation
|
page read and write
|
||
6AC000
|
stack
|
page read and write
|
||
A7403030000
|
trusted library allocation
|
page read and write
|
||
24F27EAE000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1D3B000
|
heap
|
page read and write
|
||
A7403201000
|
trusted library allocation
|
page read and write
|
||
A7402688000
|
trusted library allocation
|
page read and write
|
||
A74023B4000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74033AC000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27EF2000
|
heap
|
page read and write
|
||
A740220C000
|
trusted library allocation
|
page read and write
|
||
A7402E31000
|
trusted library allocation
|
page read and write
|
||
A7402DBC000
|
trusted library allocation
|
page read and write
|
||
7F0D000
|
heap
|
page read and write
|
||
7B03000
|
heap
|
page read and write
|
||
7EC002B0000
|
trusted library allocation
|
page read and write
|
||
A740228C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74023AC000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
74E0000
|
direct allocation
|
page execute and read and write
|
||
24F24613000
|
heap
|
page read and write
|
||
A740236C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
A7402BC8000
|
trusted library allocation
|
page read and write
|
||
A7402540000
|
trusted library allocation
|
page read and write
|
||
7074002B0000
|
trusted library allocation
|
page read and write
|
||
A7402B70000
|
trusted library allocation
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6F0002EC000
|
direct allocation
|
page read and write
|
||
CD907FE000
|
unkown
|
page readonly
|
||
A74024F4000
|
trusted library allocation
|
page read and write
|
||
7F03000
|
heap
|
page read and write
|
||
707400668000
|
trusted library allocation
|
page read and write
|
||
A7402678000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute and write copy
|
||
7F0E000
|
heap
|
page read and write
|
||
A74029B0000
|
trusted library allocation
|
page read and write
|
||
A7402570000
|
trusted library allocation
|
page read and write
|
||
CD817FE000
|
unkown
|
page readonly
|
||
A7403264000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
7EC00250000
|
trusted library allocation
|
page read and write
|
||
24F2E561000
|
trusted library section
|
page read and write
|
||
A7402334000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
CD8E7FE000
|
unkown
|
page readonly
|
||
24F2E5D1000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
6F00023C000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
A74031E8000
|
trusted library allocation
|
page read and write
|
||
CDFCDFB000
|
stack
|
page read and write
|
||
7FEC000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
CD89FFD000
|
stack
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD967FE000
|
unkown
|
page readonly
|
||
A74030AC000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402B98000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
323E000
|
unkown
|
page read and write
|
||
707400758000
|
trusted library allocation
|
page read and write
|
||
A7402801000
|
trusted library allocation
|
page read and write
|
||
24F2790B000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
707400614000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074007B4000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
A74023D8000
|
trusted library allocation
|
page read and write
|
||
A7400801000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
24F26BB0000
|
unkown
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
A7402570000
|
trusted library allocation
|
page read and write
|
||
707400354000
|
trusted library allocation
|
page read and write
|
||
707400620000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7FAD000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400418000
|
trusted library allocation
|
page read and write
|
||
7F0A000
|
heap
|
page read and write
|
||
CD917FE000
|
unkown
|
page readonly
|
||
A7403378000
|
trusted library allocation
|
page read and write
|
||
12D7000
|
heap
|
page read and write
|
||
8107000
|
heap
|
page read and write
|
||
A7402FF4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A74031B8000
|
trusted library allocation
|
page read and write
|
||
24F27914000
|
heap
|
page read and write
|
||
A74023AC000
|
trusted library allocation
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7F0D000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
24F27922000
|
heap
|
page read and write
|
||
CD92FFE000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006E0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402F94000
|
trusted library allocation
|
page read and write
|
||
A7402FE4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
39E000
|
stack
|
page read and write
