Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6dPpCeWDig.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6dPpCeWDig.exe_5b5344f9cb7648d524ec243936c13c7d45b2e2f9_98cae835_989df761-6271-4bdd-9180-5f376cd25ec4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB60.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 07:57:22 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD07.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD47.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6dPpCeWDig.exe
|
"C:\Users\user\Desktop\6dPpCeWDig.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2460 --field-trial-handle=2296,i,1584049202898169738,758844349250763749,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 1168
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/3965.
|
unknown
|
||
http://anglebug.com/5371I
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/3584O
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/5055H
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsRun
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7320E
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
http://anglebug.com/82290
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://anglebug.com/7489/
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://issuetracker.google.com/issues/1664752737
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://anglebug.com/4551F
|
unknown
|
||
http://anglebug.com/5421_
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b=
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6141N
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://anglebug.com/5881:
|
unknown
|
||
http://anglebug.com/58819
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/4722~
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://anglebug.com/7162=
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://anglebug.com/6574G
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.132
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.132
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
ProgramId
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
FileId
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
LongPathHash
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Name
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
OriginalFileName
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Publisher
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Version
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
BinFileVersion
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
BinaryType
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
ProductName
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
ProductVersion
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
LinkDate
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
BinProductVersion
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
AppxPackageFullName
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Size
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Language
|
||
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
103C000
|
stack
|
page read and write
|
||
3D8400401000
|
trusted library allocation
|
page read and write
|
||
3D8400340000
|
trusted library allocation
|
page read and write
|
||
17A40039C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84004B4000
|
trusted library allocation
|
page read and write
|
||
3AE3DFE000
|
unkown
|
page readonly
|
||
AEA000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400338000
|
trusted library allocation
|
page read and write
|
||
3D8400BCC000
|
trusted library allocation
|
page read and write
|
||
7F42000
|
heap
|
page read and write
|
||
3D840099C000
|
trusted library allocation
|
page read and write
|
||
18F8000
|
heap
|
page read and write
|
||
20F0AFC0000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
8092000
|
heap
|
page read and write
|
||
44F800270000
|
direct allocation
|
page read and write
|
||
24D400201000
|
trusted library allocation
|
page read and write
|
||
20F0AF73000
|
heap
|
page read and write
|
||
17A400401000
|
trusted library allocation
|
page read and write
|
||
3D84001F4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4002B8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
17A40082C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F129C2000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
80B4000
|
heap
|
page read and write
|
||
20F0AE50000
|
heap
|
page readonly
|
||
3AEEDFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
3D84002F0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
3D8400478000
|
trusted library allocation
|
page read and write
|
||
3D8400214000
|
trusted library allocation
|
page read and write
|
||
7AB6000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
140E000
|
stack
|
page read and write
|
||
3D8401044000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
80A6000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3ACBDFE000
|
unkown
|
page readonly
|
||
3D84012CC000
|
trusted library allocation
|
page read and write
|
||
80A6000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400E9C000
|
trusted library allocation
|
page read and write
|
||
17A40095C000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
17A40020C000
|
trusted library allocation
|
page read and write
|
||
8030000
|
heap
|
page read and write
|
||
3D84007B4000
|
trusted library allocation
|
page read and write
|
||
17A400898000
|
trusted library allocation
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
3D8400C4C000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
3D8400BD8000
|
trusted library allocation
|
page read and write
|
||
20F0E3E3000
|
heap
|
page read and write
|
||
3D8400E1C000
|
trusted library allocation
|
page read and write
|
||
3D84005BC000
|
trusted library allocation
|
page read and write
|
||
3D84007D8000
|
trusted library allocation
|
page read and write
|
||
3AC85FB000
|
stack
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
20F12690000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
3D840060C000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400AB4000
|
trusted library allocation
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
807A000
|
heap
|
page read and write
|
||
20F14D60000
|
trusted library section
|
page read and write
|
||
3D8400F80000
|
trusted library allocation
|
page read and write
|
||
3D84006E0000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840020C000
|
trusted library allocation
|
page read and write
|
||
20F0E3E4000
|
heap
|
page read and write
|
||
20F14D00000
|
trusted library section
|
page read and write
|
||
3D8400E70000
|
trusted library allocation
|
page read and write
|
||
3AE6DFE000
|
unkown
|
page readonly
|
||
3D8400338000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84000B4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84001E4000
|
trusted library allocation
|
page read and write
|
||
3D84005E0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
80B4000
|
heap
|
page read and write
|
||
20F0AF87000
|
heap
|
page read and write
|
||
80A1000
|
heap
|
page read and write
|
||
801D000
|
heap
|
page read and write
