Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FMuiLqyqaT.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_FMuiLqyqaT.exe_6a68c99f3f63f12ca75217f6c8d7e69c3e2bcd4_e4ca092a_611862fc-d487-48f4-83a4-46f0337baeaa\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FDD.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:40 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER432A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43D7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\FMuiLqyqaT.exe
|
"C:\Users\user\Desktop\FMuiLqyqaT.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2240,i,15170287205610031603,8856601979237756071,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 1208
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/CharEl3
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
http://anglebug.com/6755E
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://www.youtube.coP
|
unknown
|
||
https://docs.google.com/spreadsheets/(
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en3
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://anglebug.com/4551)
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
https://anglebug.com/7899supportsSwapchainMaintenance1
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://drive-daily-5.corp.go
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.68
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
ProgramId
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
FileId
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
LowerCaseLongPath
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
LongPathHash
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Name
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
OriginalFileName
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Publisher
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Version
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
BinFileVersion
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
BinaryType
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
ProductName
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
ProductVersion
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
LinkDate
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
BinProductVersion
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
AppxPackageFullName
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Size
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Language
|
||
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
7837000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30032E8000
|
trusted library allocation
|
page read and write
|
||
1A3002FD8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30023D8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
780C000
|
heap
|
page read and write
|
||
1EF09592000
|
trusted library section
|
page read and write
|
||
1A30025BC000
|
trusted library allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1A3002510000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
25CE000
|
unkown
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30028D0000
|
trusted library allocation
|
page read and write
|
||
790C000
|
heap
|
page read and write
|
||
1A30034A0000
|
trusted library allocation
|
page read and write
|
||
1EF030A2000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30029B0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
6D1F3FE000
|
stack
|
page read and write
|
||
1A3003020000
|
trusted library allocation
|
page read and write
|
||
198400260000
|
trusted library allocation
|
page read and write
|
||
79EB000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
BFC000
|
stack
|
page read and write
|
||
1A3002EB0000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
6D1D3EF000
|
stack
|
page read and write
|
||
1A3003218000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A3003020000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
611000868000
|
trusted library allocation
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
1A3002992000
|
trusted library allocation
|
page read and write
|
||
1A3002418000
|
trusted library allocation
|
page read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
1A3002618000
|
trusted library allocation
|
page read and write
|
||
6110006BC000
|
trusted library allocation
|
page read and write
|
||
1A300222C000
|
trusted library allocation
|
page read and write
|
||
611000880000
|
trusted library allocation
|
page read and write
|
||
1A3002CCC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1A300256C000
|
trusted library allocation
|
page read and write
|
||
1A3002C7C000
|
trusted library allocation
|
page read and write
|
||
6110007A0000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1984002F0000
|
trusted library allocation
|
page read and write
|
||
1A3002E40000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
1A3002D74000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A30026A0000
|
trusted library allocation
|
page read and write
|
||
792F000
|
heap
|
page read and write
|
||
611000220000
|
trusted library allocation
|
page read and write
|
||
1984002C8000
|
trusted library allocation
|
page read and write
|
||
1984002A0000
|
trusted library allocation
|
page read and write
|
||
1A30030A0000
|
trusted library allocation
|
page read and write
|
||
1EF7285E000
|
heap
|
page read and write
|
||
1A3003128000
|
trusted library allocation
|
page read and write
|
||
1A30022EC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
7856000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000948000
|
trusted library allocation
|
page read and write
|
||
1A3003380000
|
trusted library allocation
|
page read and write
|
||
1A3002DF8000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF09400000
|
heap
|
page read and write
|
||
1A3003118000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
direct allocation
|
page execute and read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
1A3002E90000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
6A5C00260000
|
direct allocation
|
page read and write
|
||
6C7DC000
|
unkown
|
page readonly
|
||
C7E000
|
stack
|
page read and write
|
||
6D23BFE000
|
unkown
|
page readonly
|
||
25D0000
|
heap
|
page read and write
|
||
1984002A0000
|
trusted library allocation
|
page read and write
|
||
1A30031D4000
|
trusted library allocation
|
page read and write
|
||
76DB000
|
heap
|
page read and write
|
||
611000920000
|
trusted library allocation
|
page read and write
|
||
1A3003201000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30023B4000
|
trusted library allocation
|
page read and write
|
||
7888000
|
heap
|
page read and write
|
||
1EF09F81000
|
trusted library section
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
198400238000
|
trusted library allocation
|
page read and write
|
||
1EF03080000
|
heap
|
page read and write
|
||
1EF03686000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1A3003240000
|
trusted library allocation
|
page read and write
|
||
6FC3000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6D3A3FB000