|
||
A7402424000
|
trusted library allocation
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
A74024A4000
|
trusted library allocation
|
page read and write
|
||
70740020C000
|
trusted library allocation
|
page read and write
|
||
24F2DB57000
|
unclassified section
|
page read and write
|
||
A7402D00000
|
trusted library allocation
|
page read and write
|
||
1D26000
|
heap
|
page read and write
|
||
A7402622000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
80DD000
|
heap
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD8C7FE000
|
unkown
|
page readonly
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
A7402901000
|
trusted library allocation
|
page read and write
|
||
70740027C000
|
trusted library allocation
|
page read and write
|
||
7FFA000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
6F0002D0000
|
direct allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27E88000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
A7403090000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403168000
|
trusted library allocation
|
page read and write
|
||
A74023C8000
|
trusted library allocation
|
page read and write
|
||
1D22000
|
heap
|
page read and write
|
||
7F0E000
|
heap
|
page read and write
|
||
A7402A0C000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A7402F75000
|
trusted library allocation
|
page read and write
|
||
A7402A70000
|
trusted library allocation
|
page read and write
|
||
6F000215000
|
direct allocation
|
page read and write
|
||
1D38000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
A740229E000
|
trusted library allocation
|
page read and write
|
||
A74025DC000
|
trusted library allocation
|
page read and write
|
||
70740060C000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
A7402E50000
|
trusted library allocation
|
page read and write
|
||
80C1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
70740040C000
|
trusted library allocation
|
page read and write
|
||
A74025DC000
|
trusted library allocation
|
page read and write
|
||
707400734000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
807A000
|
heap
|
page read and write
|
||
707400230000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CDA07FE000
|
unkown
|
page readonly
|
||
1D1F000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6F000201000
|
direct allocation
|
page read and write
|
||
A7402998000
|
trusted library allocation
|
page read and write
|
||
A7403118000
|
trusted library allocation
|
page read and write
|
||
CD9D7FE000
|
unkown
|
page readonly
|
||
AE0000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402F28000
|
trusted library allocation
|
page read and write
|
||
A740313C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
707400678000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740300C000
|
trusted library allocation
|
page read and write
|
||
CD927FB000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402884000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402418000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
809E000
|
heap
|
page read and write
|
||
24F2DB63000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
A7402318000
|
trusted library allocation
|
page read and write
|
||
A7402E1C000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
A7402878000
|
trusted library allocation
|
page read and write
|
||
A7402794000
|
trusted library allocation
|
page read and write
|
||
8277000
|
heap
|
page read and write
|
||
A7402520000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
CD93FFE000
|
unkown
|
page readonly
|
||
A7402964000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
7260000
|
direct allocation
|
page read and write
|
||
A74023A0000
|
trusted library allocation
|
page read and write
|
||
A7402420000
|
trusted library allocation
|
page read and write
|
||
A7402A58000
|
trusted library allocation
|
page read and write
|
||
CD90FFD000
|
stack
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
6F000234000
|
direct allocation
|
page read and write
|
||
A7403401000
|
trusted library allocation
|
page read and write
|
||
A74033DC000
|
trusted library allocation
|
page read and write
|
||
24F24390000
|
heap
|
page readonly
|
||
A91000
|
unkown
|
page execute read
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
707400750000
|
trusted library allocation
|
page read and write
|
||
A74032FC000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A740254C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
78FB000
|
heap
|
page read and write
|
||
A74023E8000
|
trusted library allocation
|
page read and write
|
||
A7402500000
|
trusted library allocation
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
CDF65FE000
|
unkown
|
page readonly
|
||
24F27F34000
|
