Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
n1HBga77I1.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_n1HBga77I1.exe_c2c7a414f5f413de81a9416d21be1e8328b484_d999afe2_2a2dbf14-771c-4199-bfe8-9a869df88dd7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43B4.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 07:54:20 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER482A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4898.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\n1HBga77I1.exe
|
"C:\Users\user\Desktop\n1HBga77I1.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=2104,i,12785038656914492081,4527561829418186468,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 1372
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://www.google.com/chrome/tips/gsOpen
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bd
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://anglebug.com/6755P
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsd
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://anglebug.com/7246K
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
http://anglebug.com/5750d
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://www.youtube.coP
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.htmlr
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://anglebug.com/7319-data
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
http://unisolated.invalid/b
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivetk5sb.top
|
185.121.15.192
|
||
www.google.com
|
172.217.19.228
|
||
fivetk5sb.top
|
185.121.15.192
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.fivetk5sb.top
|
Spain
|
||
172.217.19.228
|
www.google.com
|
United States
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
ProgramId
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
FileId
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
LongPathHash
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Name
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
OriginalFileName
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Publisher
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Version
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
BinFileVersion
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
BinaryType
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
ProductName
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
ProductVersion
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
LinkDate
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
BinProductVersion
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
AppxPackageFullName
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Size
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Language
|
||
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6981000
|
heap
|
page read and write
|
||
642000DD8000
|
trusted library allocation
|
page read and write
|
||
87B67EF000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
6588002A0000
|
trusted library allocation
|
page read and write
|
||
642000A24000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
642000DB4000
|
trusted library allocation
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
74F800868000
|
trusted library allocation
|
page read and write
|
||
74F800220000
|
trusted library allocation
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000F78000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000973000
|
trusted library allocation
|
page read and write
|
||
658800288000
|
trusted library allocation
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
7803000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800790000
|
trusted library allocation
|
page read and write
|
||
642000E34000
|
trusted library allocation
|
page read and write
|
||
642000F88000
|
trusted library allocation
|
page read and write
|
||
74F8002FC000
|
trusted library allocation
|
page read and write
|
||
7225000
|
heap
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
642000F08000
|
trusted library allocation
|
page read and write
|
||
64200120C000
|
trusted library allocation
|
page read and write
|
||
78F5000
|
heap
|
page read and write
|
||
792D000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200057C000
|
trusted library allocation
|
page read and write
|
||
642000830000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
270421E0000
|
trusted library allocation
|
page read and write
|
||
64200022C000
|
trusted library allocation
|
page read and write
|
||
642000439000
|
trusted library allocation
|
page read and write
|
||
642000C44000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
heap
|
page read and write
|
||
642000433000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
642000118000
|
trusted library allocation
|
page read and write
|
||
87CE7FD000
|
stack
|
page read and write
|
||
27042A93000
|
trusted library section
|
page read and write
|
||
2FDE000
|
unkown
|
page read and write
|
||
74F8008E4000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
658800274000
|
trusted library allocation
|
page read and write
|
||
87C67FD000
|
stack
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000DE0000
|
trusted library allocation
|
page read and write
|
||
87DD7FE000
|
stack
|
page read and write
|
||
7950000
|
heap
|
page read and write
|
||
74F80070C000
|
trusted library allocation
|
page read and write
|
||
7B3A000
|
heap
|
page read and write
|
||
642000D68000
|
trusted library allocation
|
page read and write
|
||
74F8006AC000
|
trusted library allocation
|
page read and write
|
||
642000F1C000
|
trusted library allocation
|
page read and write
|
||
2703A759000
|
heap
|
page read and write
|
||
642000C0C000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
8AE000
|
unkown
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420001B4000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2703E1B0000
|
heap
|
page read and write
|
||
7934000
|
heap
|
page read and write
|
||
642000290000
|
trusted library allocation
|
page read and write
|
||
2703DC70000
|
heap
|
page read and write
|
||
642000218000
|
trusted library allocation
|
page read and write
|
||
63D000284000
|
direct allocation
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
642000878000
|
trusted library allocation
|
page read and write
|
||
74F800848000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
direct allocation
|
page read and write
|
||
64200124C000
|
trusted library allocation
|
page read and write
|
||
642000F44000
|
trusted library allocation
|
page read and write
|
||
63D000294000
|
direct allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
27042612000
|
trusted library allocation
|
page read and write
|
||
7FC1000
|
heap
|
page read and write
|
||
642000788000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