|
||
810F000
|
heap
|
page read and write
|
||
3D840040E000
|
trusted library allocation
|
page read and write
|
||
3D8400DB4000
|
trusted library allocation
|
page read and write
|
||
17A4006C8000
|
trusted library allocation
|
page read and write
|
||
3D8400E28000
|
trusted library allocation
|
page read and write
|
||
3D84000EC000
|
trusted library allocation
|
page read and write
|
||
3AEFDFE000
|
unkown
|
page readonly
|
||
1912000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84001F0000
|
trusted library allocation
|
page read and write
|
||
3D84009CC000
|
trusted library allocation
|
page read and write
|
||
3D8401050000
|
trusted library allocation
|
page read and write
|
||
24D4002F0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
24D400250000
|
trusted library allocation
|
page read and write
|
||
3D8400418000
|
trusted library allocation
|
page read and write
|
||
44F8002EC000
|
direct allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
3AEA5FD000
|
stack
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
80CD000
|
heap
|
page read and write
|
||
3D84001B4000
|
trusted library allocation
|
page read and write
|
||
3D8400500000
|
trusted library allocation
|
page read and write
|
||
17A4002F4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4008A8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3AC15EF000
|
stack
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
3D8400EB8000
|
trusted library allocation
|
page read and write
|
||
17A4002F0000
|
trusted library allocation
|
page read and write
|
||
3D8400DC4000
|
trusted library allocation
|
page read and write
|
||
24D4002A0000
|
trusted library allocation
|
page read and write
|
||
3AD4DFE000
|
unkown
|
page readonly
|
||
18A1000
|
heap
|
page read and write
|
||
24D4002B0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400694000
|
trusted library allocation
|
page read and write
|
||
3D840032C000
|
trusted library allocation
|
page read and write
|
||
20F0E3DB000
|
heap
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
3D8400AC0000
|
trusted library allocation
|
page read and write
|
||
17A4007A0000
|
trusted library allocation
|
page read and write
|
||
6C79D000
|
unkown
|
page read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
3D8400318000
|
trusted library allocation
|
page read and write
|
||
8238000
|
heap
|
page read and write
|
||
3D840000C000
|
trusted library allocation
|
page read and write
|
||
17A4007E4000
|
trusted library allocation
|
page read and write
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
19F0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
3D8400074000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
unkown
|
page write copy
|
||
70E1000
|
heap
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
44F800230000
|
direct allocation
|
page read and write
|
||
3D8400338000
|
trusted library allocation
|
page read and write
|
||
3D840112C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
805F000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
17A400700000
|
trusted library allocation
|
page read and write
|
||
3D840120C000
|
trusted library allocation
|
page read and write
|
||
3D8400E01000
|
trusted library allocation
|
page read and write
|
||
3D840016C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84010C0000
|
trusted library allocation
|
page read and write
|
||
17A400404000
|
trusted library allocation
|
page read and write
|
||
20F15100000
|
trusted library section
|
page read and write
|
||
17A400960000
|
trusted library allocation
|
page read and write
|
||
17A400248000
|
trusted library allocation
|
page read and write
|
||
3D84002B4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A40025C000
|
trusted library allocation
|
page read and write
|
||
78F1000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
815A000
|
heap
|
page read and write
|
||
20F14607000
|
unclassified section
|
page read and write
|
||
3D8400D84000
|
trusted library allocation
|
page read and write
|
||
17A400728000
|
trusted library allocation
|
page read and write
|
||
7F4A000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
7F47000
|
heap
|
page read and write
|
||
3D840040C000
|
trusted library allocation
|
page read and write
|
||
3D8400A4C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840075C000
|
trusted library allocation
|
page read and write
|
||
17A4006E8000
|
trusted library allocation
|
page read and write
|
||
3D8400218000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400DE0000
|
trusted library allocation
|
page read and write
|
||
3ACA5FE000
|
stack
|
page read and write
|
||
17A400430000
|
trusted library allocation
|
page read and write
|
||
17A4006F4000
|
trusted library allocation
|
page read and write
|
||
3D840071C000
|
trusted library allocation
|
page read and write
|
||
20F0E9F0000
|
trusted library section
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
3D8400DD8000
|
trusted library allocation
|
page read and write
|
||
3D84001EC000
|
trusted library allocation
|
page read and write
|
||
24D4002F8000
|
trusted library allocation
|
page read and write
|
||
44F800284000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7FDA000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
7F43000
|
heap
|
page read and write
|
||
3D8400494000
|
trusted library allocation
|
page read and write
|
||
3D8400FB8000
|
trusted library allocation
|
page read and write
|
||
82FA000
|
heap
|
page read and write
|
||
44F8002A8000
|
direct allocation
|
page read and write
|
||
20F0E919000
|
heap
|
page read and write
|
||
17A400408000
|
trusted library allocation
|
page read and write
|
||
3D8400D84000
|
trusted library allocation
|
page read and write
|
||
20F144C2000
|
trusted library section
|
page read and write
|
||
3ACC5FC000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
44F800234000
|
direct allocation
|
page read and write
|
||
17A4002EC000
|
trusted library allocation
|
page read and write
|
||
3D8400294000
|
trusted library allocation
|
page read and write
|
||
3D84002A8000
|
trusted library allocation
|
page read and write
|
||
17A4002EE000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F4D000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
6C7E8000
|
unkown
|
page readonly
|
||
3D8400FB8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840080C000
|
trusted library allocation
|
page read and write
|
||
3ADF5FD000
|
stack
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
20F0AF5F000
|
heap
|
page read and write
|
||
3D8400410000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840018C000
|
trusted library allocation
|
page read and write
|
||
3AD95FB000
|
stack
|
page read and write
|
||
3AD35FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400C44000
|
trusted library allocation
|
page read and write
|
||
3D8400B08000
|
trusted library allocation
|
page read and write
|
||
3D8400C98000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
8273000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
3D8400AFC000
|
trusted library allocation
|
page read and write
|
||
3D8400618000
|
trusted library allocation
|
page read and write