heap
|
page read and write
|
||
A7402E2C000
|
trusted library allocation
|
page read and write
|
||
1D22000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
11A0000
|
heap
|
page read and write
|
||
70740035C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402FA4000
|
trusted library allocation
|
page read and write
|
||
CD937FB000
|
stack
|
page read and write
|
||
A7400A01000
|
trusted library allocation
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
7074007E0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CDFD5FE000
|
unkown
|
page readonly
|
||
7F00000
|
heap
|
page read and write
|
||
A740327C000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403084000
|
trusted library allocation
|
page read and write
|
||
A740234C000
|
trusted library allocation
|
page read and write
|
||
1D22000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
8138000
|
heap
|
page read and write
|
||
24F2DB47000
|
unclassified section
|
page read and write
|
||
6F000270000
|
direct allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
822A000
|
heap
|
page read and write
|
||
7F09000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006AC000
|
trusted library allocation
|
page read and write
|
||
A7402518000
|
trusted library allocation
|
page read and write
|
||
A7402AA4000
|
trusted library allocation
|
page read and write
|
||
24F27F27000
|
heap
|
page read and write
|
||
1D22000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740313C000
|
trusted library allocation
|
page read and write
|
||
CD8F7FE000
|
unkown
|
page readonly
|
||
A7403064000
|
trusted library allocation
|
page read and write
|
||
24F27F51000
|
heap
|
page read and write
|
||
CD957FE000
|
unkown
|
page readonly
|
||
A7402520000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
24F27914000
|
heap
|
page read and write
|
||
A740290D000
|
trusted library allocation
|
page read and write
|
||
A74024B0000
|
trusted library allocation
|
page read and write
|
||
A740309F000
|
trusted library allocation
|
page read and write
|
||
CD85FFE000
|
stack
|
page read and write
|
||
707400704000
|
trusted library allocation
|
page read and write
|
||
7F03000
|
heap
|
page read and write
|
||
A74031B8000
|
trusted library allocation
|
page read and write
|
||
A7403254000
|
trusted library allocation
|
page read and write
|
||
7074006FC000
|
trusted library allocation
|
page read and write
|
||
A7403218000
|
trusted library allocation
|
page read and write
|
||
A74030A0000
|
trusted library allocation
|
page read and write
|
||
A74024B4000
|
trusted library allocation
|
page read and write
|
||
A74024A4000
|
trusted library allocation
|
page read and write
|
||
7EC002C0000
|
trusted library allocation
|
page read and write
|
||
A74033C4000
|
trusted library allocation
|
page read and write
|
||
800C000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
7F02000
|
heap
|
page read and write
|
||
7EC00230000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A74032C8000
|
trusted library allocation
|
page read and write
|
||
A7402ED8000
|
trusted library allocation
|
page read and write
|
||
A740250C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2D987000
|
unclassified section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2DCD0000
|
trusted library section
|
page read and write
|
||
A7402594000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
A74029D0000
|
trusted library allocation
|
page read and write
|
||
707400380000
|
trusted library allocation
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
35E000
|
stack
|
page read and write
|
||
707400364000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
24F27910000
|
heap
|
page read and write
|
||
A7403230000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74029A5000
|
trusted library allocation
|
page read and write
|
||
A74024EB000
|
trusted library allocation
|
page read and write
|
||
24F27910000
|
heap
|
page read and write
|
||
A74031C4000
|
trusted library allocation
|
page read and write
|
||
A7402C01000
|
trusted library allocation
|
page read and write
|
||
707400210000
|
trusted library allocation
|
page read and write
|
||
80F9000
|
heap
|
page read and write
|
||
A74027D0000
|
trusted library allocation
|
page read and write
|
||
A7400E01000
|
trusted library allocation
|
page read and write
|
||
1CC1000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
7FCB000
|
heap
|
page read and write
|
||
A7403424000
|
trusted library allocation
|
page read and write
|
||
A74031C4000
|
trusted library allocation
|
page read and write
|
||
A74022D0000
|
trusted library allocation
|
page read and write
|
||
A74023D0000
|
trusted library allocation
|
page read and write
|
||
A7400CEA000
|
trusted library allocation
|
