Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RGU8qibimk.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RGU8qibimk.exe_d25c87f13dc6c3581317ff0e5e8ce87b1b014ae_7003eea9_7a4a4e48-07be-4135-a515-2ca43c361a56\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F06.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:41 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7187.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71D7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RGU8qibimk.exe
|
"C:\Users\user\Desktop\RGU8qibimk.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1992,i,8706350967883089063,667949651104255721,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7896 -s 1224
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://anglebug.com/4836E
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/6048K
|
unknown
|
||
http://anglebug.com/4836I
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/4836Q
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://chrome.google.com/webstore?hl=enF
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://chrome.google.com/webstore?hl=en2
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
http://anglebug.com/6439A
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/5881G
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5881J
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5881I
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://drive.google.com/?lfhs=2Bd
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
http://anglebug.com/3584:
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://unisolated.invalid/B
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
http://anglebug.com/3862/
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
172.217.21.36
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
ProgramId
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
FileId
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
LongPathHash
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Name
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
OriginalFileName
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Publisher
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Version
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
BinFileVersion
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
BinaryType
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
ProductName
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
ProductVersion
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
LinkDate
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
BinProductVersion
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
AppxPackageFullName
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Size
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Language
|
||
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8262000
|
heap
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
1AC0002B0000
|
trusted library allocation
|
page read and write
|
||
47BC5FE000
|
unkown
|
page readonly
|
||
1AC000220000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E01000
|
trusted library allocation
|
page read and write
|
||
47C7DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803401000
|
trusted library allocation
|
page read and write
|
||
1D08000
|
heap
|
page read and write
|
||
5CD802424000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
5CD803114000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
7C5A000
|
heap
|
page read and write
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
5CD803114000
|
trusted library allocation
|
page read and write
|
||
59B0002CC000
|
trusted library allocation
|
page read and write
|
||
59B00079C000
|
trusted library allocation
|
page read and write
|
||
8176000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
81CC000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8026A0000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
47D9DFE000
|
stack
|
page read and write
|
||
5CD802AD8000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
330000
|
unkown
|
page readonly
|
||
33E000
|
unkown
|
page read and write
|
||
47C85FE000
|
unkown
|
page readonly
|
||
5CD8024BC000
|
trusted library allocation
|
page read and write
|
||
5CD80015A000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
47E3DFE000
|
stack
|
page read and write
|
||
81AF000
|
heap
|
page read and write
|
||
59B000880000
|
trusted library allocation
|
page read and write
|
||
6C831000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80241C000
|
trusted library allocation
|
page read and write
|
||
1AC000278000
|
trusted library allocation
|
page read and write
|
||
5CD802450000
|
trusted library allocation
|
page read and write
|
||
5CD8023D0000
|
trusted library allocation
|
page read and write
|
||
7EB1000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
1D3D000
|
heap
|
page read and write
|
||
1D2E6887000
|
unclassified section
|
page read and write
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
59B000401000
|
trusted library allocation
|
page read and write
|
||
47DFDFE000
|
stack
|
page read and write
|
||
5CD802974000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
59B000850000
|
trusted library allocation
|
page read and write
|
||
5CD8023A8000
|
trusted library allocation
|
page read and write
|
||
3FA000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47DF5FE000
|
unkown
|
page readonly
|
||
12B0000
|
heap