|
stack
|
page read and write
|
||
1A3002554000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
6721000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
1EF0A167000
|
unclassified section
|
page read and write
|
||
1A3002C98000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D2ABFE000
|
unkown
|
page readonly
|
||
D70000
|
unkown
|
page readonly
|
||
1A300349C000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1A30030E0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002201000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
6A5C002AC000
|
direct allocation
|
page read and write
|
||
1A3002EF8000
|
trusted library allocation
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
76D6000
|
heap
|
page read and write
|
||
1A30028E5000
|
trusted library allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
1A3003198000
|
trusted library allocation
|
page read and write
|
||
6110007E4000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1EF098B0000
|
trusted library section
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6D243FA000
|
stack
|
page read and write
|
||
1EF030A3000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000250000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1A3002A50000
|
trusted library allocation
|
page read and write
|
||
1EF07387000
|
unclassified section
|
page read and write
|
||
787F000
|
heap
|
page read and write
|
||
1A30030D4000
|
trusted library allocation
|
page read and write
|
||
1EF030A2000
|
heap
|
page read and write
|
||
1A3002244000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002B74000
|
trusted library allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
6D463FE000
|
unkown
|
page readonly
|
||
13EF000
|
stack
|
page read and write
|
||
785B000
|
heap
|
page read and write
|
||
76DC000
|
heap
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
76DB000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D2DBFE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003348000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
778C000
|
heap
|
page read and write
|
||
1A30024B4000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A300260F000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
6D343FC000
|
stack
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6D3E3FE000
|
stack
|
page read and write
|
||
1A3002E0C000
|
trusted library allocation
|
page read and write
|
||
611000424000
|
trusted library allocation
|
page read and write
|
||
6D20BFE000
|
unkown
|
page readonly
|
||
1A30030FC000
|
trusted library allocation
|
page read and write
|
||
1A3002C38000
|
trusted library allocation
|
page read and write
|
||
1A30023EC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30023F0000
|
trusted library allocation
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
7814000
|
heap
|
page read and write
|
||
1A3003134000
|
trusted library allocation
|
page read and write
|
||
1A3002774000
|
trusted library allocation
|
page read and write
|
||
198400250000
|
trusted library allocation
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
1A3000601000
|
trusted library allocation
|
page read and write
|
||
1A300238C000
|
trusted library allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
1A30023F4000
|
trusted library allocation
|
page read and write
|
||
1A3002FE0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6C6B0000
|
unkown
|
page readonly
|
||
1EF077DD000
|
heap
|
page read and write
|
||
6A5C002DC000
|
direct allocation
|
page read and write
|
||
1A30023AC000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A3003068000
|
trusted library allocation
|
page read and write
|
||
7779000
|
heap
|
page read and write
|
||
61100040C000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
947000
|
heap
|
page read and write
|
||
611000848000
|
trusted library allocation
|
page read and write
|
||
1EF018D0000
|
trusted library section
|
page readonly
|
||
1EF7283D000
|
heap
|
page read and write
|
||
14B8000
|
heap
|
page read and write
|
||
19840020C000
|
trusted library allocation
|
page read and write
|
||
6A5C00230000
|
direct allocation
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
1A3002BCF000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF0A0DD000
|
trusted library section
|
page read and write
|
||
7141000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
1A3002C38000
|
trusted library allocation
|
page read and write
|
||
79C6000
|
heap
|
page read and write
|
||
1EF03637000
|
heap
|
page read and write
|
||
1EF09D60000
|
trusted library section
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002924000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
76D5000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30024F0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF09F90000
|
trusted library section
|
page read and write
|
||
61100079C000
|
trusted library allocation
|
page read and write
|
||
6D4BBFE000
|
unkown
|
page readonly
|
||
1EF727A0000
|
heap
|
page read and write
|
||
14B8000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D353FB000
|
stack
|
page read and write
|
||
24DD000
|
stack
|
page read and write
|
||
1EF09F70000
|
trusted library section
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF728D0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A3003020000
|
trusted library allocation
|
page read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
6D4ABFE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
61100060C000
|
trusted library allocation
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
1A300305C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
7769000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
1A3002420000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003038000
|
trusted library allocation
|
page read and write
|
||
1A30024A4000
|
trusted library allocation
|
page read and write
|
||
6D40BFD000
|
stack
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
1A300349C000
|
trusted library allocation
|
page read and write
|
||
1A30023AC000
|
trusted library allocation
|
page read and write
|
||
78BA000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
D71000
|
unkown
|
page execute read
|
||
12F0000
|
heap
|
page read and write
|
||
1A3002C44000
|
trusted library allocation
|
page read and write
|
||
290F000
|
unkown
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
61100020C000
|
trusted library allocation
|
page read and write
|
||
1984002C0000
|
trusted library allocation
|
page read and write
|
||
1A30023D0000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
1A3002738000
|
trusted library allocation
|
page read and write
|
||
1A3003001000
|
trusted library allocation
|
page read and write
|
||
61100039C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30025D8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
1A30030C4000
|
trusted library allocation
|
page read and write
|
||
1A3003184000
|
trusted library allocation
|
page read and write
|
||
1EF0A1EE000
|
trusted library section
|