page read and write
|
||
A7402A88000
|
trusted library allocation
|
page read and write
|
||
7EC00270000
|
trusted library allocation
|
page read and write
|
||
798C000
|
direct allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
24F2445F000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7400601000
|
trusted library allocation
|
page read and write
|
||
707400784000
|
trusted library allocation
|
page read and write
|
||
7B03000
|
heap
|
page read and write
|
||
CD847FE000
|
unkown
|
page readonly
|
||
A740312C000
|
trusted library allocation
|
page read and write
|
||
70740039C000
|
trusted library allocation
|
page read and write
|
||
81CC000
|
heap
|
page read and write
|
||
24F2DB92000
|
trusted library section
|
page read and write
|
||
A74023F0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006B4000
|
trusted library allocation
|
page read and write
|
||
A74024E0000
|
trusted library allocation
|
page read and write
|
||
7074007C8000
|
trusted library allocation
|
page read and write
|
||
7074002FC000
|
trusted library allocation
|
page read and write
|
||
A7402FDC000
|
trusted library allocation
|
page read and write
|
||
CD877FE000
|
unkown
|
page readonly
|
||
A7402EB8000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
A7402F68000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
8046000
|
heap
|
page read and write
|
||
1D1A000
|
heap
|
page read and write
|
||
7EC002C0000
|
trusted library allocation
|
page read and write
|
||
A7403030000
|
trusted library allocation
|
page read and write
|
||
24F27E6B000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
8005000
|
heap
|
page read and write
|
||
7074006D0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CDF8DFB000
|
stack
|
page read and write
|
||
707400694000
|
trusted library allocation
|
page read and write
|
||
707400754000
|
trusted library allocation
|
page read and write
|
||
CDA27FE000
|
unkown
|
page readonly
|
||
CD977FE000
|
unkown
|
page readonly
|
||
10A8000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403428000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402D90000
|
trusted library allocation
|
page read and write
|
||
707400788000
|
trusted library allocation
|
page read and write
|
||
A7402F70000
|
trusted library allocation
|
page read and write
|
||
7EC00235000
|
trusted library allocation
|
page read and write
|
||
1CC5000
|
heap
|
page read and write
|
||
A74030D0000
|
trusted library allocation
|
page read and write
|
||
707400610000
|
trusted library allocation
|
page read and write
|
||
8049000
|
heap
|
page read and write
|
||
A7402328000
|
trusted library allocation
|
page read and write
|
||
A74033D4000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402E31000
|
trusted library allocation
|
page read and write
|
||
24F2791D000
|
heap
|
page read and write
|
||
78F5000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
7EC002E4000
|
trusted library allocation
|
page read and write
|
||
A7403164000
|
trusted library allocation
|
page read and write
|
||
CDFC5FE000
|
unkown
|
page readonly
|
||
A7402E01000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400640000
|
trusted library allocation
|
page read and write
|
||
24F27E60000
|
heap
|
page read and write
|
||
A7403320000
|
trusted library allocation
|
page read and write
|
||
A74031E8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
70740075C000
|
trusted library allocation
|
page read and write
|
||
A74026A8000
|
trusted library allocation
|
page read and write
|
||
707400744000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
707400760000
|
trusted library allocation
|
page read and write
|
||
80C9000
|
heap
|
page read and write
|
||
A7403168000
|
trusted library allocation
|
page read and write
|
||
A74030EC000
|
trusted library allocation
|
page read and write
|
||
A740247C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402C4C000
|
trusted library allocation
|
page read and write
|
||
A74022A8000
|
trusted library allocation
|
page read and write
|
||
A7403190000
|
trusted library allocation
|
page read and write
|
||
A740225A000
|
trusted library allocation
|
page read and write
|
||
707400644000
|
trusted library allocation
|
page read and write
|
||
A74026F4000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A7403190000
|
trusted library allocation
|
page read and write
|
||
707400698000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074007CC000
|
trusted library allocation
|
page read and write
|
||
A7400001000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
700000
|
heap
|
page read and write
|
||
8083000
|
heap
|
page read and write
|
||
A740225E000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7074006B8000
|
trusted library allocation