27042AD6000
|
trusted library section
|
page read and write
|
||
6588002C8000
|
trusted library allocation
|
page read and write
|
||
7802000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6588002B0000
|
trusted library allocation
|
page read and write
|
||
74F800880000
|
trusted library allocation
|
page read and write
|
||
658800238000
|
trusted library allocation
|
page read and write
|
||
2703E240000
|
heap
|
page read and write
|
||
642000FAC000
|
trusted library allocation
|
page read and write
|
||
27044D46000
|
trusted library section
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000E28000
|
trusted library allocation
|
page read and write
|
||
74F800898000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
6420010E4000
|
trusted library allocation
|
page read and write
|
||
642000D5C000
|
trusted library allocation
|
page read and write
|
||
7809000
|
heap
|
page read and write
|
||
74F80081C000
|
trusted library allocation
|
page read and write
|
||
642000310000
|
trusted library allocation
|
page read and write
|
||
6588002B0000
|
trusted library allocation
|
page read and write
|
||
2703A6A8000
|
heap
|
page read and write
|
||
74F8008D8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000044000
|
trusted library allocation
|
page read and write
|
||
6420011F0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200090C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420010F4000
|
trusted library allocation
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
270431D0000
|
trusted library section
|
page read and write
|
||
642000D9B000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87E77FE000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800974000
|
trusted library allocation
|
page read and write
|
||
6420011F0000
|
trusted library allocation
|
page read and write
|
||
2703DC96000
|
heap
|
page read and write
|
||
6C22D000
|
unkown
|
page read and write
|
||
642000A38000
|
trusted library allocation
|
page read and write
|
||
BC000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200104C000
|
trusted library allocation
|
page read and write
|
||
74F8008E8000
|
trusted library allocation
|
page read and write
|
||
87C2FFE000
|
unkown
|
page readonly
|
||
74F8008F0000
|
trusted library allocation
|
page read and write
|
||
2703A796000
|
heap
|
page read and write
|
||
642000BF0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000C70000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
642000344000
|
trusted library allocation
|
page read and write
|
||
642000754000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
87E47FE000
|
stack
|
page read and write
|
||
642000194000
|
trusted library allocation
|
page read and write
|
||
6588002D8000
|
trusted library allocation
|
page read and write
|
||
642000CE0000
|
trusted library allocation
|
page read and write
|
||
87E1FFE000
|
unkown
|
page readonly
|
||
74F800844000
|
trusted library allocation
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
642000074000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420010B0000
|
trusted library allocation
|
page read and write
|
||
6420009F4000
|
trusted library allocation
|
page read and write
|
||
87C57FE000
|
stack
|
page read and write
|
||
7802000
|
heap
|
page read and write
|
||
6420000EC000
|
trusted library allocation
|
page read and write
|
||
642000CD5000
|
trusted library allocation
|
page read and write
|
||
642000A30000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
642000FBC000
|
trusted library allocation
|
page read and write
|
||
87D0FFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F8002B8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000201000
|
trusted library allocation
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
87CCFFE000
|
unkown
|
page readonly
|
||
74F800830000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000744000
|
trusted library allocation
|
page read and write
|
||
63D000290000
|
direct allocation
|
page read and write
|
||
27044C80000
|
trusted library section
|
page read and write
|
||
63D000270000
|
direct allocation
|
page read and write
|
||
27044C32000
|
trusted library section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420001DC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000648000
|
trusted library allocation
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
2703E0A0000
|
trusted library section
|
page read and write
|
||
2703E218000
|
heap
|
page read and write
|
||
87D07FC000
|
stack
|
page read and write
|
||
2703DC8F000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800404000
|
trusted library allocation
|
page read and write
|
||
74F800248000
|
trusted library allocation
|
page read and write
|
||
2703A78C000
|
heap
|
page read and write
|
||
642000FD0000
|
trusted library allocation
|
page read and write
|
||
74F8006E8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000977000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F80040C000
|
trusted library allocation
|
page read and write
|
||
642000AA8000
|
trusted library allocation
|
page read and write
|
||
6C150000
|
unkown
|
page readonly
|
||
642000DF4000
|
trusted library allocation
|
page read and write
|
||
642000BAC000
|
trusted library allocation
|
page read and write
|
||
2704487E000
|
trusted library section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A75E000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000774000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
87D17FD000
|
stack
|
page read and write
|
||
7963000
|
heap
|
page read and write
|
||
6588002B0000
|
trusted library allocation
|
page read and write
|
||
6420005D0000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
74F8008A8000
|
trusted library allocation
|
page read and write
|
||
6420005B8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200097B000
|
trusted library allocation
|
page read and write
|
||
2703DC60000
|
heap
|
page read and write
|
||
6420009D4000
|
trusted library allocation
|
page read and write
|
||
74F800860000
|
trusted library allocation
|
page read and write
|
||
642000D68000
|
trusted library allocation
|
page read and write
|
||
6420001F8000
|
trusted library allocation
|
page read and write
|
||
64200009C000
|
trusted library allocation
|
page read and write
|
||
74F8002F0000
|
trusted library allocation
|
page read and write
|
||
6420001CC000
|
trusted library allocation
|
page read and write
|
||
64200115C000
|
trusted library allocation
|
page read and write
|
||
63D000210000
|
direct allocation
|
page read and write
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7806000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
27044C21000
|
trusted library section
|
page read and write
|
||
6420001B4000
|
trusted library allocation
|
page read and write
|
||
64200080C000
|