page read and write
|
||
1A30030C4000
|
trusted library allocation
|
page read and write
|
||
1A3002FA0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
10C7000
|
heap
|
page read and write
|
||
77F9000
|
heap
|
page read and write
|
||
6110008F4000
|
trusted library allocation
|
page read and write
|
||
1EF09D6E000
|
trusted library section
|
page read and write
|
||
61100071C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6110006F0000
|
trusted library allocation
|
page read and write
|
||
6D363FB000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30023D4000
|
trusted library allocation
|
page read and write
|
||
1A3002FEC000
|
trusted library allocation
|
page read and write
|
||
1A3002E48000
|
trusted library allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
198400230000
|
trusted library allocation
|
page read and write
|
||
1EF09FF0000
|
trusted library section
|
page read and write
|
||
1A3003364000
|
trusted library allocation
|
page read and write
|
||
1EF09677000
|
unclassified section
|
page read and write
|
||
1A3002538000
|
trusted library allocation
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
6A5C0024C000
|
direct allocation
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
1A3002428000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF72960000
|
heap
|
page read and write
|
||
1A3002DA0000
|
trusted library allocation
|
page read and write
|
||
6D203FE000
|
stack
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
1A30024C4000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
611000844000
|
trusted library allocation
|
page read and write
|
||
1A30025F8000
|
trusted library allocation
|
page read and write
|
||
6110002ED000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
77AC000
|
heap
|
page read and write
|
||
121000
|
unkown
|
page execute and write copy
|
||
6721000
|
heap
|
page read and write
|
||
1EF0363F000
|
heap
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
6110006AC000
|
trusted library allocation
|
page read and write
|
||
1A30029A8000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF03682000
|
heap
|
page read and write
|
||
1EF03632000
|
heap
|
page read and write
|
||
76DC000
|
heap
|
page read and write
|
||
76D4000
|
heap
|
page read and write
|
||
1A3002DE4000
|
trusted library allocation
|
page read and write
|
||
781C000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
14A1000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6D213FE000
|
stack
|
page read and write
|
||
6D2E3FA000
|
stack
|
page read and write
|
||
6A5C00250000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
BD9000
|
unkown
|
page execute and write copy
|
||
1A3003154000
|
trusted library allocation
|
page read and write
|
||
1A300282C000
|
trusted library allocation
|
page read and write
|
||
1A30032D8000
|
trusted library allocation
|
page read and write
|
||
77C1000
|
heap
|
page read and write
|
||
1EF0309E000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003140000
|
trusted library allocation
|
page read and write
|
||
611000960000
|
trusted library allocation
|
page read and write
|
||
6A5C00220000
|
direct allocation
|
page read and write
|
||
7809000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
7A43000
|
heap
|
page read and write
|
||
1EF0A0B6000
|
trusted library section
|
page read and write
|
||
1A30030F0000
|
trusted library allocation
|
page read and write
|
||
1A3002E01000
|
trusted library allocation
|
page read and write
|
||
1A3003401000
|
trusted library allocation
|
page read and write
|
||
611000238000
|
trusted library allocation
|
page read and write
|
||
6D48BFC000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000898000
|
trusted library allocation
|
page read and write
|
||
7834000
|
heap
|
page read and write
|
||
76DC000
|
heap
|
page read and write
|
||
1A3002E80000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002978000
|
trusted library allocation
|
page read and write
|
||
1A30023B4000
|
trusted library allocation
|
page read and write
|
||
1A30025D8000
|
trusted library allocation
|
page read and write
|
||
1A30032FC000
|
trusted library allocation
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
72E4000
|
direct allocation
|
page read and write
|
||
1A3002318000
|
trusted library allocation
|
page read and write
|
||
6A5C002A8000
|
direct allocation
|
page read and write
|
||
1EF036AC000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
198400270000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
1A3002410000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
198400264000
|
trusted library allocation
|
page read and write
|
||
6110002B8000
|
trusted library allocation
|
page read and write
|
||
1A30027D0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1EF073C2000
|
trusted library allocation
|
page read and write
|
||
611000840000
|
trusted library allocation
|
page read and write
|
||
6D3EBFE000
|
unkown
|
page readonly
|
||
D70000
|
unkown
|
page readonly
|
||
D70000
|
unkown
|
page readonly
|
||
640000
|
heap
|
page read and write
|
||
1A3001001000
|
trusted library allocation
|
page read and write
|
||
611000818000
|
trusted library allocation
|
page read and write
|
||
1A30025C8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
1A3002B08000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1A3000801000
|
trusted library allocation
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A300299C000
|
trusted library allocation
|
page read and write
|
||
79AF000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002F8C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF728A0000
|
heap
|
page read and write
|
||
1EF0362E000
|
heap
|
page read and write
|
||
1A3003308000
|
trusted library allocation
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D223FE000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
785D000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
6D21BFE000
|
unkown
|
page readonly
|
||
1EF018F0000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
6F51000
|
heap
|
page read and write
|
||
611000860000
|
trusted library allocation
|
page read and write
|
||
7849000
|
heap
|
page read and write
|
||
1A30029B0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
1A3002AEC000
|
trusted library allocation
|
page read and write
|
||
1EF030B0000
|
heap
|
page read and write
|
||
6D2A3FE000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002BAC000
|
trusted library allocation
|
page read and write
|
||
6D47BFA000
|
stack
|
page read and write
|
||
1A3003378000
|
trusted library allocation
|
page read and write
|
||
1A3002A78000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D3D3FB000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000828000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
6110007C4000
|
trusted library allocation
|
page read and write
|
||
1A3002F80000
|
trusted library allocation
|
page read and write
|
||
611000778000
|
trusted library allocation
|
page read and write
|
||
76D3000
|
heap
|
page read and write
|
||
1EF030B0000
|
heap
|