|
page read and write
|
||
5CD802444000
|
trusted library allocation
|
page read and write
|
||
5CD802344000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
59B0002B8000
|
trusted library allocation
|
page read and write
|
||
47CEDFB000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802790000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80262F000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
59B000201000
|
trusted library allocation
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
5CD8025A4000
|
trusted library allocation
|
page read and write
|
||
1AC0002A0000
|
trusted library allocation
|
page read and write
|
||
47C15FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD800832000
|
trusted library allocation
|
page read and write
|
||
443000303000
|
direct allocation
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
47CDDFD000
|
stack
|
page read and write
|
||
5CD8024C0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD80314C000
|
trusted library allocation
|
page read and write
|
||
59B000894000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47B6DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802C0C000
|
trusted library allocation
|
page read and write
|
||
81F9000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
259F000
|
unkown
|
page read and write
|
||
1D2EA822000
|
trusted library section
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000250000
|
trusted library allocation
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
1AC000248000
|
trusted library allocation
|
page read and write
|
||
59B000828000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
47D95FE000
|
unkown
|
page readonly
|
||
80B4000
|
heap
|
page read and write
|
||
7B40000
|
direct allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
70F1000
|
heap
|
page read and write
|
||
819C000
|
heap
|
page read and write
|
||
5CD803080000
|
trusted library allocation
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
47BADFB000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2EA8B0000
|
trusted library section
|
page read and write
|
||
1AC00020C000
|
trusted library allocation
|
page read and write
|
||
5CD802A24000
|
trusted library allocation
|
page read and write
|
||
8237000
|
heap
|
page read and write
|
||
47DD5FE000
|
unkown
|
page readonly
|
||
1AC000260000
|
trusted library allocation
|
page read and write
|
||
2BD000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8023D0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
82AC000
|
heap
|
page read and write
|
||
5CD8025BC000
|
trusted library allocation
|
page read and write
|
||
1AC0002E4000
|
trusted library allocation
|
page read and write
|
||
5CD802FF8000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
47DBDFE000
|
stack
|
page read and write
|
||
5CD80296C000
|
trusted library allocation
|
page read and write
|
||
47B7DFE000
|
stack
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
47BF5FE000
|
unkown
|
page readonly
|
||
331000
|
unkown
|
page execute read
|
||
47CADFD000
|
stack
|
page read and write
|
||
59B000248000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
443000274000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47CF5FE000
|
unkown
|
page readonly
|
||
1440000
|
heap
|
page read and write
|
||
47CB5FE000
|
unkown
|
page readonly
|
||
5CD8032D8000
|
trusted library allocation
|
page read and write
|
||
80B9000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4AC3000
|
heap
|
page read and write
|
||
842D000
|
heap
|
page read and write
|
||
5CD802414000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
80B1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80284C000
|
trusted library allocation
|
page read and write
|
||
80B2000
|
heap
|
page read and write
|
||
1D2EAE40000
|
trusted library section
|
page read and write
|
||
1D63000
|
heap
|
page read and write
|
||
5CD8024FB000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
5CD8027A4000
|
trusted library allocation
|
page read and write
|
||
5CD80320C000
|
trusted library allocation
|
page read and write
|
||
5CD802590000
|
trusted library allocation
|
page read and write
|
||
5CD802BBC000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD802354000
|
trusted library allocation
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1AC000264000
|
trusted library allocation
|
page read and write
|
||
5CD802318000
|
trusted library allocation
|
page read and write
|
||
80B9000
|
heap
|
page read and write
|
||
5CD80272A000
|
trusted library allocation
|
page read and write
|
||
5CD803078000
|
trusted library allocation
|
page read and write
|
||
59B000430000
|
trusted library allocation
|
page read and write
|
||
80B6000
|
heap
|
page read and write
|
||
59B0006F4000
|
trusted library allocation
|
page read and write
|
||
5CD802801000
|
trusted library allocation
|
page read and write
|
||
5CD802498000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E446C000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
80B2000
|
heap
|
page read and write
|
||
1AC0002C0000
|
trusted library allocation
|
page read and write
|
||
5CD803324000
|
trusted library allocation
|
page read and write
|
||
59B000860000
|
trusted library allocation
|
page read and write
|
||
59B000964000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47D25FE000
|
unkown
|
page readonly
|
||
9CC000
|
stack
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
47C05FE000
|
unkown
|