|
||
3C70000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
3ADA5FD000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0AF66000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
80BB000
|
heap
|
page read and write
|
||
44F800250000
|
direct allocation
|
page read and write
|
||
3D84008B4000
|
trusted library allocation
|
page read and write
|
||
44F800290000
|
direct allocation
|
page read and write
|
||
3AD75FB000
|
stack
|
page read and write
|
||
3D8400DE0000
|
trusted library allocation
|
page read and write
|
||
20F1510E000
|
trusted library section
|
page read and write
|
||
3D8400D04000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A40060C000
|
trusted library allocation
|
page read and write
|
||
3D84004A4000
|
trusted library allocation
|
page read and write
|
||
3AC5DFE000
|
unkown
|
page readonly
|
||
17A4006E8000
|
trusted library allocation
|
page read and write
|
||
3D8400210000
|
trusted library allocation
|
page read and write
|
||
3D8400294000
|
trusted library allocation
|
page read and write
|
||
17A40084C000
|
trusted library allocation
|
page read and write
|
||
3D8400E64000
|
trusted library allocation
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
3D8400E58000
|
trusted library allocation
|
page read and write
|
||
24D400238000
|
trusted library allocation
|
page read and write
|
||
44F800274000
|
direct allocation
|
page read and write
|
||
803E000
|
heap
|
page read and write
|
||
3D84010F0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
20F0E9E3000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4008C8000
|
trusted library allocation
|
page read and write
|
||
3D8400340000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400318000
|
trusted library allocation
|
page read and write
|
||
7C84000
|
direct allocation
|
page read and write
|
||
3D8400730000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AD1DFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
17A400874000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
3D8400380000
|
trusted library allocation
|
page read and write
|
||
3D8400EAC000
|
trusted library allocation
|
page read and write
|
||
3AD9DFE000
|
unkown
|
page readonly
|
||
44F800294000
|
direct allocation
|
page read and write
|
||
3AEBDFE000
|
unkown
|
page readonly
|
||
3AE9DFE000
|
unkown
|
page readonly
|
||
44F800303000
|
direct allocation
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
81EE000
|
heap
|
page read and write
|
||
20F14E4D000
|
trusted library section
|
page read and write
|
||
3ADADFE000
|
unkown
|
page readonly
|
||
3D84001D0000
|
trusted library allocation
|
page read and write
|
||
790F000
|
heap
|
page read and write
|
||
7F45000
|
heap
|
page read and write
|
||
1916000
|
heap
|
page read and write
|
||
20F0CC33000
|
heap
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D8400994000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400D74000
|
trusted library allocation
|
page read and write
|
||
24D40020C000
|
trusted library allocation
|
page read and write
|
||
3D84003A4000
|
trusted library allocation
|
page read and write
|
||
3D84001AC000
|
trusted library allocation
|
page read and write
|
||
20F0E98D000
|
heap
|
page read and write
|
||
8065000
|
heap
|
page read and write
|
||
3D8400E0C000
|
trusted library allocation
|
page read and write
|
||
17A40079C000
|
trusted library allocation
|
page read and write
|
||
44F8002DC000
|
direct allocation
|
page read and write
|
||
3D840129C000
|
trusted library allocation
|
page read and write
|
||
3D84004D4000
|
trusted library allocation
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
20F0AE90000
|
trusted library allocation
|
page read and write
|
||
3D8400B3C000
|
trusted library allocation
|
page read and write
|
||
3D8400FEC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84002C0000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3ADCDFE000
|
unkown
|
page readonly
|
||
191D000
|
heap
|
page read and write
|
||
20F0E3EB000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F4E000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page write copy
|
||
17A400788000
|
trusted library allocation
|
page read and write
|
||
3D8400370000
|
trusted library allocation
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
3ACB5FB000
|
stack
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
17A400238000
|
trusted library allocation
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
3D8401114000
|
trusted library allocation
|
page read and write
|
||
20F12FA0000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3D8400F8C000
|
trusted library allocation
|
page read and write
|
||
44F800215000
|
direct allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
24D4002A0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E913000
|
heap
|
page read and write
|
||
18FF000
|
heap
|
page read and write
|
||
3AE65FE000
|
stack
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
17A4006F4000
|
trusted library allocation
|
page read and write
|
||
1919000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AEDDFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
3D8401104000
|
trusted library allocation
|
page read and write
|
||
3D84002B4000
|
trusted library allocation
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3D8400CAD000
|
trusted library allocation
|
page read and write
|
||
3AD3DFE000
|
unkown
|
page readonly
|
||
1902000
|
heap
|
page read and write
|
||
3D8400380000
|
trusted library allocation
|
page read and write
|
||
20F12EE7000
|
unclassified section
|
page read and write
|
||
7F42000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F4F000
|
heap
|
page read and write
|
||
3D84002F0000
|
trusted library allocation
|
page read and write
|
||
44F8002D0000
|
direct allocation
|
page read and write
|
||
24D400230000
|
trusted library allocation
|
page read and write
|
||
3ADFDFE000
|
unkown
|
page readonly
|
||
1906000
|
heap
|
page read and write
|
||
3D8400FC8000
|
trusted library allocation
|
page read and write
|
||
3D8400F14000
|
trusted library allocation
|
page read and write
|
||
3D8400118000
|
trusted library allocation
|
page read and write
|
||
3D84002A4000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
17A400418000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400F2C000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
direct allocation
|
page read and write
|
||
20F0E8F0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E9CC000
|
heap
|
page read and write
|
||
3D8401201000
|
trusted library allocation
|
page read and write
|
||
20F0E3C0000
|
heap
|
page read and write
|
||
3D8400CB4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
36A000
|
stack
|
page read and write
|
||
20F0E939000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
17A400948000
|
trusted library allocation
|
page read and write
|
||
3D8400E38000
|
trusted library allocation
|
page read and write
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
3D840113C000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
195F000
|
stack
|
page read and write
|
||
3D84002FB000
|
trusted library allocation
|
page read and write
|
||