page read and write
|
||
1A3002394000
|
trusted library allocation
|
page read and write
|
||
1EF03654000
|
heap
|
page read and write
|
||
1A30028D0000
|
trusted library allocation
|
page read and write
|
||
1A3002EA0000
|
trusted library allocation
|
page read and write
|
||
6D4DBFE000
|
unkown
|
page readonly
|
||
1A3002674000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
stack
|
page read and write
|
||
6D36BFE000
|
unkown
|
page readonly
|
||
6D2FBFE000
|
unkown
|
page readonly
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
6A5C002D0000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
76D8000
|
heap
|
page read and write
|
||
6D253FC000
|
stack
|
page read and write
|
||
1A30023E0000
|
trusted library allocation
|
page read and write
|
||
1A30023E8000
|
trusted library allocation
|
page read and write
|
||
1A3002214000
|
trusted library allocation
|
page read and write
|
||
1A3002AC8000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7A05000
|
heap
|
page read and write
|
||
1EF036B0000
|
trusted library section
|
page read and write
|
||
76D3000
|
heap
|
page read and write
|
||
6110006E8000
|
trusted library allocation
|
page read and write
|
||
6D37BFE000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A3002C01000
|
trusted library allocation
|
page read and write
|
||
1A30029B0000
|
trusted library allocation
|
page read and write
|
||
1A30030B0000
|
trusted library allocation
|
page read and write
|
||
1EF72770000
|
heap
|
page read and write
|
||
1EF0365C000
|
heap
|
page read and write
|
||
6C6B1000
|
unkown
|
page execute read
|
||
1EF07300000
|
trusted library section
|
page read and write
|
||
1EF09D37000
|
unclassified section
|
page read and write
|
||
1EF077C0000
|
heap
|
page read and write
|
||
1A3002254000
|
trusted library allocation
|
page read and write
|
||
6110008B4000
|
trusted library allocation
|
page read and write
|
||
1984002B0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF0361D000
|
heap
|
page read and write
|
||
76D7000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A300260C000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
heap
|
page read and write
|
||
6110008E8000
|
trusted library allocation
|
page read and write
|
||
76DD000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page read and write
|
||
1EF0780B000
|
heap
|
page read and write
|
||
1A3002F30000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D32BFE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30024B4000
|
trusted library allocation
|
page read and write
|
||
1A3002ED0000
|
trusted library allocation
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
6110007BC000
|
trusted library allocation
|
page read and write
|
||
61100070C000
|
trusted library allocation
|
page read and write
|
||
76D7000
|
heap
|
page read and write
|
||
1A300240C000
|
trusted library allocation
|
page read and write
|
||
1A30034D4000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002690000
|
trusted library allocation
|
page read and write
|
||
14B8000
|
heap
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
1EF03689000
|
heap
|
page read and write
|
||
6D27BFE000
|
unkown
|
page readonly
|
||
1A3002A58000
|
trusted library allocation
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
1EF728C0000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1EF07826000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
76D8000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1984002F4000
|
trusted library allocation
|
page read and write
|
||
1A30024A8000
|
trusted library allocation
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6110002F4000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
1A3003260000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
1EF0365C000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1EF07838000
|
heap
|
page read and write
|
||
6A5C00210000
|
direct allocation
|
page read and write
|
||
611000728000
|
trusted library allocation
|
page read and write
|
||
611000878000
|
trusted library allocation
|
page read and write
|
||
1EF093E7000
|
unclassified section
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
6721000
|
heap
|
page read and write
|
||
1A3002328000
|
trusted library allocation
|
page read and write
|
||
1EF095D0000
|
trusted library section
|
page read and write
|
||
6110006E0000
|
trusted library allocation
|
page read and write
|
||
6D313FE000
|
stack
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
1A3000A01000
|
trusted library allocation
|
page read and write
|
||
1A30026A0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003118000
|
trusted library allocation
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
1A3002F00000
|
trusted library allocation
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
1A30023B4000
|
trusted library allocation
|
page read and write
|
||
1984002A0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003230000
|
trusted library allocation
|
page read and write
|
||
1A3002BC4000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
7A6F000
|
heap
|
page read and write
|
||
1EF094D2000
|
trusted library section
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
1A3002E9C000
|
trusted library allocation
|
page read and write
|
||
1A3003174000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000788000
|
trusted library allocation
|
page read and write
|
||
1A3002DF8000
|
trusted library allocation
|
page read and write
|
||
76D5000
|
heap
|
page read and write
|
||
1A300280C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002F1C000
|
trusted library allocation
|
page read and write
|
||
1A300329C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
1EF018F3000
|
heap
|
page read and write
|
||
198400201000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002BB8000
|
trusted library allocation
|
page read and write
|
||
1A3002920000
|
trusted library allocation
|
page read and write
|
||
611000894000
|
trusted library allocation
|
page read and write
|
||
1A3002E58000
|
trusted library allocation
|
page read and write
|
||
1A3002B24000
|
trusted library allocation
|
page read and write
|
||
1A30029F0000
|
trusted library allocation
|
page read and write
|
||
1A3000C01000
|
trusted library allocation
|
page read and write
|
||
1A3000401000
|
trusted library allocation
|
page read and write
|
||
6C78F000
|
unkown
|
page readonly
|
||
1EF035DA000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
611000904000
|
trusted library allocation
|
page read and write
|
||
611000248000
|
trusted library allocation
|
page read and write
|
||
6A5C00274000
|
direct allocation
|
page read and write
|
||
1A3003118000
|
trusted library allocation
|
page read and write
|
||
6110002B0000
|
trusted library allocation
|
page read and write
|
||
1984002C0000
|
trusted library allocation
|
page read and write
|
||
6D2B3FE000
|
stack
|
page read and write
|
||
611000288000
|
trusted library allocation
|
page read and write
|
||
1EF035EF000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
1A3002540000
|