page readonly
|
||
5CD802418000
|
trusted library allocation
|
page read and write
|
||
5CD8027B8000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000728000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8030CC000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2EAD20000
|
trusted library section
|
page read and write
|
||
443000215000
|
direct allocation
|
page read and write
|
||
59B0008EC000
|
trusted library allocation
|
page read and write
|
||
5CD802D08000
|
trusted library allocation
|
page read and write
|
||
5CD802214000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
443000220000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
4430002EC000
|
direct allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
5CD802FB4000
|
trusted library allocation
|
page read and write
|
||
1AC0002D8000
|
trusted library allocation
|
page read and write
|
||
5CD802448000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8023D0000
|
trusted library allocation
|
page read and write
|
||
5CD800401000
|
trusted library allocation
|
page read and write
|
||
1D2E0F1A000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
4430002E4000
|
direct allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1AC000294000
|
trusted library allocation
|
page read and write
|
||
47BB5FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802398000
|
trusted library allocation
|
page read and write
|
||
5CD802F3C000
|
trusted library allocation
|
page read and write
|
||
59B0006AC000
|
trusted library allocation
|
page read and write
|
||
1D2E0F46000
|
heap
|
page read and write
|
||
1AC000230000
|
trusted library allocation
|
page read and write
|
||
1D2E0F42000
|
heap
|
page read and write
|
||
59B000778000
|
trusted library allocation
|
page read and write
|
||
47B5DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000237000
|
trusted library allocation
|
page read and write
|
||
80BD000
|
heap
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
8294000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
4430002D0000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803364000
|
trusted library allocation
|
page read and write
|
||
5CD802A64000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2EB28D000
|
trusted library section
|
page read and write
|
||
80BE000
|
heap
|
page read and write
|
||
1D2E0F50000
|
heap
|
page readonly
|
||
1D63000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2EAD31000
|
trusted library section
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
830D000
|
heap
|
page read and write
|
||
1D46000
|
heap
|
page read and write
|
||
5CD802E28000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8026CC000
|
trusted library allocation
|
page read and write
|
||
5CD8030E4000
|
trusted library allocation
|
page read and write
|
||
5CD80224D000
|
trusted library allocation
|
page read and write
|
||
5CD803228000
|
trusted library allocation
|
page read and write
|
||
5CD802910000
|
trusted library allocation
|
page read and write
|
||
5CD802EB4000
|
trusted library allocation
|
page read and write
|
||
5CD8029E8000
|
trusted library allocation
|
page read and write
|
||
47E1DFE000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
59B0006E0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E8C24000
|
heap
|
page read and write
|
||
1D2E0D70000
|
heap
|
page read and write
|
||
5CD802F70000
|
trusted library allocation
|
page read and write
|
||
47B3DEF000
|
stack
|
page read and write
|
||
47B55FE000
|
unkown
|
page readonly
|
||
950000
|
heap
|
page read and write
|
||
1D2E4470000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
13EE000
|
stack
|
page read and write
|
||
80BB000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
370000
|
heap
|
page read and write
|
||
47E0DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
47C5DFA000
|
stack
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
3CE000
|
stack
|
page read and write
|
||
77F0000
|
direct allocation
|
page execute and read and write
|
||
F0F000
|
stack
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
828B000
|
heap
|
page read and write
|
||
822C000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD80225C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D1B000
|
heap
|
page read and write
|
||
1D2EA55E000
|
trusted library section
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E7C000
|
trusted library allocation
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
7CA4000
|
direct allocation
|
page read and write
|
||
1D2EACDE000
|
trusted library section
|
page read and write
|
||
5CD803108000
|
trusted library allocation
|
page read and write
|
||
47CBDFA000
|
stack
|
page read and write
|
||
5CD8022C4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
59B0008C8000
|
trusted library allocation
|
page read and write
|
||
5CD8022AC000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
59B0007BC000
|
trusted library allocation
|
page read and write
|
||
59B000904000
|
trusted library allocation
|
page read and write
|
||
5CD8022EC000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
1D2E4AD4000
|
heap
|
page read and write
|
||
5CD802EB4000
|
trusted library allocation
|
page read and write
|
||
47E2DFE000
|
stack
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
47C0DFB000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
5CD802EC4000
|
trusted library allocation
|
page read and write
|
||
827A000
|
heap
|
page read and write