trusted library allocation
|
page read and write
|
||
6420002F7000
|
trusted library allocation
|
page read and write
|
||
87DBFFE000
|
unkown
|
page readonly
|
||
6420002CC000
|
trusted library allocation
|
page read and write
|
||
642000CE9000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420009A0000
|
trusted library allocation
|
page read and write
|
||
6588002E4000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
7941000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
27042A5E000
|
trusted library section
|
page read and write
|
||
6420010D4000
|
trusted library allocation
|
page read and write
|
||
74F8008B8000
|
trusted library allocation
|
page read and write
|
||
87CB7FB000
|
stack
|
page read and write
|
||
63D000303000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200121C000
|
trusted library allocation
|
page read and write
|
||
74F80087C000
|
trusted library allocation
|
page read and write
|
||
74F80060C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
63D000215000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
79C0000
|
heap
|
page read and write
|
||
74F80085C000
|
trusted library allocation
|
page read and write
|
||
27044650000
|
trusted library section
|
page read and write
|
||
87C1FFE000
|
unkown
|
page readonly
|
||
8A0000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7A8C000
|
heap
|
page read and write
|
||
6588002F8000
|
trusted library allocation
|
page read and write
|
||
642000B14000
|
trusted library allocation
|
page read and write
|
||
7A1F000
|
heap
|
page read and write
|
||
642001268000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800840000
|
trusted library allocation
|
page read and write
|
||
74F800818000
|
trusted library allocation
|
page read and write
|
||
87BF7FE000
|
stack
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
642001080000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
642000BAC000
|
trusted library allocation
|
page read and write
|
||
6420002A8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000DA4000
|
trusted library allocation
|
page read and write
|
||
74F80039C000
|
trusted library allocation
|
page read and write
|
||
6420003A0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420006EC000
|
trusted library allocation
|
page read and write
|
||
74F8007AC000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420004DC000
|
trusted library allocation
|
page read and write
|
||
2703DC94000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
7BBC000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
658800250000
|
trusted library allocation
|
page read and write
|
||
642000C18000
|
trusted library allocation
|
page read and write
|
||
642000390000
|
trusted library allocation
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
74F8002E4000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
6420005EC000
|
trusted library allocation
|
page read and write
|
||
642000A68000
|
trusted library allocation
|
page read and write
|
||
642000B24000
|
trusted library allocation
|
page read and write
|
||
87E37FE000
|
stack
|
page read and write
|
||
642000120000
|
trusted library allocation
|
page read and write
|
||
63D000201000
|
direct allocation
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
642000C80000
|
trusted library allocation
|
page read and write
|
||
74F800430000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200123C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
6420002A4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F8002CC000
|
trusted library allocation
|
page read and write
|
||
64200050C000
|
trusted library allocation
|
page read and write
|
||
642000228000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420006F7000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420001C4000
|
trusted library allocation
|
page read and write
|
||
74F8007D4000
|
trusted library allocation
|
page read and write
|
||
642000F68000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A74A000
|
heap
|
page read and write
|
||
642000054000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703E263000
|
heap
|
page read and write
|
||
87D9FFE000
|
unkown
|
page readonly
|
||
642000154000
|
trusted library allocation
|
page read and write
|
||
752A000
|
direct allocation
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
74F80084C000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
27042DDB000
|
heap
|
page read and write
|
||
2EED000
|
stack
|
page read and write
|
||
642000D4C000
|
trusted library allocation
|
page read and write
|
||
642000B88000
|
trusted library allocation
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
2703E27F000
|
heap
|
page read and write
|
||
642000448000
|
trusted library allocation
|
page read and write
|
||
6420007C4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000F18000
|
trusted library allocation
|
page read and write
|
||
74F8008C8000
|
trusted library allocation
|
page read and write
|
||
270423F3000
|
heap
|
page read and write
|
||
6420004A4000
|
trusted library allocation
|
page read and write
|
||
74F8006C8000
|
trusted library allocation
|
page read and write
|
||
87D7FFE000
|
unkown
|
page readonly
|
||
642000174000
|
trusted library allocation
|
page read and write
|
||
87CD7FD000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
74F800230000
|
trusted library allocation
|
page read and write
|
||
64200100C000
|
trusted library allocation
|
page read and write
|
||
642001240000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87D77FE000
|
stack
|
page read and write
|
||
74F800828000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
6420008B0000
|
trusted library allocation
|
page read and write
|
||
642000BD0000
|
trusted library allocation
|
page read and write
|
||
74F800884000
|
trusted library allocation
|
page read and write
|
||
27042BA7000
|
unclassified section
|
page read and write
|
||
7892000
|
heap
|
page read and write
|
||
63D00024C000
|
direct allocation
|
page read and write
|
||
87D27FD000
|
stack
|
page read and write
|
||
642000F68000
|
trusted library allocation
|
page read and write
|
||
6588002C0000
|
trusted library allocation
|
page read and write
|
||
7070000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000D40000
|
trusted library allocation
|
page read and write
|
||
87BB7FE000
|
stack
|
page read and write
|
||
642000C44000
|
trusted library allocation
|
page read and write
|
||
642000518000
|
trusted library allocation
|
page read and write
|
||
642000AC4000
|
trusted library allocation
|
page read and write
|
||
6420002F0000
|
trusted library allocation
|
page read and write
|
||
87C47FE000
|
stack
|
page read and write
|
||
64200073F000
|
trusted library allocation
|
page read and write
|
||
74F80091C000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