trusted library allocation
|
page read and write
|
||
6110007E0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30028F0000
|
trusted library allocation
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
1A30024F3000
|
trusted library allocation
|
page read and write
|
||
1EF03300000
|
heap
|
page read and write
|
||
1EF0A001000
|
trusted library section
|
page read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
6110002D4000
|
trusted library allocation
|
page read and write
|
||
1A3002490000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000964000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
6D3ABFE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
76DC000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
1A300293C000
|
trusted library allocation
|
page read and write
|
||
1A3002B94000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
14DE000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D393FC000
|
stack
|
page read and write
|
||
6D3B3FD000
|
stack
|
page read and write
|
||
77E7000
|
heap
|
page read and write
|
||
6F6F000
|
heap
|
page read and write
|
||
1EF077C6000
|
heap
|
page read and write
|
||
1A3002D24000
|
trusted library allocation
|
page read and write
|
||
1A3003230000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6110007D4000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
6110006C8000
|
trusted library allocation
|
page read and write
|
||
1EF09FA2000
|
trusted library section
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A3002684000
|
trusted library allocation
|
page read and write
|
||
1A30023F8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002E60000
|
trusted library allocation
|
page read and write
|
||
1A3003118000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D323FE000
|
stack
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
1EF09403000
|
heap
|
page read and write
|
||
1EF035B0000
|
heap
|
page read and write
|
||
1EF0369D000
|
heap
|
page read and write
|
||
76DB000
|
heap
|
page read and write
|
||
6D1EBFE000
|
unkown
|
page readonly
|
||
6D413FE000
|
unkown
|
page readonly
|
||
3040000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
611000830000
|
trusted library allocation
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
6721000
|
heap
|
page read and write
|
||
1EF07828000
|
heap
|
page read and write
|
||
6110008C8000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
76DE000
|
heap
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
6D3FBFE000
|
unkown
|
page readonly
|
||
1EF72680000
|
heap
|
page read and write
|
||
1A3003020000
|
trusted library allocation
|
page read and write
|
||
6D41BFD000
|
stack
|
page read and write
|
||
1EF030A2000
|
heap
|
page read and write
|
||
6D3BBFE000
|
unkown
|
page readonly
|
||
1EF09B20000
|
trusted library section
|
page read and write
|
||
1A30022DC000
|
trusted library allocation
|
page read and write
|
||
1A30022FC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6A5C002EC000
|
direct allocation
|
page read and write
|
||
6D483FE000
|
unkown
|
page readonly
|
||
14AB000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002C2C000
|
trusted library allocation
|
page read and write
|
||
1A30029E0000
|
trusted library allocation
|
page read and write
|
||
1EF03637000
|
heap
|
page read and write
|
||
1A3002CBC000
|
trusted library allocation
|
page read and write
|
||
1A3002784000
|
trusted library allocation
|
page read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
611000874000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6110006AC000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1A30024F0000
|
trusted library allocation
|
page read and write
|
||
7897000
|
heap
|
page read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
1A300237C000
|
trusted library allocation
|
page read and write
|
||
6D30BFE000
|
unkown
|
page readonly
|
||
1A3003050000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
61100080C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1A30024A4000
|
trusted library allocation
|
page read and write
|
||
7813000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6110008EC000
|
trusted library allocation
|
page read and write
|
||
1984002D8000
|
trusted library allocation
|
page read and write
|
||
1EF03682000
|
heap
|
page read and write
|
||
6D31BFE000
|
unkown
|
page readonly
|
||
1A3002554000
|
trusted library allocation
|
page read and write
|
||
1A30023C4000
|
trusted library allocation
|
page read and write
|
||
611000974000
|
trusted library allocation
|
page read and write
|
||
1A3003080000
|
trusted library allocation
|
page read and write
|
||
6A5C00201000
|
direct allocation
|
page read and write
|
||
1A3002BA0000
|
trusted library allocation
|
page read and write
|
||
6D39BFE000
|
unkown
|
page readonly
|
||
1A300252C000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
611000858000
|
trusted library allocation
|
page read and write
|
||
1A30024A8000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
direct allocation
|
page read and write
|
||
6E30000
|
direct allocation
|
page execute and read and write
|
||
6110008A8000
|
trusted library allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
61100025C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D4D3FE000
|
stack
|
page read and write
|
||
1A3002AAC000
|
trusted library allocation
|
page read and write
|
||
1A30026F4000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6721000
|
heap
|
page read and write
|
||
6C78D000
|
unkown
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000918000
|
trusted library allocation
|
page read and write
|
||
1A3002801000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A30024FB000
|
trusted library allocation
|
page read and write
|
||
77A6000
|
heap
|
page read and write
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
1A3002424000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
6110006F4000
|
trusted library allocation
|
page read and write
|
||
1EF03098000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
198400294000
|
trusted library allocation
|
page read and write
|
||
1A3002894000
|
trusted library allocation
|
page read and write
|
||
198400220000
|
trusted library allocation
|
page read and write
|
||
1A3002F64000
|
trusted library allocation
|
page read and write
|
||
1A3002C0C000
|
trusted library allocation
|
page read and write
|
||
6110008B8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A300240C000
|
trusted library allocation
|
page read and write
|
||
1984002F8000
|
trusted library allocation
|
page read and write
|
||
1A3002718000
|
trusted library allocation
|
page read and write
|
||
611000801000
|
trusted library allocation
|
page read and write
|
||
1EF077D0000
|
heap
|
page read and write
|
||
6110008D8000
|
trusted library allocation
|
page read and write
|
||
1A3002EF8000
|
trusted library allocation
|
page read and write
|
||
1A3002613000
|
trusted library allocation
|
page read and write
|
||
1EF72760000
|
heap
|
page readonly
|
||
6D38BFE000
|
unkown
|
page readonly
|
||
1A30027BC000