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
A74024C0000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
24F2E57E000
|
trusted library section
|
page read and write
|
||
7074006E8000
|
trusted library allocation
|
page read and write
|
||
A740305D000
|
trusted library allocation
|
page read and write
|
||
24F24463000
|
heap
|
page read and write
|
||
A740250C000
|
trusted library allocation
|
page read and write
|
||
24F27E61000
|
heap
|
page read and write
|
||
CD8FFFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7F0A000
|
heap
|
page read and write
|
||
A740270C000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A74023EC000
|
trusted library allocation
|
page read and write
|
||
80CA000
|
heap
|
page read and write
|
||
A7402E7C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402974000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
CD88FFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC002F4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74024B4000
|
trusted library allocation
|
page read and write
|
||
24F278F0000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7403388000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7400C0A000
|
trusted library allocation
|
page read and write
|
||
24F2790B000
|
heap
|
page read and write
|
||
CD94FFE000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400684000
|
trusted library allocation
|
page read and write
|
||
A74025DC000
|
trusted library allocation
|
page read and write
|
||
A74033B4000
|
trusted library allocation
|
page read and write
|
||
7EC00274000
|
trusted library allocation
|
page read and write
|
||
A7403108000
|
trusted library allocation
|
page read and write
|
||
A740281C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402EB8000
|
trusted library allocation
|
page read and write
|
||
177F000
|
stack
|
page read and write
|
||
A740282C000
|
trusted library allocation
|
page read and write
|
||
A7402E0C000
|
trusted library allocation
|
page read and write
|
||
6F000303000
|
direct allocation
|
page read and write
|
||
A740221C000
|
trusted library allocation
|
page read and write
|
||
A7403028000
|
trusted library allocation
|
page read and write
|
||
24F2A1B0000
|
trusted library section
|
page read and write
|
||
24F2E572000
|
trusted library section
|
page read and write
|
||
A7403264000
|
trusted library allocation
|
page read and write
|
||
CD997FE000
|
unkown
|
page readonly
|
||
806D000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27916000
|
heap
|
page read and write
|
||
6F000230000
|
direct allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC00260000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
707400601000
|
trusted library allocation
|
page read and write
|
||
CD8DFFB000
|
stack
|
page read and write
|
||
A7403184000
|
trusted library allocation
|
page read and write
|
||
A7403020000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
A7403288000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
A740240C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CDFA5FE000
|
unkown
|
page readonly
|
||
A740280C000
|
trusted library allocation
|
page read and write
|
||
7EC002A0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400288000
|
trusted library allocation
|
page read and write
|
||
CD9AFFD000
|
stack
|
page read and write
|
||
A740293C000
|
trusted library allocation
|
page read and write
|
||
707400724000
|
trusted library allocation
|
page read and write
|
||
A7402C0C000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
80AA000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
CD9EFFE000
|
stack
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
24F243B0000
|
trusted library allocation
|
page read and write
|
||
A7402EB8000
|
trusted library allocation
|
page read and write
|
||
A7402F08000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC00264000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
A7402534000
|
trusted library allocation
|
page read and write
|
||
7F0B000
|
heap
|
page read and write
|
||
24F2D46D000
|
heap
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
A74023F4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402570000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
24F27E76000
|
heap
|
page read and write
|
||
A74023E4000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400320000
|
trusted library allocation
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
24F2DBF3000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402DCC000
|
trusted library allocation
|
page read and write
|
||
A74031E8000
|
trusted library allocation
|
page read and write
|
||
A7402CA8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27921000
|
heap
|
page read and write