|
||
59B000864000
|
trusted library allocation
|
page read and write
|
||
1CF2000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
443000250000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47D85FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802B34000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
828E000
|
heap
|
page read and write
|
||
47C8DFD000
|
stack
|
page read and write
|
||
443000230000
|
direct allocation
|
page read and write
|
||
59B000801000
|
trusted library allocation
|
page read and write
|
||
1AC000235000
|
trusted library allocation
|
page read and write
|
||
80B2000
|
heap
|
page read and write
|
||
5CD803044000
|
trusted library allocation
|
page read and write
|
||
1AC0002C0000
|
trusted library allocation
|
page read and write
|
||
836B000
|
heap
|
page read and write
|
||
5CD802E20000
|
trusted library allocation
|
page read and write
|
||
1AC0002B0000
|
trusted library allocation
|
page read and write
|
||
8156000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D63000
|
heap
|
page read and write
|
||
5CD8026A8000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD800001000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
59B0007AC000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
5CD803050000
|
trusted library allocation
|
page read and write
|
||
5CD803158000
|
trusted library allocation
|
page read and write
|
||
5CD802D84000
|
trusted library allocation
|
page read and write
|
||
5CD8023E0000
|
trusted library allocation
|
page read and write
|
||
47D05FE000
|
unkown
|
page readonly
|
||
7B21000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
5CD8025A4000
|
trusted library allocation
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
5CD8025A4000
|
trusted library allocation
|
page read and write
|
||
5CD802401000
|
trusted library allocation
|
page read and write
|
||
1AC000238000
|
trusted library allocation
|
page read and write
|
||
1D2EACB0000
|
trusted library section
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
5CD802FE4000
|
trusted library allocation
|
page read and write
|
||
5CD8024B0000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
5CD80260C000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
1D2EAD43000
|
trusted library section
|
page read and write
|
||
5CD802F54000
|
trusted library allocation
|
page read and write
|
||
59B0006D4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80257C000
|
trusted library allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4ADF000
|
heap
|
page read and write
|
||
59B0007C4000
|
trusted library allocation
|
page read and write
|
||
5CD802930000
|
trusted library allocation
|
page read and write
|
||
5CD802906000
|
trusted library allocation
|
page read and write
|
||
1D2EAF3E000
|
trusted library section
|
page read and write
|
||
5CD802C14000
|
trusted library allocation
|
page read and write
|
||
47D5DFD000
|
stack
|
page read and write
|
||
5CD802CE4000
|
trusted library allocation
|
page read and write
|
||
47BE5FE000
|
unkown
|
page readonly
|
||
1D2E8C3D000
|
heap
|
page read and write
|
||
5CD802440000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E446C000
|
heap
|
page read and write
|
||
1D2EB282000
|
trusted library section
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
5CD802CE4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
816B000
|
heap
|
page read and write
|
||
5CD802684000
|
trusted library allocation
|
page read and write
|
||
5CD8022D4000
|
trusted library allocation
|
page read and write
|
||
1D2E8C47000
|
heap
|
page read and write
|
||
5CD802D68000
|
trusted library allocation
|
page read and write
|
||
59B000918000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
47E15FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
1AC0002C0000
|
trusted library allocation
|
page read and write
|
||
1D2E0F90000
|
heap
|
page read and write
|
||
1D2EA4D7000
|
unclassified section
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802B24000
|
trusted library allocation
|
page read and write
|
||
5CD802CAC000
|
trusted library allocation
|
page read and write
|
||
5CD802438000
|
trusted library allocation
|
page read and write
|
||
5CD802A01000
|
trusted library allocation
|
page read and write
|
||
59B000404000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8028D5000
|
trusted library allocation
|
page read and write
|
||
5CD80313C000
|
trusted library allocation
|
page read and write
|
||
6C90D000
|
unkown
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
940000
|
heap
|
page read and write
|
||
80B8000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E6C000
|
trusted library allocation
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802508000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803248000
|
trusted library allocation
|
page read and write
|
||
5CD8026A0000
|
trusted library allocation
|
page read and write
|
||
5CD800A01000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
59B0006C8000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD802560000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
5CD80315C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802CBC000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
5CD802428000
|
trusted library allocation
|
page read and write
|
||
5CD8023D0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802AEC000
|
trusted library allocation
|
page read and write
|
||
5CD802820000
|
trusted library allocation