3D8400C98000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
44F800220000
|
direct allocation
|
page read and write
|
||
3D8400F64000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4002B0000
|
trusted library allocation
|
page read and write
|
||
3AD15FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400338000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
unkown
|
page write copy
|
||
70E1000
|
heap
|
page read and write
|
||
3D840027C000
|
trusted library allocation
|
page read and write
|
||
3AF15FB000
|
stack
|
page read and write
|
||
3D840032C000
|
trusted library allocation
|
page read and write
|
||
3AD0DFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
8253000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
819A000
|
heap
|
page read and write
|
||
17A4007BC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
192C000
|
heap
|
page read and write
|
||
17A4007D4000
|
trusted library allocation
|
page read and write
|
||
17A4006BC000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
FC0000
|
heap
|
page read and write
|
||
12EA000
|
unkown
|
page write copy
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
8014000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3ADB5FE000
|
stack
|
page read and write
|
||
3D840051B000
|
trusted library allocation
|
page read and write
|
||
17A400920000
|
trusted library allocation
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
78F1000
|
heap
|
page read and write
|
||
20F12FD3000
|
heap
|
page read and write
|
||
24D400270000
|
trusted library allocation
|
page read and write
|
||
20F14D1E000
|
trusted library section
|
page read and write
|
||
17A400778000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E8A0000
|
trusted library section
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AEE5FE000
|
stack
|
page read and write
|
||
17A400848000
|
trusted library allocation
|
page read and write
|
||
3D8400BC0000
|
trusted library allocation
|
page read and write
|
||
3D8400768000
|
trusted library allocation
|
page read and write
|
||
3AC35FE000
|
stack
|
page read and write
|
||
7AEA000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E935000
|
heap
|
page read and write
|
||
3D840101C000
|
trusted library allocation
|
page read and write
|
||
8065000
|
heap
|
page read and write
|
||
17A400864000
|
trusted library allocation
|
page read and write
|
||
3AD55FE000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
AC0000
|
heap
|
page read and write
|
||
24D4002A0000
|
trusted library allocation
|
page read and write
|
||
3D84006FD000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
AB0000
|
heap
|
page read and write
|
||
17A40087C000
|
trusted library allocation
|
page read and write
|
||
190E000
|
heap
|
page read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
7F4A000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
790000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
160A000
|
heap
|
page read and write
|
||
3D840084C000
|
trusted library allocation
|
page read and write
|
||
24D4002B0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4006F0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3C70000
|
direct allocation
|
page read and write
|
||
3D8400F64000
|
trusted library allocation
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
3D8400B18000
|
trusted library allocation
|
page read and write
|
||
3D84001E0000
|
trusted library allocation
|
page read and write
|
||
80CB000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400F3C000
|
trusted library allocation
|
page read and write
|
||
3D8400CCC000
|
trusted library allocation
|
page read and write
|
||
3AD05FE000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
AEE000
|
unkown
|
page read and write
|
||
3D84002A8000
|
trusted library allocation
|
page read and write
|
||
3AE45FD000
|
stack
|
page read and write
|
||
20F0E3E3000
|
heap
|
page read and write
|
||
3ADE5FC000
|
stack
|
page read and write
|
||
3ADD5FC000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F42000
|
heap
|
page read and write
|
||
20F0AFB0000
|
heap
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
3D8400A54000
|
trusted library allocation
|
page read and write
|
||
3D84001E8000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D84012C4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
3D8401001000
|
trusted library allocation
|
page read and write
|
||
3D84012A8000
|
trusted library allocation
|
page read and write
|
||
3AE55FD000
|
stack
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
20F0CBF0000
|
trusted library section
|
page readonly
|
||
44F80020C000
|
direct allocation
|
page read and write
|
||
7C86000
|
direct allocation
|
page read and write
|
||
17A4008C4000
|
trusted library allocation
|
page read and write
|
||
17A40085C000
|
trusted library allocation
|
page read and write
|
||
3D84008D0000
|
trusted library allocation
|
page read and write
|
||
3D840017C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
801F000
|
heap
|
page read and write
|
||
3D840085C000
|
trusted library allocation
|
page read and write
|
||
3ACF5FE000
|
stack
|
page read and write
|
||
3D84008DC000
|
trusted library allocation
|
page read and write
|
||
7F43000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
3D8400CBC000
|
trusted library allocation
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E3D9000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
17A4007AC000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3D84001B4000
|
trusted library allocation
|
page read and write
|
||
3D84006A8000
|
trusted library allocation
|
page read and write
|
||
20F0E97B000
|
heap
|
page read and write
|
||
3AE05FB000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
81DC000
|
heap
|
page read and write
|
||
20F0AE60000
|
heap
|
page read and write
|
||
3D840060C000
|
trusted library allocation
|
page read and write
|
||
20F144CE000
|
trusted library section
|
page read and write
|
||
AEE000
|
unkown
|
page write copy
|
||
3AD6DFE000
|
unkown
|
page readonly
|
||
3D84001D8000
|
trusted library allocation
|
page read and write
|
||
3D8400CE0000
|
trusted library allocation
|
page read and write
|
||
24D4002B0000
|
trusted library allocation
|
page read and write
|
||
3D8400014000
|
trusted library allocation
|
page read and write
|
||
3AE95FD000
|
stack
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
F5C000
|
stack
|
page read and write
|
||
20F0E3E6000
|
heap
|
page read and write
|
||
6C7EC000
|
unkown
|
page readonly
|
||
3AD7DFE000
|
unkown
|
page readonly
|
||
3D8400B20000
|
trusted library allocation
|
page read and write
|
||
3D8400E48000
|
trusted library allocation
|
page read and write
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
3D8400300000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840093C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
18F9000
|
heap
|
page read and write
|
||
20F0EC60000
|
trusted library section
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400BE4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84001AC000
|
trusted library allocation
|
page read and write
|
||
3D840060C000
|
trusted library allocation