|
trusted library allocation
|
page read and write
|
||
1A3002290000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
heap
|
page read and write
|
||
611000430000
|
trusted library allocation
|
page read and write
|
||
6D35BFE000
|
unkown
|
page readonly
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
1A30023B4000
|
trusted library allocation
|
page read and write
|
||
7948000
|
heap
|
page read and write
|
||
6D2CBFE000
|
unkown
|
page readonly
|
||
74D1000
|
heap
|
page read and write
|
||
1EF094DE000
|
trusted library section
|
page read and write
|
||
1A3002601000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D25BFE000
|
unkown
|
page readonly
|
||
7792000
|
heap
|
page read and write
|
||
1A3003018000
|
trusted library allocation
|
page read and write
|
||
6D383FC000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6A5C00280000
|
direct allocation
|
page read and write
|
||
6110006D4000
|
trusted library allocation
|
page read and write
|
||
789F000
|
heap
|
page read and write
|
||
1A3002540000
|
trusted library allocation
|
page read and write
|
||
1A30024A4000
|
trusted library allocation
|
page read and write
|
||
1A3003078000
|
trusted library allocation
|
page read and write
|
||
6D2C3FE000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003270000
|
trusted library allocation
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
1A3002500000
|
trusted library allocation
|
page read and write
|
||
6A5C00270000
|
direct allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
77FA000
|
heap
|
page read and write
|
||
6D33BFE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
1A30026AC000
|
trusted library allocation
|
page read and write
|
||
61100039C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6110002E4000
|
trusted library allocation
|
page read and write
|
||
1984002C0000
|
trusted library allocation
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
6D26BFE000
|
unkown
|
page readonly
|
||
1EF030AB000
|
heap
|
page read and write
|
||
611000210000
|
trusted library allocation
|
page read and write
|
||
1A30032D0000
|
trusted library allocation
|
page read and write
|
||
78C000
|
stack
|
page read and write
|
||
1A3003020000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30028A4000
|
trusted library allocation
|
page read and write
|
||
1A3002F50000
|
trusted library allocation
|
page read and write
|
||
1EF0309E000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
1EF03689000
|
heap
|
page read and write
|
||
1A3002430000
|
trusted library allocation
|
page read and write
|
||
611000601000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
61100085C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
77D9000
|
heap
|
page read and write
|
||
1A3002CF0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002794000
|
trusted library allocation
|
page read and write
|
||
1A3002CE0000
|
trusted library allocation
|
page read and write
|
||
1A300300C000
|
trusted library allocation
|
page read and write
|
||
6D43BFE000
|
stack
|
page read and write
|
||
1A3002401000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6A5C0023C000
|
direct allocation
|
page read and write
|
||
1984002C0000
|
trusted library allocation
|
page read and write
|
||
1A3002858000
|
trusted library allocation
|
page read and write
|
||
7794000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
6721000
|
heap
|
page read and write
|
||
6D42BFD000
|
stack
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
1A3002C58000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D4B3FE000
|
stack
|
page read and write
|
||
1EF030A3000
|
heap
|
page read and write
|
||
1A30023AC000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A3002884000
|
trusted library allocation
|
page read and write
|
||
1A3002F6C000
|
trusted library allocation
|
page read and write
|
||
6D3CBFE000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
D81000
|
unkown
|
page readonly
|
||
520000
|
heap
|
page read and write
|
||
1A3002F38000
|
trusted library allocation
|
page read and write
|
||
78EC000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
611000418000
|
trusted library allocation
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
611000890000
|
trusted library allocation
|
page read and write
|
||
6D4C3FE000
|
stack
|
page read and write
|
||
1EF03740000
|
trusted library section
|
page read and write
|
||
1A3002FC0000
|
trusted library allocation
|
page read and write
|
||
1A3002C38000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30023A0000
|
trusted library allocation
|
page read and write
|
||
796B000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30024D0000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
7786000
|
heap
|
page read and write
|
||
198400235000
|
trusted library allocation
|
page read and write
|
||
1A30022B4000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003118000
|
trusted library allocation
|
page read and write
|
||
1A300234C000
|
trusted library allocation
|
page read and write
|
||
1A3003340000
|
trusted library allocation
|
page read and write
|
||
1A300226A000
|
trusted library allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003044000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
6D28BFE000
|
unkown
|
page readonly
|
||
77C0000
|
heap
|
page read and write
|
||
611000404000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A300272D000
|
trusted library allocation
|
page read and write
|
||
1A3002F94000
|
trusted library allocation
|
page read and write
|
||
1A3002C1C000
|
trusted library allocation
|
page read and write
|
||
1A3002D68000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D29BFE000
|
unkown
|
page readonly
|
||
1EF72820000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D473FE000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6D263FE000
|
stack
|
page read and write
|
||
6D433FE000
|
unkown
|
page readonly
|
||
1A30030A0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
198400274000
|
trusted library allocation
|
page read and write
|
||
6D273FA000
|
stack
|
page read and write
|
||
1A300220C000
|
trusted library allocation
|
page read and write
|
||
251A000
|
stack
|
page read and write
|
||
1A300284C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000230000
|
trusted library allocation
|
page read and write
|
||
6110006E8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
61100091C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D22BFE000
|
unkown
|
page readonly
|
||
6D303FE000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
14CB000
|
heap
|
page read and write
|
||
1A30029C4000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000401000
|
trusted library allocation
|
page read and write
|
||
1A3002F40000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
1EF09646000
|
trusted library section
|
page read and write
|
||
1A300324C000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
76D5000
|
heap
|
page read and write
|
||
6D453FE000
|
unkown
|
page readonly
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