|
page read and write
|
||
5CD802F30000
|
trusted library allocation
|
page read and write
|
||
443000294000
|
direct allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
1AC000201000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8240000
|
heap
|
page read and write
|
||
6C95C000
|
unkown
|
page readonly
|
||
82BE000
|
heap
|
page read and write
|
||
1D2E4466000
|
heap
|
page read and write
|
||
1D2E4AB5000
|
heap
|
page read and write
|
||
59B0006F0000
|
trusted library allocation
|
page read and write
|
||
443000217000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803220000
|
trusted library allocation
|
page read and write
|
||
7800000
|
direct allocation
|
page execute and read and write
|
||
33A000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
80BB000
|
heap
|
page read and write
|
||
5CD802E98000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47BFDFC000
|
stack
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
5CD8024D8000
|
trusted library allocation
|
page read and write
|
||
59B0002F2000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
7C50000
|
heap
|
page read and write
|
||
5CD803348000
|
trusted library allocation
|
page read and write
|
||
1D2E0F29000
|
heap
|
page read and write
|
||
1AC0002C0000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8029C8000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
5CD802EF0000
|
trusted library allocation
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
5CD802C24000
|
trusted library allocation
|
page read and write
|
||
5CD803330000
|
trusted library allocation
|
page read and write
|
||
59B00095C000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD802D74000
|
trusted library allocation
|
page read and write
|
||
5CD802CE4000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
80B5000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8205000
|
heap
|
page read and write
|
||
1D2EA750000
|
trusted library section
|
page read and write
|
||
80BD000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802BA0000
|
trusted library allocation
|
page read and write
|
||
83D7000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
5CD802EC4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47C65FE000
|
unkown
|
page readonly
|
||
5CD803318000
|
trusted library allocation
|
page read and write
|
||
59B00078C000
|
trusted library allocation
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
47C45FE000
|
unkown
|
page readonly
|
||
1D2E4AD8000
|
heap
|
page read and write
|
||
5CD8030A0000
|
trusted library allocation
|
page read and write
|
||
47D7DFE000
|
stack
|
page read and write
|
||
1D2E445E000
|
heap
|
page read and write
|
||
1D1B000
|
heap
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD803184000
|
trusted library allocation
|
page read and write
|
||
5CD800601000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47DEDFE000
|
stack
|
page read and write
|
||
8253000
|
heap
|
page read and write
|
||
1D2E69F0000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD8023C8000
|
trusted library allocation
|
page read and write
|
||
1AC0002F8000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803184000
|
trusted library allocation
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
5CD8023F8000
|
trusted library allocation
|
page read and write
|
||
5CD803114000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
5CD802F68000
|
trusted library allocation
|
page read and write
|
||
47E35FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
1D62000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802CF8000
|
trusted library allocation
|
page read and write
|
||
59B000848000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
44300020C000
|
direct allocation
|
page read and write
|
||
5CD802588000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47C55FE000
|
unkown
|
page readonly
|
||
5CD802878000
|
trusted library allocation
|
page read and write
|
||
5CD8028B0000
|
trusted library allocation
|
page read and write
|
||
1D2E3700000
|
unkown
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
59B000960000
|
trusted library allocation
|
page read and write
|
||
5CD803298000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
59B00071C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47CC5FE000
|
unkown
|
page readonly
|
||
5CD8025F4000
|
trusted library allocation
|
page read and write
|
||
5CD80272F000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47B75FE000
|
unkown
|
page readonly
|
||
5CD802634000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
B30000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD80280C000
|
trusted library allocation
|
page read and write
|
||
186F000
|
stack
|
page read and write
|
||
47C35FE000
|
unkown
|
page readonly
|
||
5CD802B18000
|
trusted library allocation
|
page read and write
|
||
47C25FE000
|
unkown
|
page readonly
|
||
47C6DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
829A000
|
heap
|
page read and write
|
||
1D2E4AD2000
|
heap
|
page read and write
|
||
5CD8032A0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47BD5FE000
|
unkown
|
page readonly
|
||
8218000
|
heap
|
page read and write
|
||
5CD803238000
|
trusted library allocation
|
page read and write
|
||
79A6000
|
heap
|
page read and write
|
||
80B1000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
59B0002C4000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD80220C000
|
trusted library allocation