|
page read and write
|
||
3D84007A3000
|
trusted library allocation
|
page read and write
|
||
3ACEDFE000
|
unkown
|
page readonly
|
||
18F8000
|
heap
|
page read and write
|
||
3D8400A84000
|
trusted library allocation
|
page read and write
|
||
6C79F000
|
unkown
|
page readonly
|
||
20F0AEA8000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
20F142C5000
|
heap
|
page read and write
|
||
7F45000
|
heap
|
page read and write
|
||
3D8400794000
|
trusted library allocation
|
page read and write
|
||
808D000
|
heap
|
page read and write
|
||
17A400288000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
20F0E3D9000
|
heap
|
page read and write
|
||
3D8400488000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
3AE15FB000
|
stack
|
page read and write
|
||
3D8400AD0000
|
trusted library allocation
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
3D8400F64000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400D68000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
1929000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
3D8400394000
|
trusted library allocation
|
page read and write
|
||
3AEB5FB000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
7F41000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4008B8000
|
trusted library allocation
|
page read and write
|
||
17A400880000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400E9C000
|
trusted library allocation
|
page read and write
|
||
3D8400EF0000
|
trusted library allocation
|
page read and write
|
||
3D840021C000
|
trusted library allocation
|
page read and write
|
||
24D4002C0000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
44F80024C000
|
direct allocation
|
page read and write
|
||
3D8400CAC000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
3D8400727000
|
trusted library allocation
|
page read and write
|
||
3D8400F20000
|
trusted library allocation
|
page read and write
|
||
3D8400224000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400CF8000
|
trusted library allocation
|
page read and write
|
||
7F41000
|
heap
|
page read and write
|
||
20F0E9D6000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4007C4000
|
trusted library allocation
|
page read and write
|
||
17A400860000
|
trusted library allocation
|
page read and write
|
||
6C7E9000
|
unkown
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
24D4002A0000
|
trusted library allocation
|
page read and write
|
||
3D84009EC000
|
trusted library allocation
|
page read and write
|
||
17A4006C8000
|
trusted library allocation
|
page read and write
|
||
3D8400300000
|
trusted library allocation
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
80D4000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14503000
|
trusted library section
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
17A4008D8000
|
trusted library allocation
|
page read and write
|
||
3D8400D90000
|
trusted library allocation
|
page read and write
|
||
3D8400058000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400664000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400380000
|
trusted library allocation
|
page read and write
|
||
7F48000
|
heap
|
page read and write
|
||
32D000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
3D84003A4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
18E1000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14EE0000
|
trusted library section
|
page read and write
|
||
3AF0DFE000
|
unkown
|
page readonly
|
||
44F8002AC000
|
direct allocation
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
3D8400E90000
|
trusted library allocation
|
page read and write
|
||
20F0E998000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
44F800201000
|
direct allocation
|
page read and write
|
||
17A400818000
|
trusted library allocation
|
page read and write
|
||
3D8400BD8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AD45FE000
|
stack
|
page read and write
|
||
17A4008B4000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
17A4006AC000
|
trusted library allocation
|
page read and write
|
||
20F14D50000
|
trusted library section
|
page read and write
|
||
3D8400300000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
3D8400A3C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400EC4000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
17A400250000
|
trusted library allocation
|
page read and write
|
||
3AE2DFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
3D84004BC000
|
trusted library allocation
|
page read and write
|
||
3D8400298000
|
trusted library allocation
|
page read and write
|
||
3AEADFE000
|
unkown
|
page readonly
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
3AC4DFE000
|
unkown
|
page readonly
|
||
19E0000
|
direct allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
3D84009B4000
|
trusted library allocation
|
page read and write
|
||
3D8400128000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F4F000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
17A40080C000
|
trusted library allocation
|
page read and write
|
||
17A40091C000
|
trusted library allocation
|
page read and write
|
||
3AC75FD000
|
stack
|
page read and write
|
||
3D84009B9000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
3D8400324000
|
trusted library allocation
|
page read and write
|
||
3D8400368000
|
trusted library allocation
|
page read and write
|
||
3D8400340000
|
trusted library allocation
|
page read and write
|
||
20F0AFB5000
|
heap
|
page read and write
|
||
7F4E000
|
heap
|
page read and write
|
||
3D84006E4000
|
trusted library allocation
|
page read and write
|
||
811F000
|
heap
|
page read and write
|
||
20F14D12000
|
trusted library section
|
page read and write
|
||
3D8400300000
|
trusted library allocation
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
18EF000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
160E000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400080000
|
trusted library allocation
|
page read and write
|
||
20F0E3F1000
|
heap
|
page read and write
|
||
3ADEDFE000
|
unkown
|
page readonly
|
||
20F14D83000
|
trusted library section
|
page read and write
|
||
7F44000
|
heap
|
page read and write
|
||
3ACCDFE000
|
unkown
|
page readonly
|
||
17A4002CC000
|
trusted library allocation
|
page read and write
|
||
3ACFDFE000
|
unkown
|
page readonly
|
||
20F0AF39000
|
heap
|
page read and write
|
||
17A400890000
|
trusted library allocation
|
page read and write
|
||
3ACE5FA000
|
stack
|
page read and write
|
||
6C6C0000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
17A40078C000
|
trusted library allocation
|
page read and write
|
||
3AC95FA000
|
stack
|
page read and write
|
||
6C6C1000
|
unkown
|
page execute read
|
||
3D8400230000
|
trusted library allocation
|
page read and write
|
||
20F148A0000
|
trusted library section
|
page read and write
|
||
80F7000
|
heap
|
page read and write
|
||
17A4006AC000
|
trusted library allocation
|
page read and write
|
||
3D8400C18000
|
trusted library allocation
|
page read and write
|
||
20F142A0000
|
heap
|
page read and write
|
||
7FF3000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
3AE85FD000
|
stack
|
page read and write