1A3002D98000
|
trusted library allocation
|
page read and write
|
||
1A3002998000
|
trusted library allocation
|
page read and write
|
||
1A3002E24000
|
trusted library allocation
|
page read and write
|
||
6D2F3FE000
|
stack
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
7865000
|
heap
|
page read and write
|
||
1A30024C0000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF09480000
|
heap
|
page read and write
|
||
1A3002A9C000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF02340000
|
unkown
|
page read and write
|
||
1A30034B8000
|
trusted library allocation
|
page read and write
|
||
1EF03654000
|
heap
|
page read and write
|
||
1A30031AC000
|
trusted library allocation
|
page read and write
|
||
1A3002F00000
|
trusted library allocation
|
page read and write
|
||
F8F000
|
stack
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A30031A4000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
76DD000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
611000408000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002D90000
|
trusted library allocation
|
page read and write
|
||
6D49BF4000
|
stack
|
page read and write
|
||
1A3002D18000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
heap
|
page read and write
|
||
1A300229C000
|
trusted library allocation
|
page read and write
|
||
72FA000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A300247C000
|
trusted library allocation
|
page read and write
|
||
1EF72859000
|
heap
|
page read and write
|
||
6D493FE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
1A3002284000
|
trusted library allocation
|
page read and write
|
||
1A300340C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
788E000
|
heap
|
page read and write
|
||
1A30023CC000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3003280000
|
trusted library allocation
|
page read and write
|
||
611000201000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002EF8000
|
trusted library allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
1A3002C38000
|
trusted library allocation
|
page read and write
|
||
6D3DBFE000
|
unkown
|
page readonly
|
||
1A30028FC000
|
trusted library allocation
|
page read and write
|
||
1A3002A0C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
6A5C00284000
|
direct allocation
|
page read and write
|
||
1A300312D000
|
trusted library allocation
|
page read and write
|
||
1A30024A4000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
1A3002919000
|
trusted library allocation
|
page read and write
|
||
1EF09FE0000
|
trusted library section
|
page read and write
|
||
76DA000
|
heap
|
page read and write
|
||
198400288000
|
trusted library allocation
|
page read and write
|
||
6D4CBFE000
|
unkown
|
page readonly
|
||
1A300236C000
|
trusted library allocation
|
page read and write
|
||
1A3002C38000
|
trusted library allocation
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
1EF0A1E0000
|
trusted library section
|
page read and write
|
||
1A3002B38000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page write copy
|
||
1A3002A28000
|
trusted library allocation
|
page read and write
|
||
1EF035F3000
|
heap
|
page read and write
|
||
1A3000E01000
|
trusted library allocation
|
page read and write
|
||
611000790000
|
trusted library allocation
|
page read and write
|
||
1EF03070000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1A3002DF4000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
198400248000
|
trusted library allocation
|
page read and write
|
||
6D233FD000
|
stack
|
page read and write
|
||
6110006AC000
|
trusted library allocation
|
page read and write
|
||
6D403FD000
|
stack
|
page read and write
|
||
72E6000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002BD8000
|
trusted library allocation
|
page read and write
|
||
6D3F3FE000
|
stack
|
page read and write
|
||
1A30026D0000
|
trusted library allocation
|
page read and write
|
||
78BA000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
1A30031AC000
|
trusted library allocation
|
page read and write
|
||
6110008C4000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
6D4A3FE000
|
unkown
|
page readonly
|
||
1A30025EC000
|
trusted library allocation
|
page read and write
|
||
61100095C000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A3000201000
|
trusted library allocation
|
page read and write
|
||
4CC000
|
stack
|
page read and write
|
||
1A3002274000
|
trusted library allocation
|
page read and write
|
||
1A30028E0000
|
trusted library allocation
|
page read and write
|
||
6D44BFE000
|
stack
|
page read and write
|
||
1A300252C000
|
trusted library allocation
|
page read and write
|
||
1EF03632000
|
heap
|
page read and write
|
||
1A300284C000
|
trusted library allocation
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
1A3003080000
|
trusted library allocation
|
page read and write
|
||
783A000
|
heap
|
page read and write
|
||
6110006C8000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
61100087C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
6D24BFE000
|
unkown
|
page readonly
|
||
1EF03099000
|
heap
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
6C7D9000
|
unkown
|
page read and write
|
||
1EF0A0D2000
|
trusted library section
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A3002D68000
|
trusted library allocation
|
page read and write
|
||
1A3002F94000
|
trusted library allocation
|
page read and write
|
||
1984002B0000
|
trusted library allocation
|
page read and write
|
||
1A300241C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
61100078C000
|
trusted library allocation
|
page read and write
|
||
1EF0362E000
|
heap
|
page read and write
|
||
1A30027A8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
61100027C000
|
trusted library allocation
|
page read and write
|
||
1A3002D28000
|
trusted library allocation
|
page read and write
|
||
1EF0363F000
|
heap
|
page read and write
|
||
61100082C000
|
trusted library allocation
|
page read and write
|
||
1A3003318000
|
trusted library allocation
|
page read and write
|
||
198400278000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
6110008E4000
|
trusted library allocation
|
page read and write
|
||
785F000
|
heap
|
page read and write
|
||
1A3002560000
|
trusted library allocation
|
page read and write
|
||
1EF0A110000
|
trusted library section
|
page read and write
|
||
6A5C00290000
|
direct allocation
|
page read and write
|
||
1A300310C000
|
trusted library allocation
|
page read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30024A4000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
1984002C0000
|
trusted library allocation
|
page read and write
|
||
611000884000
|
trusted library allocation
|
page read and write
|
||
7838000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D3C3FC000
|
stack
|
page read and write
|
||
1A30023E4000
|
trusted library allocation
|
page read and write
|
||
6A5C00303000
|
direct allocation
|
page read and write
|
||
1A300235C000
|
trusted library allocation
|
page read and write
|
||
6D283FC000
|
stack
|
page read and write