|
page read and write
|
||
59B000790000
|
trusted library allocation
|
page read and write
|
||
5CD802B84000
|
trusted library allocation
|
page read and write
|
||
1D2E0E50000
|
heap
|
page read and write
|
||
1D2E4AD0000
|
heap
|
page read and write
|
||
5CD802768000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802A94000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
47C9DFC000
|
stack
|
page read and write
|
||
443000270000
|
direct allocation
|
page read and write
|
||
5CD802D68000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4AD6000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
83FF000
|
heap
|
page read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
2FA000
|
stack
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B0008E8000
|
trusted library allocation
|
page read and write
|
||
1D2EAF30000
|
trusted library section
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80349C000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
59B000878000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
59B000898000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
5CD8023EC000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47CD5FE000
|
unkown
|
page readonly
|
||
5CD802C01000
|
trusted library allocation
|
page read and write
|
||
59B000788000
|
trusted library allocation
|
page read and write
|
||
44300023C000
|
direct allocation
|
page read and write
|
||
5CD80313C000
|
trusted library allocation
|
page read and write
|
||
5CD802BD0000
|
trusted library allocation
|
page read and write
|
||
1D2E8C2B000
|
heap
|
page read and write
|
||
5CD8024FF000
|
trusted library allocation
|
page read and write
|
||
47D75FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802388000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000424000
|
trusted library allocation
|
page read and write
|
||
1D2E1015000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
5CD802FA4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8164000
|
heap
|
page read and write
|
||
81DC000
|
heap
|
page read and write
|
||
5CD80295C000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
59B0002EC000
|
trusted library allocation
|
page read and write
|
||
1D2EADE6000
|
trusted library section
|
page read and write
|
||
5CD803124000
|
trusted library allocation
|
page read and write
|
||
5CD80305C000
|
trusted library allocation
|
page read and write
|
||
80B4000
|
heap
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
59B0008C4000
|
trusted library allocation
|
page read and write
|
||
443000280000
|
direct allocation
|
page read and write
|
||
5CD802C58000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7C2E000
|
heap
|
page read and write
|
||
4430002DC000
|
direct allocation
|
page read and write
|
||
5CD802E88000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802780000
|
trusted library allocation
|
page read and write
|
||
5CD802F4C000
|
trusted library allocation
|
page read and write
|
||
1D2E4ABF000
|
heap
|
page read and write
|
||
80B5000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802240000
|
trusted library allocation
|
page read and write
|
||
5CD802ED4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
80B8000
|
heap
|
page read and write
|
||
8242000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4A24000
|
heap
|
page read and write
|
||
1CFF000
|
heap
|
page read and write
|
||
1D2EA806000
|
trusted library section
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
5CD802ACC000
|
trusted library allocation
|
page read and write
|
||
5CD8031C4000
|
trusted library allocation
|
page read and write
|
||
5CD8024B2000
|
trusted library allocation
|
page read and write
|
||
47D2DFB000
|
stack
|
page read and write
|
||
5CD802629000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1AC0002C8000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802C34000
|
trusted library allocation
|
page read and write
|
||
47CCDFC000
|
stack
|
page read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
819D000
|
heap
|
page read and write
|
||
59B0007A0000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
80B9000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
1390000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B00060C000
|
trusted library allocation
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
1D47000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8356000
|
heap
|
page read and write
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4463000
|
heap
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
70F1000
|
heap
|
page read and write
|
||
443000210000
|
direct allocation
|
page read and write
|
||
5CD802C84000
|
trusted library allocation
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
5CD802F7C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
direct allocation
|
page read and write
|
||
5CD8028EC000
|
trusted library allocation
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
1D2E2CB0000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
83C8000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
10C000
|
stack
|
page read and write
|
||
47D3DFB000
|
stack
|
page read and write
|
||
1D2EA550000
|
trusted library section
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
341000
|
unkown
|
page readonly
|
||
47CA5FE000
|
unkown
|
page readonly
|
||
59B000874000
|
trusted library allocation
|
page read and write
|
||
5CD803108000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