642001014000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
7800000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
27042A52000
|
trusted library section
|
page read and write
|
||
87B97FE000
|
stack
|
page read and write
|
||
6C151000
|
unkown
|
page execute read
|
||
78FA000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
642000FA0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
642000828000
|
trusted library allocation
|
page read and write
|
||
642000F78000
|
trusted library allocation
|
page read and write
|
||
270423F0000
|
heap
|
page read and write
|
||
642000B44000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
64200049A000
|
trusted library allocation
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
270425D7000
|
unclassified section
|
page read and write
|
||
6420001A8000
|
trusted library allocation
|
page read and write
|
||
64200109C000
|
trusted library allocation
|
page read and write
|
||
87D5FFE000
|
unkown
|
page readonly
|
||
6420009AC000
|
trusted library allocation
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87B87FF000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F8006E0000
|
trusted library allocation
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
79BF000
|
heap
|
page read and write
|
||
87C6FFE000
|
unkown
|
page readonly
|
||
74F8008F4000
|
trusted library allocation
|
page read and write
|
||
6588002C0000
|
trusted library allocation
|
page read and write
|
||
7A35000
|
heap
|
page read and write
|
||
2703A73E000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000E4C000
|
trusted library allocation
|
page read and write
|
||
780B000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87DA7FE000
|
stack
|
page read and write
|
||
642000B54000
|
trusted library allocation
|
page read and write
|
||
87BD7FB000
|
stack
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
2703A800000
|
trusted library allocation
|
page read and write
|
||
642000B08000
|
trusted library allocation
|
page read and write
|
||
642000001000
|
trusted library allocation
|
page read and write
|
||
73AA000
|
heap
|
page read and write
|
||
87D47FB000
|
stack
|
page read and write
|
||
6420007E4000
|
trusted library allocation
|
page read and write
|
||
642001234000
|
trusted library allocation
|
page read and write
|
||
642000214000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000F1C000
|
trusted library allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800250000
|
trusted library allocation
|
page read and write
|
||
2703E26A000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87D6FFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
642000694000
|
trusted library allocation
|
page read and write
|
||
2703DCA1000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000FF0000
|
trusted library allocation
|
page read and write
|
||
74F8006F0000
|
trusted library allocation
|
page read and write
|
||
642000980000
|
trusted library allocation
|
page read and write
|
||
64200002C000
|
trusted library allocation
|
page read and write
|
||
642000C44000
|
trusted library allocation
|
page read and write
|
||
87C87FE000
|
stack
|
page read and write
|
||
6420001D4000
|
trusted library allocation
|
page read and write
|
||
6588002F4000
|
trusted library allocation
|
page read and write
|
||
64200021C000
|
trusted library allocation
|
page read and write
|
||
74F80078C000
|
trusted library allocation
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
87C07FA000
|
stack
|
page read and write
|
||
2703DC9C000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
87C77FA000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7080000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87CC7FC000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7B7C000
|
heap
|
page read and write
|
||
642000328000
|
trusted library allocation
|
page read and write
|
||
87C17FB000
|
stack
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
79C2000
|
heap
|
page read and write
|
||
27044DA0000
|
trusted library section
|
page read and write
|
||
6420009C4000
|
trusted library allocation
|
page read and write
|
||
642000739000
|
trusted library allocation
|
page read and write
|
||
642000CD9000
|
trusted library allocation
|
page read and write
|
||
642000E90000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
27042B80000
|
trusted library section
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
658800235000
|
trusted library allocation
|
page read and write
|
||
63D000217000
|
direct allocation
|
page read and write
|
||
642000BC0000
|
trusted library allocation
|
page read and write
|
||
63D000250000
|
direct allocation
|
page read and write
|
||
2703DC9C000
|
heap
|
page read and write
|
||
780E000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000860000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7927000
|
heap
|
page read and write
|
||
642000E70000
|
trusted library allocation
|
page read and write
|
||
642000734000
|
trusted library allocation
|
page read and write
|
||
74F80039C000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
7801000
|
heap
|
page read and write
|
||
6C278000
|
unkown
|
page readonly
|
||
6420005EA000
|
trusted library allocation
|
page read and write
|
||
87E5FFE000
|
unkown
|
page readonly
|
||
6420002F3000
|
trusted library allocation
|
page read and write
|
||
64200042D000
|
trusted library allocation
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
74F800424000
|
trusted library allocation
|
page read and write
|
||
2703A743000
|
heap
|
page read and write
|
||
74F8002B0000
|
trusted library allocation
|
page read and write
|
||
7806000
|
heap
|
page read and write
|
||
7979000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7956000
|
heap
|
page read and write
|
||
64200114C000
|
trusted library allocation
|
page read and write
|
||
87E4FFE000
|
unkown
|
page readonly
|
||
642000F68000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
642000FAC000
|
trusted library allocation
|
page read and write
|
||
87CEFFE000
|
unkown
|
page readonly
|
||
87C3FFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
87D97FE000
|
stack
|
page read and write
|
||
330F000
|
unkown
|
page read and write
|
||
642001088000
|
trusted library allocation
|
page read and write
|
||
27042207000
|
unclassified section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000144000
|
trusted library allocation
|
page read and write
|
||
63D000230000
|
direct allocation
|
page read and write
|
||
642000FE0000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
49C000
|
stack
|
page read and write
|
||
270429F0000
|
trusted library section
|
page read and write
|
||
78D3000
|
heap
|
page read and write
|
||
7909000
|
heap
|
page read and write
|
||
63D0002E4000
|
direct allocation
|
page read and write
|
||
2703A920000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8AE000