|
||
1A3002FA4000
|
trusted library allocation
|
page read and write
|
||
1A30030A0000
|
trusted library allocation
|
page read and write
|
||
611000248000
|
trusted library allocation
|
page read and write
|
||
121000
|
unkown
|
page execute and write copy
|
||
6721000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
61100084C000
|
trusted library allocation
|
page read and write
|
||
1984002A0000
|
trusted library allocation
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002554000
|
trusted library allocation
|
page read and write
|
||
1EF09FAE000
|
trusted library section
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
6A5C0020C000
|
direct allocation
|
page read and write
|
||
1EF0959D000
|
trusted library section
|
page read and write
|
||
6D2BBFE000
|
unkown
|
page readonly
|
||
D70000
|
unkown
|
page readonly
|
||
6E10000
|
direct allocation
|
page execute and read and write
|
||
6A5C002E4000
|
direct allocation
|
page read and write
|
||
1EF030AA000
|
heap
|
page read and write
|
||
1A30025B4000
|
trusted library allocation
|
page read and write
|
||
1A3000001000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1EF72824000
|
heap
|
page read and write
|
||
1A30024AA000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
unkown
|
page readonly
|
||
1A30025D8000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
611000864000
|
trusted library allocation
|
page read and write
|
||
1A3002950000
|
trusted library allocation
|
page read and write
|
||
1EF096A0000
|
trusted library section
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
1A3002968000
|
trusted library allocation
|
page read and write
|
||
6D333FA000
|
stack
|
page read and write
|
||
1A300320C000
|
trusted library allocation
|
page read and write
|
||
6C7D8000
|
unkown
|
page readonly
|
||
1EF0A460000
|
trusted library section
|
page read and write
|
||
1A30034C8000
|
trusted library allocation
|
page read and write
|
||
788E000
|
heap
|
page read and write
|
||
6110002FC000
|
trusted library allocation
|
page read and write
|
||
1A3002DF4000
|
trusted library allocation
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
84A000
|
unkown
|
page write copy
|
||
61100081C000
|
trusted library allocation
|
page read and write
|
||
1EF727A8000
|
heap
|
page read and write
|
||
1A30032FC000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6D293FC000
|
stack
|
page read and write
|
||
6D45BFD000
|
stack
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
1A3002AE0000
|
trusted library allocation
|
page read and write
|
||
1A300242C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
1A300270C000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30031D4000
|
trusted library allocation
|
page read and write
|
||
6D34BFE000
|
unkown
|
page readonly
|
||
1EF0A013000
|
trusted library section
|
page read and write
|
||
1A3002B14000
|
trusted library allocation
|
page read and write
|
||
6D2D3FD000
|
stack
|
page read and write
|
||
1EF030AF000
|
heap
|
page read and write
|
||
76D4000
|
heap
|
page read and write
|
||
6A5C00215000
|
direct allocation
|
page read and write
|
||
1A3002EF8000
|
trusted library allocation
|
page read and write
|
||
6D46BFE000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1A3002D7C000
|
trusted library allocation
|
page read and write
|
||
6D2EBFE000
|
unkown
|
page readonly
|
||
1A3002EE8000
|
trusted library allocation
|
page read and write
|
||
6110007AC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002334000
|
trusted library allocation
|
page read and write
|
||
1EF058E0000
|
trusted library allocation
|
page read and write
|
||
6D423FE000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute read
|
||
2A5A000
|
heap
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1A3002414000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
1EF09513000
|
trusted library section
|
page read and write
|
||
6A5C00294000
|
direct allocation
|
page read and write
|
||
6A5C00234000
|
direct allocation
|
page read and write
|
||
1A30030B8000
|
trusted library allocation
|
page read and write
|
||
7A2B000
|
heap
|
page read and write
|
||
6110008F0000
|
trusted library allocation
|
page read and write
|
||
1A3002F10000
|
trusted library allocation
|
page read and write
|
||
7249000
|
heap
|
page read and write
|
||
1A300308C000
|
trusted library allocation
|
page read and write
|
||
1EF72965000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1984002BC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002A01000
|
trusted library allocation
|
page read and write
|
||
1A300296E000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1A300302C000
|
trusted library allocation
|
page read and write
|
||
611000700000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A300256C000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6110006F4000
|
trusted library allocation
|
page read and write
|
||
6110002CC000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
direct allocation
|
page read and write
|
||
1A30023DC000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
76D8000
|
heap
|
page read and write
|
||
1A300336C000
|
trusted library allocation
|
page read and write
|
||
1A3002520000
|
trusted library allocation
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
1A30032F0000
|
trusted library allocation
|
page read and write
|
||
6D1E3FD000
|
unkown
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1984002B0000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A30030C4000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
786B000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6D443FE000
|
unkown
|
page readonly
|
||
1A3002F28000
|
trusted library allocation
|
page read and write
|
||
1984002E4000
|
trusted library allocation
|
page read and write
|
||
1A3002504000
|
trusted library allocation
|
page read and write
|
||
1A30025D8000
|
trusted library allocation
|
page read and write
|
||
1A3003154000
|
trusted library allocation
|
page read and write
|
||
1A3002E58000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002E70000
|
trusted library allocation
|
page read and write
|
||
1A300332C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6110007C0000
|
trusted library allocation
|
page read and write
|
||
76D6000
|
heap
|
page read and write
|
||
1A3003164000
|
trusted library allocation
|
page read and write
|
||
1A300254C000
|
trusted library allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
6A5C00217000
|
direct allocation
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002520000
|
trusted library allocation
|
page read and write
|
||
7813000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
6721000
|
heap
|
page read and write
|
||
6D373FB000
|
stack
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
1A3002840000
|
trusted library allocation
|
page read and write
|
||
76D1000
|
heap
|
page read and write
|
||
1A30023AC000
|
trusted library allocation
|
page read and write
|
||
7A01000
|
heap
|
page read and write
|
There are 1300 hidden memdumps, click here to show them.