59B000920000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
3C0000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
81AD000
|
heap
|
page read and write
|
||
5CD802A38000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
59B0006BC000
|
trusted library allocation
|
page read and write
|
||
5CD802D7C000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
5CD8031A8000
|
trusted library allocation
|
page read and write
|
||
1D2E4464000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
1D54000
|
heap
|
page read and write
|
||
59B000884000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
5CD800C01000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47D1DFE000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802F20000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
unkown
|
page execute and write copy
|
||
1D2E4AA6000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
77E0000
|
direct allocation
|
page execute and read and write
|
||
70F1000
|
heap
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802ED4000
|
trusted library allocation
|
page read and write
|
||
5CD802EF0000
|
trusted library allocation
|
page read and write
|
||
47D6DFD000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
841C000
|
heap
|
page read and write
|
||
5CD8032C8000
|
trusted library allocation
|
page read and write
|
||
47E45FE000
|
unkown
|
page readonly
|
||
80B0000
|
heap
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
5CD80250C000
|
trusted library allocation
|
page read and write
|
||
1D2E2CB3000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
80BD000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
5CD8025D0000
|
trusted library allocation
|
page read and write
|
||
82EC000
|
heap
|
page read and write
|
||
5CD803300000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
59B00085C000
|
trusted library allocation
|
page read and write
|
||
47D15FE000
|
unkown
|
page readonly
|
||
5CD80300C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
direct allocation
|
page read and write
|
||
1D2E69F3000
|
heap
|
page read and write
|
||
8447000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
47D4DFB000
|
stack
|
page read and write
|
||
5CD802410000
|
trusted library allocation
|
page read and write
|
||
1AC000270000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802F88000
|
trusted library allocation
|
page read and write
|
||
5CD802A8C000
|
trusted library allocation
|
page read and write
|
||
47BCDFE000
|
stack
|
page read and write
|
||
4430002AC000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47B8DFE000
|
stack
|
page read and write
|
||
5CD80298C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
5CD802B60000
|
trusted library allocation
|
page read and write
|
||
59B000248000
|
trusted library allocation
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
59B000948000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD802D24000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2EAEE7000
|
unclassified section
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
1D2E445A000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
5CD802F44000
|
trusted library allocation
|
page read and write
|
||
80B9000
|
heap
|
page read and write
|
||
5CD80250C000
|
trusted library allocation
|
page read and write
|
||
81C9000
|
heap
|
page read and write
|
||
1D2E4B50000
|
trusted library section
|
page read and write
|
||
1D2E4471000
|
heap
|
page read and write
|
||
5CD802DE4000
|
trusted library allocation
|
page read and write
|
||
59B0006AC000
|
trusted library allocation
|
page read and write
|
||
5CD8025A4000
|
trusted library allocation
|
page read and write
|
||
7CA6000
|
direct allocation
|
page read and write
|
||
5CD8031A8000
|
trusted library allocation
|
page read and write
|
||
1D2E4BE0000
|
trusted library section
|
page read and write
|
||
5CD8025C4000
|
trusted library allocation
|
page read and write
|
||
81FF000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
5CD802D94000
|
trusted library allocation
|
page read and write
|
||
5CD8032B8000
|
trusted library allocation
|
page read and write
|
||
59B00040C000
|
trusted library allocation
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
8266000
|
heap
|
page read and write
|
||
47D65FE000
|
unkown
|
page readonly
|
||
59B0007C0000
|
trusted library allocation
|
page read and write
|
||
443000284000
|
direct allocation
|
page read and write
|
||
80B5000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
47B95FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E38000
|
trusted library allocation
|
page read and write
|
||
59B000844000
|
trusted library allocation
|
page read and write
|
||
59B000818000
|
trusted library allocation
|
page read and write
|
||
59B00087C000
|
trusted library allocation
|
page read and write
|
||
3BE000
|
unkown
|
page read and write
|
||
47D8DFD000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
59B000288000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E1C000
|
trusted library allocation
|
page read and write
|
||
5CD8023F0000
|
trusted library allocation
|
page read and write
|
||
443000201000
|
direct allocation
|
page read and write
|
||
5CD8030FC000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B00039C000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1D2E9250000
|
heap
|
page read and write
|
||
5CD802B7B000
|
trusted library allocation
|
page read and write
|
||
5CD80242C000
|