|
unkown
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
64200012C000
|
trusted library allocation
|
page read and write
|
||
6420001E8000
|
trusted library allocation
|
page read and write
|
||
6420001E0000
|
trusted library allocation
|
page read and write
|
||
27042247000
|
unclassified section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000B4C000
|
trusted library allocation
|
page read and write
|
||
71CF000
|
heap
|
page read and write
|
||
74F800874000
|
trusted library allocation
|
page read and write
|
||
6420001B4000
|
trusted library allocation
|
page read and write
|
||
87CAFFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
2703E390000
|
trusted library section
|
page read and write
|
||
2703DC8A000
|
heap
|
page read and write
|
||
642000368000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
direct allocation
|
page read and write
|
||
6588002A0000
|
trusted library allocation
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
2703DCA1000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6C27C000
|
unkown
|
page readonly
|
||
780A000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
87D1FFE000
|
unkown
|
page readonly
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
6420008E4000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
642000C28000
|
trusted library allocation
|
page read and write
|
||
642001258000
|
trusted library allocation
|
page read and write
|
||
2704465E000
|
trusted library section
|
page read and write
|
||
74F8008C4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000601000
|
trusted library allocation
|
page read and write
|
||
6420008C8000
|
trusted library allocation
|
page read and write
|
||
73C4000
|
direct allocation
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87BE7FB000
|
stack
|
page read and write
|
||
2703E25F000
|
heap
|
page read and write
|
||
6420006B4000
|
trusted library allocation
|
page read and write
|
||
87BA7FE000
|
stack
|
page read and write
|
||
642000F18000
|
trusted library allocation
|
page read and write
|
||
642000ECC000
|
trusted library allocation
|
page read and write
|
||
87E0FFE000
|
unkown
|
page readonly
|
||
27044C70000
|
trusted library section
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800418000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200019C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A7A0000
|
heap
|
page readonly
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420003A0000
|
trusted library allocation
|
page read and write
|
||
87DE7FE000
|
stack
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
63D000220000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F80079C000
|
trusted library allocation
|
page read and write
|
||
642000E0C000
|
trusted library allocation
|
page read and write
|
||
74F80020C000
|
trusted library allocation
|
page read and write
|
||
78C2000
|
heap
|
page read and write
|
||
642000801000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642001228000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
354B000
|
heap
|
page read and write
|
||
789A000
|
heap
|
page read and write
|
||
73CF000
|
direct allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
27042AFD000
|
trusted library section
|
page read and write
|
||
87C8FFE000
|
unkown
|
page readonly
|
||
8B1000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
79A4000
|
heap
|
page read and write
|
||
7A57000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
74F80082C000
|
trusted library allocation
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
27042DE1000
|
heap
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
6981000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200043C000
|
trusted library allocation
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
87E27F4000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2703E1DA000
|
heap
|
page read and write
|
||
74F800408000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
2703E279000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703E243000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
79EF000
|
heap
|
page read and write
|
||
2703E1E3000
|
heap
|
page read and write
|
||
27042AF2000
|
trusted library section
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
87D37FB000
|
stack
|
page read and write
|
||
2703E29A000
|
heap
|
page read and write
|
||
795B000
|
heap
|
page read and write
|
||
2703A6A0000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87BFFFE000
|
unkown
|
page readonly
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
74F800920000
|
trusted library allocation
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
6420007DC000
|
trusted library allocation
|
page read and write
|
||
63D000260000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
27044C10000
|
trusted library section
|
page read and write
|
||
642001264000
|
trusted library allocation
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800918000
|
trusted library allocation
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000300000
|
trusted library allocation
|
page read and write
|
||
87C4FFE000
|
unkown
|
page readonly
|
||
110F000
|
stack
|
page read and write
|
||
2703DC93000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000628000
|
trusted library allocation
|
page read and write
|
||
87C7FFE000
|
unkown
|
page readonly
|
||
6420002D0000
|
trusted library allocation
|
page read and write
|
||
642000F44000
|
trusted library allocation
|
page read and write
|
||
658800264000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
642000500000
|
trusted library allocation
|
page read and write
|
||
642000D34000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000330000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2703E272000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
94B000
|
heap
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
658800294000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
unkown
|
page write copy
|
||
74F800210000
|
trusted library allocation
|
page read and write
|
||
642000C34000
|
trusted library allocation
|
page read and write
|
||
6588002A0000
|
trusted library allocation
|
page read and write
|
||
6420004A0000
|
trusted library allocation
|
page read and write
|
||
74F8008AC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
642000B2C000
|
trusted library allocation
|
page read and write
|
||
658800270000
|
trusted library allocation
|
page read and write
|
||
642000EB8000
|
trusted library allocation
|
page read and write
|
||
642000844000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000A80000
|
trusted library allocation
|
page read and write
|
||
27042DF9000
|
heap
|
page read and write
|
||
78E0000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200020C000
|
trusted library allocation