|
||
CD95FFE000
|
stack
|
page read and write
|
||
7EC0020C000
|
trusted library allocation
|
page read and write
|
||
707400720000
|
trusted library allocation
|
page read and write
|
||
A74023D4000
|
trusted library allocation
|
page read and write
|
||
8035000
|
heap
|
page read and write
|
||
A7402913000
|
trusted library allocation
|
page read and write
|
||
CD9B7FE000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
707400770000
|
trusted library allocation
|
page read and write
|
||
A7403030000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
7F09000
|
heap
|
page read and write
|
||
A740241C000
|
trusted library allocation
|
page read and write
|
||
77F1000
|
heap
|
page read and write
|
||
829D000
|
heap
|
page read and write
|
||
707400390000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
1D16000
|
heap
|
page read and write
|
||
A740326C000
|
trusted library allocation
|
page read and write
|
||
A7403001000
|
trusted library allocation
|
page read and write
|
||
70740033C000
|
trusted library allocation
|
page read and write
|
||
A7402C40000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
A7402BC0000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A7402EB8000
|
trusted library allocation
|
page read and write
|
||
CDFE5FE000
|
unkown
|
page readonly
|
||
1CEB000
|
heap
|
page read and write
|
||
70740087C000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F24476000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
A740300C000
|
trusted library allocation
|
page read and write
|
||
A7402D00000
|
trusted library allocation
|
page read and write
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
7EC00238000
|
trusted library allocation
|
page read and write
|
||
8061000
|
heap
|
page read and write
|
||
A74024F0000
|
trusted library allocation
|
page read and write
|
||
707400201000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
34BE000
|
stack
|
page read and write
|
||
7EC002C8000
|
trusted library allocation
|
page read and write
|
||
7FD0000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
A7402CC0000
|
trusted library allocation
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
CD9BFFE000
|
stack
|
page read and write
|
||
CDFBDFA000
|
stack
|
page read and write
|
||
A7402414000
|
trusted library allocation
|
page read and write
|
||
6F000290000
|
direct allocation
|
page read and write
|
||
7EC00220000
|
trusted library allocation
|
page read and write
|
||
A7402E2C000
|
trusted library allocation
|
page read and write
|
||
CD8EFFC000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1D38000
|
heap
|
page read and write
|
||
CDFB5FE000
|
unkown
|
page readonly
|
||
A9A000
|
unkown
|
page readonly
|
||
CDA17FE000
|
unkown
|
page readonly
|
||
7824000
|
direct allocation
|
page read and write
|
||
A7402DA8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD857FE000
|
unkown
|
page readonly
|
||
7074006E4000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
A7402534000
|
trusted library allocation
|
page read and write
|
||
A7402768000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
24F2A220000
|
trusted library allocation
|
page read and write
|
||
7F06000
|
heap
|
page read and write
|
||
A74023B4000
|
trusted library allocation
|
page read and write
|
||
707400408000
|
trusted library allocation
|
page read and write
|
||
7F05000
|
heap
|
page read and write
|
||
707400310000
|
trusted library allocation
|
page read and write
|
||
7270000
|
direct allocation
|
page read and write
|
||
7F03000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD8AFFA000
|
stack
|
page read and write
|
||
A740295A000
|
trusted library allocation
|
page read and write
|
||
CD9C7FE000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
CD8A7FE000
|
unkown
|
page readonly
|
||
A74028CC000
|
trusted library allocation
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
A7403378000
|
trusted library allocation
|
page read and write
|
||
A7402EC8000
|
trusted library allocation
|
page read and write
|
||
24F27DF0000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6F00024C000
|
direct allocation
|
page read and write
|
||
24F24610000
|
heap
|
page read and write
|
||
1D18000
|
heap
|
page read and write
|
||
A74030FC000
|
trusted library allocation
|
page read and write
|
||
A74030BC000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F27E88000
|
heap
|
page read and write
|
||
7EC002A0000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
70740033C000
|
trusted library allocation
|
page read and write
|
||
A740300C000
|
trusted library allocation
|
page read and write
|
||
A7402FC0000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402B00000
|
trusted library allocation
|
page read and write
|
||