|
||
3D84004B0000
|
trusted library allocation
|
page read and write
|
||
3D840030C000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
17A400918000
|
trusted library allocation
|
page read and write
|
||
7F43000
|
heap
|
page read and write
|
||
3D8400ED4000
|
trusted library allocation
|
page read and write
|
||
3AF05FE000
|
stack
|
page read and write
|
||
3D8400B94000
|
trusted library allocation
|
page read and write
|
||
20F14646000
|
trusted library section
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400E70000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400F38000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7FFB000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
7F4E000
|
heap
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
3D8400601000
|
trusted library allocation
|
page read and write
|
||
3D8400F00000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
44F8002E4000
|
direct allocation
|
page read and write
|
||
20F14CB7000
|
unclassified section
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
3D8400D64000
|
trusted library allocation
|
page read and write
|
||
20F14E42000
|
trusted library section
|
page read and write
|
||
3D8400F3C000
|
trusted library allocation
|
page read and write
|
||
3D8400C0C000
|
trusted library allocation
|
page read and write
|
||
24D400235000
|
trusted library allocation
|
page read and write
|
||
3D8400C98000
|
trusted library allocation
|
page read and write
|
||
3D84001B4000
|
trusted library allocation
|
page read and write
|
||
3D8400E9C000
|
trusted library allocation
|
page read and write
|
||
24D400260000
|
trusted library allocation
|
page read and write
|
||
17A400424000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840100C000
|
trusted library allocation
|
page read and write
|
||
20F1458D000
|
trusted library section
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
3AEC5FD000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
3AE5DFE000
|
unkown
|
page readonly
|
||
3D8400958000
|
trusted library allocation
|
page read and write
|
||
3D8400228000
|
trusted library allocation
|
page read and write
|
||
3D84001DC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AE35FD000
|
stack
|
page read and write
|
||
44F800280000
|
direct allocation
|
page read and write
|
||
20F0E3E3000
|
heap
|
page read and write
|
||
77A0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
24D400278000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
24D400264000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14582000
|
trusted library section
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
24D4002C0000
|
trusted library allocation
|
page read and write
|
||
17A4008E8000
|
trusted library allocation
|
page read and write
|
||
3ACDDFE000
|
unkown
|
page readonly
|
||
3D8400D9C000
|
trusted library allocation
|
page read and write
|
||
3AD2DFE000
|
unkown
|
page readonly
|
||
3D8400778000
|
trusted library allocation
|
page read and write
|
||
3D8400524000
|
trusted library allocation
|
page read and write
|
||
3D8401138000
|
trusted library allocation
|
page read and write
|
||
3D8400F14000
|
trusted library allocation
|
page read and write
|
||
3D8400098000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
unkown
|
page write copy
|
||
3D84001C4000
|
trusted library allocation
|
page read and write
|
||
17A4002D4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3ADC5FC000
|
stack
|
page read and write
|
||
3D8400519000
|
trusted library allocation
|
page read and write
|
||
3AE75FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
24D4002F4000
|
trusted library allocation
|
page read and write
|
||
3AC65FE000
|
stack
|
page read and write
|
||
24D4002C0000
|
trusted library allocation
|
page read and write
|
||
1906000
|
heap
|
page read and write
|
||
17A4002FC000
|
trusted library allocation
|
page read and write
|
||
3D8400C44000
|
trusted library allocation
|
page read and write
|
||
3D840060C000
|
trusted library allocation
|
page read and write
|
||
17A40027C000
|
trusted library allocation
|
page read and write
|
||
17A4008EC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
CFC000
|
stack
|
page read and write
|
||
3D8400338000
|
trusted library allocation
|
page read and write
|
||
20F0AEA0000
|
heap
|
page read and write
|
||
7D41000
|
heap
|
page read and write
|
||
3D8400DA8000
|
trusted library allocation
|
page read and write
|
||
3D8400E80000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
3D84000FC000
|
trusted library allocation
|
page read and write
|
||
44F800210000
|
direct allocation
|
page read and write
|
||
20F12EB7000
|
unclassified section
|
page read and write
|
||
3D8400CE8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7963000
|
heap
|
page read and write
|
||
3AC9DFE000
|
unkown
|
page readonly
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D8400C28000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400468000
|
trusted library allocation
|
page read and write
|
||
3D84003A4000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
AEA000
|
unkown
|
page readonly
|
||
3D8400F78000
|
trusted library allocation
|
page read and write
|
||
167B000
|
unkown
|
page execute and write copy
|
||
3D8400358000
|
trusted library allocation
|
page read and write
|
||
3AE8DFE000
|
unkown
|
page readonly
|
||
7FD5000
|
heap
|
page read and write
|
||
3AD65FD000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
17A4006D4000
|
trusted library allocation
|
page read and write
|
||
17A40081C000
|
trusted library allocation
|
page read and write
|
||
17A400790000
|
trusted library allocation
|
page read and write
|
||
8005000
|
heap
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
44F800217000
|
direct allocation
|
page read and write
|
||
17A400801000
|
trusted library allocation
|
page read and write
|
||
3AC45FE000
|
stack
|
page read and write
|
||
7F47000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E3F1000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
20F0E99D000
|
heap
|
page read and write
|
||
3D8400708000
|
trusted library allocation
|
page read and write
|
||
20F0E3B0000
|
heap
|
page read and write
|
||
3AC6DFE000
|
unkown
|
page readonly
|
||
3D8400C74000
|
trusted library allocation
|
page read and write
|
||
3D840022C000
|
trusted library allocation
|
page read and write
|
||
3D8401110000
|
trusted library allocation
|
page read and write
|
||
7F45000
|
heap
|
page read and write
|
||
3AD25FD000
|
stack
|
page read and write
|
||
20F12FD0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
17A40071C000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
77B0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400C84000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400E90000
|
trusted library allocation
|
page read and write
|
||
3D8400C5C000
|
trusted library allocation
|
page read and write
|
||
810C000
|
heap
|
page read and write
|
||
17A400894000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
20F0E985000
|
heap
|
page read and write
|
||
3ACD5FD000
|
stack
|
page read and write
|
||
3D840034C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14CF1000