|
page read and write
|
||
6420008B8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8AE000
|
unkown
|
page write copy
|
||
6420001D8000
|
trusted library allocation
|
page read and write
|
||
2703E270000
|
heap
|
page read and write
|
||
642000C01000
|
trusted library allocation
|
page read and write
|
||
78A3000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000BB0000
|
trusted library allocation
|
page read and write
|
||
87D3FFE000
|
unkown
|
page readonly
|
||
74F800700000
|
trusted library allocation
|
page read and write
|
||
74F8006F4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000C78000
|
trusted library allocation
|
page read and write
|
||
2703E218000
|
heap
|
page read and write
|
||
27044D6D000
|
trusted library section
|
page read and write
|
||
6420002B4000
|
trusted library allocation
|
page read and write
|
||
6420004AC000
|
trusted library allocation
|
page read and write
|
||
6420001B4000
|
trusted library allocation
|
page read and write
|
||
74F800894000
|
trusted library allocation
|
page read and write
|
||
6420000DC000
|
trusted library allocation
|
page read and write
|
||
642001160000
|
trusted library allocation
|
page read and write
|
||
74F80027C000
|
trusted library allocation
|
page read and write
|
||
63D0002DC000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
64200031C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87C37FE000
|
stack
|
page read and write
|
||
642000013000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
658800220000
|
trusted library allocation
|
page read and write
|
||
74F8007E4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
74F8006C8000
|
trusted library allocation
|
page read and write
|
||
79DC000
|
heap
|
page read and write
|
||
74F8007E0000
|
trusted library allocation
|
page read and write
|
||
7B56000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
780A000
|
heap
|
page read and write
|
||
64200063C000
|
trusted library allocation
|
page read and write
|
||
63D00020C000
|
direct allocation
|
page read and write
|
||
6420001F4000
|
trusted library allocation
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
642000210000
|
trusted library allocation
|
page read and write
|
||
2703D050000
|
unkown
|
page read and write
|
||
2703C603000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87D8FFE000
|
unkown
|
page readonly
|
||
642000390000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F8006BC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
642000C9C000
|
trusted library allocation
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
64200065C000
|
trusted library allocation
|
page read and write
|
||
2703DC8F000
|
heap
|
page read and write
|
||
6420001F0000
|
trusted library allocation
|
page read and write
|
||
7AAF000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
642000304000
|
trusted library allocation
|
page read and write
|
||
2703DC93000
|
heap
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
87DEFFE000
|
unkown
|
page readonly
|
||
73A0000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
87DC7FD000
|
stack
|
page read and write
|
||
642000D74000
|
trusted library allocation
|
page read and write
|
||
87DF7FE000
|
stack
|
page read and write
|
||
642000884000
|
trusted library allocation
|
page read and write
|
||
642000E40000
|
trusted library allocation
|
page read and write
|
||
6420010C8000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000948000
|
trusted library allocation
|
page read and write
|
||
87D67FE000
|
stack
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
642000DA4000
|
trusted library allocation
|
page read and write
|
||
642000DC4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7968000
|
heap
|
page read and write
|
||
642000224000
|
trusted library allocation
|
page read and write
|
||
642000344000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
63D0002AC000
|
direct allocation
|
page read and write
|
||
87BBFFE000
|
unkown
|
page readonly
|
||
74F800401000
|
trusted library allocation
|
page read and write
|
||
87DCFFE000
|
unkown
|
page readonly
|
||
79D4000
|
heap
|
page read and write
|
||
642000CF8000
|
trusted library allocation
|
page read and write
|
||
63D0002A8000
|
direct allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
87C27FC000
|
stack
|
page read and write
|
||
642000CC0000
|
trusted library allocation
|
page read and write
|
||
64200114C000
|
trusted library allocation
|
page read and write
|
||
71B1000
|
heap
|
page read and write
|
||
6588002C0000
|
trusted library allocation
|
page read and write
|
||
78EE000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
74F8002F4000
|
trusted library allocation
|
page read and write
|
||
642000D80000
|
trusted library allocation
|
page read and write
|
||
87E7FFE000
|
unkown
|
page readonly
|
||
74F8006AC000
|
trusted library allocation
|
page read and write
|
||
87CA7FB000
|
stack
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
8A1000
|
unkown
|
page execute read
|
||
2703A810000
|
trusted library allocation
|
page read and write
|
||
6420003A0000
|
trusted library allocation
|
page read and write
|
||
74F800864000
|
trusted library allocation
|
page read and write
|
||
87E07FB000
|
stack
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
87B9FFE000
|
unkown
|
page readonly
|
||
74F80080C000
|
trusted library allocation
|
page read and write
|
||
6420002A4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200098C000
|
trusted library allocation
|
page read and write
|
||
642000FAC000
|
trusted library allocation
|
page read and write
|
||
79A6000
|
heap
|
page read and write
|
||
642000DC4000
|
trusted library allocation
|
page read and write
|
||
6420006DC000
|
trusted library allocation
|
page read and write
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
64200006A000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703E130000
|
trusted library section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800601000
|
trusted library allocation
|
page read and write
|
||
6588002C0000
|
trusted library allocation
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
642000304000
|
trusted library allocation
|
page read and write
|
||
642000868000
|
trusted library allocation
|
page read and write
|
||
642000590000
|
trusted library allocation
|
page read and write
|
||
642000E01000
|
trusted library allocation
|
page read and write
|
||
795B000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800960000
|
trusted library allocation
|
page read and write
|
||
7A68000
|
heap
|
page read and write
|
||
642000C4C000
|
trusted library allocation
|
page read and write
|
||
7809000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
63D000234000
|
direct allocation
|
page read and write
|
||
642000118000
|
trusted library allocation
|
page read and write