A74028DC000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
CDFDDFC000
|
stack
|
page read and write
|
||
A74023F8000
|
trusted library allocation
|
page read and write
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
80BC000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
6DD1000
|
heap
|
page read and write
|
||
7F03000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074006F0000
|
trusted library allocation
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
A7402EB8000
|
trusted library allocation
|
page read and write
|
||
A74023B4000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
7F04000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
707400688000
|
trusted library allocation
|
page read and write
|
||
6F00025C000
|
direct allocation
|
page read and write
|
||
A7402EAC000
|
trusted library allocation
|
page read and write
|
||
A740240C000
|
trusted library allocation
|
page read and write
|
||
A74024A4000
|
trusted library allocation
|
page read and write
|
||
7FAD000
|
heap
|
page read and write
|
||
A74024E3000
|
trusted library allocation
|
page read and write
|
||
A7402EC8000
|
trusted library allocation
|
page read and write
|
||
7F08000
|
heap
|
page read and write
|
||
A7403168000
|
trusted library allocation
|
page read and write
|
||
CDF2DFE000
|
unkown
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A7402F64000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
A7402410000
|
trusted library allocation
|
page read and write
|
||
707400401000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7400201000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A74033BC000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
CD8D7FE000
|
unkown
|
page readonly
|
||
24F2E5B0000
|
trusted library section
|
page read and write
|
||
CD867FE000
|
unkown
|
page readonly
|
||
A91000
|
unkown
|
page execute read
|
||
A7402C30000
|
trusted library allocation
|
page read and write
|
||
707400320000
|
trusted library allocation
|
page read and write
|
||
24F2DB10000
|
trusted library section
|
page read and write
|
||
7F0F000
|
heap
|
page read and write
|
||
24F2BDE2000
|
trusted library allocation
|
page read and write
|
||
CD9E7FE000
|
unkown
|
page readonly
|
||
7F09000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74D0000
|
direct allocation
|
page execute and read and write
|
||
A74022E0000
|
trusted library allocation
|
page read and write
|
||
24F244B7000
|
heap
|
page read and write
|
||
24F2DB9E000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
EAF000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
707400700000
|
trusted library allocation
|
page read and write
|
||
A7402E5C000
|
trusted library allocation
|
page read and write
|
||
A740252C000
|
trusted library allocation
|
page read and write
|
||
A7402E2C000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402918000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
A74024B8000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
A7402554000
|
trusted library allocation
|
page read and write
|
||
7EC002BC000
|
trusted library allocation
|
page read and write
|
||
CD83FFA000
|
stack
|
page read and write
|
||
2BC000
|
stack
|
page read and write
|
||
1D36000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
CD97FFE000
|
stack
|
page read and write
|
||
24F2DA00000
|
heap
|
page read and write
|
||
24F2E686000
|
trusted library section
|
page read and write
|
||
A7403434000
|
trusted library allocation
|
page read and write
|
||
A74028CC000
|
trusted library allocation
|
page read and write
|
||
24F27EFE000
|
heap
|
page read and write
|
||
A7402494000
|
trusted library allocation
|
page read and write
|
||
80A6000
|
heap
|
page read and write
|
||
A740320C000
|
trusted library allocation
|
page read and write
|
||
24F2E6AD000
|
trusted library section
|
page read and write
|
||
A74023C4000
|
trusted library allocation
|
page read and write
|
||
A7400AA2000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
A7403264000
|
trusted library allocation
|
page read and write
|
||
707400658000
|
trusted library allocation
|
page read and write
|
||
A7402601000
|
trusted library allocation
|
page read and write
|
||
A7402954000
|
trusted library allocation
|
page read and write
|
||
8019000
|
heap
|
page read and write
|
||
A7402668000
|
trusted library allocation
|
page read and write
|
||
A7402BEC000
|
trusted library allocation
|
page read and write
|
||
A7403264000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402E31000
|
trusted library allocation
|
page read and write
|
||
1D16000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
8012000
|
heap
|
page read and write
|
||
158C000
|
unkown
|
page execute and write copy
|
||
6DD1000
|
heap