|
trusted library section
|
page read and write
|
||
20F14EEE000
|
trusted library section
|
page read and write
|
||
3D8400C01000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
18F2000
|
heap
|
page read and write
|
||
1912000
|
heap
|
page read and write
|
||
20F142D9000
|
heap
|
page read and write
|
||
804C000
|
heap
|
page read and write
|
||
3D8400584000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
24D400288000
|
trusted library allocation
|
page read and write
|
||
17A400884000
|
trusted library allocation
|
page read and write
|
||
3D84001AC000
|
trusted library allocation
|
page read and write
|
||
3D84009F4000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
heap
|
page read and write
|
||
3D840030C000
|
trusted library allocation
|
page read and write
|
||
3D840108C000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8401060000
|
trusted library allocation
|
page read and write
|
||
3D8400B44000
|
trusted library allocation
|
page read and write
|
||
3D84001A0000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
17A400868000
|
trusted library allocation
|
page read and write
|
||
3D8400092000
|
trusted library allocation
|
page read and write
|
||
20F0E9B0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F145C0000
|
trusted library section
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AE25FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A4007E0000
|
trusted library allocation
|
page read and write
|
||
3AC7DFE000
|
unkown
|
page readonly
|
||
17A400904000
|
trusted library allocation
|
page read and write
|
||
20F0CC30000
|
heap
|
page read and write
|
||
3D84012B4000
|
trusted library allocation
|
page read and write
|
||
17A400974000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and write copy
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400194000
|
trusted library allocation
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F142A2000
|
heap
|
page read and write
|
||
7CC000
|
stack
|
page read and write
|
||
8113000
|
heap
|
page read and write
|
||
81FA000
|
heap
|
page read and write
|
||
3AEF5FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400EF0000
|
trusted library allocation
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F4B000
|
heap
|
page read and write
|
||
20F0EBD0000
|
trusted library section
|
page read and write
|
||
17A4008F4000
|
trusted library allocation
|
page read and write
|
||
20F0E9D2000
|
heap
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
44F800260000
|
direct allocation
|
page read and write
|
||
3D8400A94000
|
trusted library allocation
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
808B000
|
heap
|
page read and write
|
||
17A4007C0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
44F80023C000
|
direct allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400864000
|
trusted library allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
3D84001D4000
|
trusted library allocation
|
page read and write
|
||
3D84002BC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F41000
|
heap
|
page read and write
|
||
3D8400DEC000
|
trusted library allocation
|
page read and write
|
||
3D84010D0000
|
trusted library allocation
|
page read and write
|
||
20F14D71000
|
trusted library section
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
20F0D680000
|
unkown
|
page read and write
|
||
3D84012C0000
|
trusted library allocation
|
page read and write
|
||
3D8400A0C000
|
trusted library allocation
|
page read and write
|
||
3D8400CEC000
|
trusted library allocation
|
page read and write
|
||
7F44000
|
heap
|
page read and write
|
||
7F47000
|
heap
|
page read and write
|
||
3D8400E90000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AE0DFE000
|
unkown
|
page readonly
|
||
80F5000
|
heap
|
page read and write
|
||
3D8400830000
|
trusted library allocation
|
page read and write
|
||
3D840129C000
|
trusted library allocation
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
7F4D000
|
heap
|
page read and write
|
||
20F0E91E000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400E90000
|
trusted library allocation
|
page read and write
|
||
3D8400C47000
|
trusted library allocation
|
page read and write
|
||
3D84000DC000
|
trusted library allocation
|
page read and write
|
||
3D8400B34000
|
trusted library allocation
|
page read and write
|
||
24D400294000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
20F0E3DE000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400FD4000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A400601000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
3D8400D58000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AED5FC000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
3D8400634000
|
trusted library allocation
|
page read and write
|
||
80D3000
|
heap
|
page read and write
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
20F0AF3D000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
3D840020C000
|
trusted library allocation
|
page read and write
|
||
3D8400134000
|
trusted library allocation
|
page read and write
|
||
8046000
|
heap
|
page read and write
|
||
24D4002BC000
|
trusted library allocation
|
page read and write
|
||
3D8400D2C000
|
trusted library allocation
|
page read and write
|
||
80AE000
|
heap
|
page read and write
|
||
3AE1DFE000
|
unkown
|
page readonly
|
||
A8E000
|
stack
|
page read and write
|
||
3D8400644000
|
trusted library allocation
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840088C000
|
trusted library allocation
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
3D8400BB4000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
3D8401148000
|
trusted library allocation
|
page read and write
|
||
3D8400991000
|
trusted library allocation
|
page read and write
|
||
3D8400E90000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
3D84002F3000
|
trusted library allocation
|
page read and write
|
||
24D4002C0000
|
trusted library allocation
|
page read and write
|
||
3D8400574000
|
trusted library allocation
|
page read and write
|
||
3D84001AC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400C7C000
|
trusted library allocation
|
page read and write
|
||
3D8400874000
|
trusted library allocation
|
page read and write
|
||
3D8400908000
|
trusted library allocation
|
page read and write
|
||
3AD5DFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E9CF000
|
heap
|
page read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
3D84004F4000
|
trusted library allocation
|
page read and write
|
||
7F41000
|
heap
|
page read and write
|
||
17A400230000
|
trusted library allocation
|
page read and write
|
||
3D8401050000
|
trusted library allocation
|
page read and write
|
||
17A4006AC000
|
trusted library allocation
|
page read and write
|
||
8066000
|
heap
|
page read and write
|
||
3D84003EC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400DCC000
|
trusted library allocation
|
page read and write
|
||
3D84001C8000
|
trusted library allocation
|
page read and write
|
||
17A40070C000
|
trusted library allocation
|
page read and write
|
||
3D8400220000
|
trusted library allocation
|
page read and write
|
||
17A40039C000