|
||
642000EA8000
|
trusted library allocation
|
page read and write
|
||
642000084000
|
trusted library allocation
|
page read and write
|
||
74F80025C000
|
trusted library allocation
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
87D2FFE000
|
unkown
|
page readonly
|
||
7AC7000
|
heap
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
2703E26E000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800788000
|
trusted library allocation
|
page read and write
|
||
642001201000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200040C000
|
trusted library allocation
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000D14000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420005A0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
642000184000
|
trusted library allocation
|
page read and write
|
||
642000E9C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
14E0000
|
unkown
|
page write copy
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
752C000
|
direct allocation
|
page read and write
|
||
642000C47000
|
trusted library allocation
|
page read and write
|
||
74F800288000
|
trusted library allocation
|
page read and write
|
||
87CBFFE000
|
unkown
|
page readonly
|
||
6420009E4000
|
trusted library allocation
|
page read and write
|
||
74F800238000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F8007A0000
|
trusted library allocation
|
page read and write
|
||
63D000280000
|
direct allocation
|
page read and write
|
||
642000380000
|
trusted library allocation
|
page read and write
|
||
2703DC8A000
|
heap
|
page read and write
|
||
74F8006D4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7AB5000
|
heap
|
page read and write
|
||
27044C91000
|
trusted library section
|
page read and write
|
||
7601000
|
heap
|
page read and write
|
||
2703C600000
|
heap
|
page read and write
|
||
87DDFFE000
|
unkown
|
page readonly
|
||
87E17FC000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
642000A0C000
|
trusted library allocation
|
page read and write
|
||
2703C5A0000
|
heap
|
page read and write
|
||
642000928000
|
trusted library allocation
|
page read and write
|
||
642000F74000
|
trusted library allocation
|
page read and write
|
||
642000164000
|
trusted library allocation
|
page read and write
|
||
63D0002EC000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000090000
|
trusted library allocation
|
page read and write
|
||
7917000
|
heap
|
page read and write
|
||
2703A8F0000
|
trusted library section
|
page readonly
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000448000
|
trusted library allocation
|
page read and write
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
unkown
|
page read and write
|
||
6420000FC000
|
trusted library allocation
|
page read and write
|
||
642000CB8000
|
trusted library allocation
|
page read and write
|
||
642001020000
|
trusted library allocation
|
page read and write
|
||
642000FA0000
|
trusted library allocation
|
page read and write
|
||
642000A01000
|
trusted library allocation
|
page read and write
|
||
7932000
|
heap
|
page read and write
|
||
8AE000
|
unkown
|
page write copy
|
||
87E2FFE000
|
unkown
|
page readonly
|
||
94A000
|
heap
|
page read and write
|
||
74F8007D0000
|
trusted library allocation
|
page read and write
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
27044C3E000
|
trusted library section
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
780F000
|
heap
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
642000E28000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
642000118000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
2703E26C000
|
heap
|
page read and write
|
||
642000700000
|
trusted library allocation
|
page read and write
|
||
6420006CC000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
74F80095C000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
unkown
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A7E0000
|
heap
|
page read and write
|
||
27044870000
|
trusted library section
|
page read and write
|
||
642000A78000
|
trusted library allocation
|
page read and write
|
||
87C9FFE000
|
unkown
|
page readonly
|
||
7A07000
|
heap
|
page read and write
|
||
6588002BC000
|
trusted library allocation
|
page read and write
|
||
64200060C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6420001E4000
|
trusted library allocation
|
page read and write
|
||
87BAFFE000
|
unkown
|
page readonly
|
||
642000EA8000
|
trusted library allocation
|
page read and write
|
||
74F8006E8000
|
trusted library allocation
|
page read and write
|
||
87E57FE000
|
stack
|
page read and write
|
||
642000EDC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87D57FB000
|
stack
|
page read and write
|
||
64200000C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A7C0000
|
heap
|
page read and write
|
||
6420005E4000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F800890000
|
trusted library allocation
|
page read and write
|
||
6420004A0000
|
trusted library allocation
|
page read and write
|
||
6420002C0000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute and write copy
|
||
2703E1EB000
|
heap
|
page read and write
|
||
64200115C000
|
trusted library allocation
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
74F800964000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
74F80071C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
7808000
|
heap
|
page read and write
|
||
87BEFFE000
|
unkown
|
page readonly
|
||
27044CA3000
|
trusted library section
|
page read and write
|
||
7B17000
|
heap
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000D8C000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
87DAFFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6420003B4000
|
trusted library allocation
|
page read and write
|
||
642000304000
|
trusted library allocation
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
27044D62000
|
trusted library section
|
page read and write
|
||
6588002F0000
|
trusted library allocation
|
page read and write
|
||
7AB5000
|
heap
|
page read and write
|
||
642000F08000
|
trusted library allocation
|
page read and write
|
||
64200115C000
|
trusted library allocation
|
page read and write
|
||
64200027C000
|
trusted library allocation
|
page read and write
|
||
74F8008EC000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
78B4000
|
heap
|
page read and write
|
||
74F800801000
|
trusted library allocation
|
page read and write
|
||
87CFFFE000
|
unkown
|
page readonly
|
||
642000350000
|
trusted library allocation
|
page read and write
|
||
74F8007C0000
|
trusted library allocation
|
page read and write
|
||
2703E24C000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703E410000
|
trusted library section
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87DB7FE000
|
stack
|
page read and write
|
||
642000D68000
|