|
page read and write
|
||
24F24500000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
CD99FFE000
|
stack
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
A7402584000
|
trusted library allocation
|
page read and write
|
||
A7402E3C000
|
trusted library allocation
|
page read and write
|
||
24F27F3E000
|
heap
|
page read and write
|
||
24F27922000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page readonly
|
||
24F27921000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page write copy
|
||
7F00000
|
heap
|
page read and write
|
||
7F09000
|
heap
|
page read and write
|
||
6F000284000
|
direct allocation
|
page read and write
|
||
24F2D957000
|
unclassified section
|
page read and write
|
||
24F2E5E3000
|
trusted library section
|
page read and write
|
||
809C000
|
heap
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
1D19000
|
heap
|
page read and write
|
||
A7402498000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A740339C000
|
trusted library allocation
|
page read and write
|
||
6F000220000
|
direct allocation
|
page read and write
|
||
8254000
|
heap
|
page read and write
|
||
707400238000
|
trusted library allocation
|
page read and write
|
||
707400368000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7074002D4000
|
trusted library allocation
|
page read and write
|
||
A74028EC000
|
trusted library allocation
|
page read and write
|
||
1D36000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
798A000
|
direct allocation
|
page read and write
|
||
A7402384000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
24F242B0000
|
heap
|
page read and write
|
||
1D1A000
|
heap
|
page read and write
|
||
6F0002DC000
|
direct allocation
|
page read and write
|
||
7FFC000
|
heap
|
page read and write
|
||
7EC00278000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402201000
|
trusted library allocation
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
A74027A8000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A74025DC000
|
trusted library allocation
|
page read and write
|
||
A74027E8000
|
trusted library allocation
|
page read and write
|
||
CDF6DFE000
|
stack
|
page read and write
|
||
24F24680000
|
heap
|
page read and write
|
||
CD9CFFE000
|
stack
|
page read and write
|
||
CD87FFE000
|
stack
|
page read and write
|
||
74F0000
|
direct allocation
|
page execute and read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6F000217000
|
direct allocation
|
page read and write
|
||
24F2791C000
|
heap
|
page read and write
|
||
24F243C8000
|
heap
|
page read and write
|
||
24F27EF9000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
24F244E0000
|
heap
|
page read and write
|
||
78F0000
|
heap
|
page read and write
|
||
CDA1FFE000
|
stack
|
page read and write
|
||
80AD000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
7EC002B0000
|
trusted library allocation
|
page read and write
|
||
CDF9DFB000
|
stack
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402430000
|
trusted library allocation
|
page read and write
|
||
24F27EDE000
|
heap
|
page read and write
|
||
1D19000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
A7402401000
|
trusted library allocation
|
page read and write
|
||
24F2DC92000
|
trusted library section
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
24F2A1C7000
|
unclassified section
|
page read and write
|
||
707400320000
|
trusted library allocation
|
page read and write
|
||
CD9A7FE000
|
unkown
|
page readonly
|
||
CDF3DFF000
|
stack
|
page read and write
|
||
A74030B0000
|
trusted library allocation
|
page read and write
|
||
6F000250000
|
direct allocation
|
page read and write
|
||
A7403240000
|
trusted library allocation
|
page read and write
|
||
24F2E150000
|
trusted library section
|
page read and write
|
||
A74031B8000
|
trusted library allocation
|
page read and write
|
||
A7402BB0000
|
trusted library allocation
|
page read and write
|
||
336F000
|
unkown
|
page read and write
|
||
A740304C000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
24F2E550000
|
trusted library section
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
7FAD000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
6F0002E4000
|
direct allocation
|
page read and write
|
||
A7402E90000
|
trusted library allocation
|
page read and write
|
||
24F278E0000
|
heap
|
page read and write
|
||
70740035C000
|
trusted library allocation
|
page read and write
|
||
7074002F4000
|
trusted library allocation
|
page read and write
|
||
24F2D440000
|
heap
|
page read and write
|
||
7EC002B0000
|
trusted library allocation
|
page read and write
|
||
A7402394000
|
trusted library allocation
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
There are 1305 hidden memdumps, click here to show them.