|
trusted library allocation
|
page read and write
|
||
24D400220000
|
trusted library allocation
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
3AE7DFE000
|
unkown
|
page readonly
|
||
17A400201000
|
trusted library allocation
|
page read and write
|
||
20F0E3E4000
|
heap
|
page read and write
|
||
3D8400973000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A400844000
|
trusted library allocation
|
page read and write
|
||
82BB000
|
heap
|
page read and write
|
||
3D840074C000
|
trusted library allocation
|
page read and write
|
||
24D4002C0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AE4DFE000
|
unkown
|
page readonly
|
||
82DA000
|
heap
|
page read and write
|
||
3D840102C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84006F0000
|
trusted library allocation
|
page read and write
|
||
3D8400D84000
|
trusted library allocation
|
page read and write
|
||
3D8400D84000
|
trusted library allocation
|
page read and write
|
||
3D8400044000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D840008E000
|
trusted library allocation
|
page read and write
|
||
3D8400F94000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
7F43000
|
heap
|
page read and write
|
||
3D8400B74000
|
trusted library allocation
|
page read and write
|
||
20F0AFA0000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
3D8400D80000
|
trusted library allocation
|
page read and write
|
||
3D840091C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A400858000
|
trusted library allocation
|
page read and write
|
||
3D8400BE4000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
17A40040C000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
8701000
|
heap
|
page read and write
|
||
3D8400AA0000
|
trusted library allocation
|
page read and write
|
||
24D4002E4000
|
trusted library allocation
|
page read and write
|
||
3D8400A01000
|
trusted library allocation
|
page read and write
|
||
17A400248000
|
trusted library allocation
|
page read and write
|
||
80FA000
|
heap
|
page read and write
|
||
77C0000
|
direct allocation
|
page execute and read and write
|
||
3D8400E9C000
|
trusted library allocation
|
page read and write
|
||
3D840014C000
|
trusted library allocation
|
page read and write
|
||
817C000
|
heap
|
page read and write
|
||
3D8400290000
|
trusted library allocation
|
page read and write
|
||
3D8401070000
|
trusted library allocation
|
page read and write
|
||
17A400964000
|
trusted library allocation
|
page read and write
|
||
3ADBDFE000
|
unkown
|
page readonly
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
17A4008F0000
|
trusted library allocation
|
page read and write
|
||
17A4002E4000
|
trusted library allocation
|
page read and write
|
||
17A400878000
|
trusted library allocation
|
page read and write
|
||
3D8400628000
|
trusted library allocation
|
page read and write
|
||
3AD8DFE000
|
unkown
|
page readonly
|
||
12F0000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14E26000
|
trusted library section
|
page read and write
|
||
3ACADFE000
|
unkown
|
page readonly
|
||
20F14CE0000
|
trusted library section
|
page read and write
|
||
7FF1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E3EB000
|
heap
|
page read and write
|
||
3ADDDFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400FEC000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F14AA0000
|
trusted library section
|
page read and write
|
||
AEA000
|
unkown
|
page readonly
|
||
3D8400B90000
|
trusted library allocation
|
page read and write
|
||
3D8400D4C000
|
trusted library allocation
|
page read and write
|
||
24D400248000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
7FDC000
|
heap
|
page read and write
|
||
20F14E80000
|
trusted library section
|
page read and write
|
||
20F14AAC000
|
trusted library section
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3D8400001000
|
trusted library allocation
|
page read and write
|
||
3AC2DFE000
|
unkown
|
page readonly
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page readonly
|
||
17A4008E4000
|
trusted library allocation
|
page read and write
|
||
3D8400201000
|
trusted library allocation
|
page read and write
|
||
3D84006D0000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3D84008A0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
20F14EC7000
|
unclassified section
|
page read and write
|
||
3D84010C8000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
20F0E620000
|
heap
|
page read and write
|
||
20F0AD70000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D8400D14000
|
trusted library allocation
|
page read and write
|
||
3AD85FD000
|
stack
|
page read and write
|
||
24D400274000
|
trusted library allocation
|
page read and write
|
||
20F142CD000
|
heap
|
page read and write
|
||
7F4D000
|
heap
|
page read and write
|
||
3D840060C000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3D84008E8000
|
trusted library allocation
|
page read and write
|
||
17A400830000
|
trusted library allocation
|
page read and write
|
||
8202000
|
heap
|
page read and write
|
||
3D8400F94000
|
trusted library allocation
|
page read and write
|
||
17A400840000
|
trusted library allocation
|
page read and write
|
||
3D8400EE4000
|
trusted library allocation
|
page read and write
|
||
3D8400B94000
|
trusted library allocation
|
page read and write
|
||
3D84002B4000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
24D4002D8000
|
trusted library allocation
|
page read and write
|
||
3D84005A8000
|
trusted library allocation
|
page read and write
|
||
3D8400B90000
|
trusted library allocation
|
page read and write
|
||
3D8400598000
|
trusted library allocation
|
page read and write
|
||
3D84001F8000
|
trusted library allocation
|
page read and write
|
||
3D8401040000
|
trusted library allocation
|
page read and write
|
||
3AC55FE000
|
stack
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AF1DFE000
|
unkown
|
page readonly
|
||
24D4002C8000
|
trusted library allocation
|
page read and write
|
||
20F142D7000
|
heap
|
page read and write
|
||
7560000
|
direct allocation
|
page read and write
|
||
3D84006C0000
|
trusted library allocation
|
page read and write
|
||
8085000
|
heap
|
page read and write
|
||
3D8400EC8000
|
trusted library allocation
|
page read and write
|
||
17A400220000
|
trusted library allocation
|
page read and write
|
||
17A4006E0000
|
trusted library allocation
|
page read and write
|
||
3D8400801000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AC8DFE000
|
unkown
|
page readonly
|
||
3D8400C34000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
17A400828000
|
trusted library allocation
|
page read and write
|
||
17A400210000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3AC25FE000
|
unkown
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D84002E0000
|
trusted library allocation
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
3D840015C000
|
trusted library allocation
|
page read and write
|
||
3AECDFE000
|
unkown
|
page readonly
|
||
3D840097C000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
70E1000
|
heap
|
page read and write
|
||
80F4000
|
heap
|
page read and write
|
There are 1267 hidden memdumps, click here to show them.