trusted library allocation
|
page read and write
|
||
780D000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000E85000
|
trusted library allocation
|
page read and write
|
||
87C5FFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
87C0FFE000
|
unkown
|
page readonly
|
||
642000230000
|
trusted library allocation
|
page read and write
|
||
64200035C000
|
trusted library allocation
|
page read and write
|
||
74F800878000
|
trusted library allocation
|
page read and write
|
||
63D00023C000
|
direct allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703A925000
|
heap
|
page read and write
|
||
642000CAC000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
6420001EC000
|
trusted library allocation
|
page read and write
|
||
65880020C000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000C5C000
|
trusted library allocation
|
page read and write
|
||
798A000
|
heap
|
page read and write
|
||
642000DC4000
|
trusted library allocation
|
page read and write
|
||
642000E68000
|
trusted library allocation
|
page read and write
|
||
658800230000
|
trusted library allocation
|
page read and write
|
||
642000A18000
|
trusted library allocation
|
page read and write
|
||
7912000
|
heap
|
page read and write
|
||
6420006A4000
|
trusted library allocation
|
page read and write
|
||
27042DD0000
|
heap
|
page read and write
|
||
87CF7FD000
|
stack
|
page read and write
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
78CD000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000C68000
|
trusted library allocation
|
page read and write
|
||
27042FD0000
|
trusted library section
|
page read and write
|
||
74F8002D4000
|
trusted library allocation
|
page read and write
|
||
642000D98000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000718000
|
trusted library allocation
|
page read and write
|
||
74F8002ED000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
87BCFFE000
|
unkown
|
page readonly
|
||
7B8E000
|
heap
|
page read and write
|
||
642000401000
|
trusted library allocation
|
page read and write
|
||
74F8006AC000
|
trusted library allocation
|
page read and write
|
||
799F000
|
heap
|
page read and write
|
||
2703E1BB000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2703E257000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642001001000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6C279000
|
unkown
|
page read and write
|
||
7090000
|
direct allocation
|
page execute and read and write
|
||
642000330000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000344000
|
trusted library allocation
|
page read and write
|
||
87D87FE000
|
stack
|
page read and write
|
||
658800201000
|
trusted library allocation
|
page read and write
|
||
6C22F000
|
unkown
|
page readonly
|
||
658800248000
|
trusted library allocation
|
page read and write
|
||
799C000
|
heap
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
74F800850000
|
trusted library allocation
|
page read and write
|
||
87DFFFE000
|
unkown
|
page readonly
|
||
7808000
|
heap
|
page read and write
|
||
87CDFFE000
|
unkown
|
page readonly
|
||
87B77FE000
|
unkown
|
page read and write
|
||
797C000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200056C000
|
trusted library allocation
|
page read and write
|
||
74F8007BC000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
64200033C000
|
trusted library allocation
|
page read and write
|
||
642000220000
|
trusted library allocation
|
page read and write
|
||
87BC7FD000
|
stack
|
page read and write
|
||
78FF000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
74F800201000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
642000FAC000
|
trusted library allocation
|
page read and write
|
||
87BDFFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000668000
|
trusted library allocation
|
page read and write
|
||
6588002A0000
|
trusted library allocation
|
page read and write
|
||
27042277000
|
unclassified section
|
page read and write
|
||
2703A5C0000
|
heap
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
87D4FFE000
|
unkown
|
page readonly
|
||
789C000
|
heap
|
page read and write
|
||
1872000
|
unkown
|
page execute and write copy
|
||
658800278000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
8AE000
|
unkown
|
page write copy
|
||
642000B58000
|
trusted library allocation
|
page read and write
|
||
74F800248000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
270423A0000
|
heap
|
page read and write
|
||
642001030000
|
trusted library allocation
|
page read and write
|
||
6588002C0000
|
trusted library allocation
|
page read and write
|
||
7997000
|
heap
|
page read and write
|
||
74F800904000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
2F2A000
|
stack
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
642000EFC000
|
trusted library allocation
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
642000907000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
2703E1D2000
|
heap
|
page read and write
|
||
2703DCA0000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6420000B4000
|
trusted library allocation
|
page read and write
|
||
74F800948000
|
trusted library allocation
|
page read and write
|
||
87C97FE000
|
stack
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
78CC000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
642000E5C000
|
trusted library allocation
|
page read and write
|
||
64200020C000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
8AA000
|
unkown
|
page readonly
|
||
6E00000
|
direct allocation
|
page read and write
|
||
642000AD8000
|
trusted library allocation
|
page read and write
|
||
658800260000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
64200091C000
|
trusted library allocation
|
page read and write
|
||
642000A48000
|
trusted library allocation
|
page read and write
|
||
6420001D0000
|
trusted library allocation
|
page read and write
|
||
642000BB0000
|
trusted library allocation
|
page read and write
|
||
78B7000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page readonly
|
||
87E3FFE000
|
unkown
|
page readonly
|
||
6981000
|
heap
|
page read and write
|
||
74F800728000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000D68000
|
trusted library allocation
|
page read and write
|
||
63D000274000
|
direct allocation
|
page read and write
|
||
74F800778000
|
trusted library allocation
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000490000
|
trusted library allocation
|
page read and write
|
||
780A000
|
heap
|
page read and write
|
||
6981000
|
heap
|
page read and write
|
||
642000EC4000
|
trusted library allocation
|
page read and write
|
||
2703DC93000
|
heap
|
page read and write
|
||
642000370000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
63D0002D0000
|
direct allocation
|
page read and write
|
There are 1211 hidden memdumps, click here to show them.