trusted library allocation
|
page read and write
|
||
5CD8032F4000
|
trusted library allocation
|
page read and write
|
||
7931000
|
heap
|
page read and write
|
||
59B0002DC000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
F07000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47B85FE000
|
unkown
|
page readonly
|
||
59B0006E8000
|
trusted library allocation
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5CD801001000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD80257C000
|
trusted library allocation
|
page read and write
|
||
1D2E4ACB000
|
heap
|
page read and write
|
||
47C2DFE000
|
stack
|
page read and write
|
||
5CD8026F0000
|
trusted library allocation
|
page read and write
|
||
80B1000
|
heap
|
page read and write
|
||
5CD803370000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
1D2E4620000
|
heap
|
page read and write
|
||
8488000
|
heap
|
page read and write
|
||
59B00039C000
|
trusted library allocation
|
page read and write
|
||
47BBDFA000
|
stack
|
page read and write
|
||
1A6E000
|
stack
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802C9C000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5CD802DC8000
|
trusted library allocation
|
page read and write
|
||
59B0006C8000
|
trusted library allocation
|
page read and write
|
||
1D2E4440000
|
heap
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
1AC000274000
|
trusted library allocation
|
page read and write
|
||
1AC000250000
|
trusted library allocation
|
page read and write
|
||
1D2E4950000
|
trusted library section
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
59B000601000
|
trusted library allocation
|
page read and write
|
||
1D2EB2E0000
|
trusted library section
|
page read and write
|
||
816F000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803001000
|
trusted library allocation
|
page read and write
|
||
5CD802FEC000
|
trusted library allocation
|
page read and write
|
||
1D69000
|
heap
|
page read and write
|
||
47C3DFE000
|
stack
|
page read and write
|
||
47CFDFC000
|
stack
|
page read and write
|
||
5CD8001D4000
|
trusted library allocation
|
page read and write
|
||
1D2E0F60000
|
heap
|
page read and write
|
||
5CD8028C4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47E05FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8024CC000
|
trusted library allocation
|
page read and write
|
||
5CD802B54000
|
trusted library allocation
|
page read and write
|
||
6C90F000
|
unkown
|
page readonly
|
||
1D2E4A5F000
|
heap
|
page read and write
|
||
1D2E0E58000
|
heap
|
page read and write
|
||
59B000418000
|
trusted library allocation
|
page read and write
|
||
59B0006AC000
|
trusted library allocation
|
page read and write
|
||
5CD802734000
|
trusted library allocation
|
page read and write
|
||
5CD802570000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page write copy
|
||
47BDDFC000
|
stack
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
59B0008E4000
|
trusted library allocation
|
page read and write
|
||
5CD8025E0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1D2EAAB0000
|
trusted library section
|
page read and write
|
||
5CD802A0C000
|
trusted library allocation
|
page read and write
|
||
8239000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8388000
|
heap
|
page read and write
|
||
1D4D000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
1D2E0FB0000
|
trusted library allocation
|
page read and write
|
||
81DC000
|
heap
|
page read and write
|
||
5CD802F00000
|
trusted library allocation
|
page read and write
|
||
47DA5FE000
|
unkown
|
page readonly
|
||
5CD80229C000
|
trusted library allocation
|
page read and write
|
||
5CD802E4D000
|
trusted library allocation
|
page read and write
|
||
821E000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
81DF000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802858000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E6857000
|
unclassified section
|
page read and write
|
||
8142000
|
heap
|
page read and write
|
||
80BB000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
59B0007E4000
|
trusted library allocation
|
page read and write
|
||
5CD802CD4000
|
trusted library allocation
|
page read and write
|
||
80B2000
|
heap
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
EC0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
80B8000
|
heap
|
page read and write
|
||
59B00082C000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5CD802E5C000
|
trusted library allocation
|
page read and write
|
||
1D2E445E000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
47C1DFD000
|
stack
|
page read and write
|
||
83BF000
|
heap
|
page read and write
|
||
59B000830000
|
trusted library allocation
|
page read and write
|
||
59B0002B0000
|
trusted library allocation
|
page read and write
|
||
59B0007E0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
80B4000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
59B0007D4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803090000
|
trusted library allocation
|
page read and write
|
||
5CD802430000
|
trusted library allocation
|
page read and write
|
||
59B0006E8000
|
trusted library allocation
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
5CD8031B8000
|
trusted library allocation
|
page read and write
|
||
1D2EACD2000
|
trusted library section
|
page read and write
|
||
5CD802EF0000
|
trusted library allocation
|
page read and write
|
||
59B000974000
|
trusted library allocation
|
page read and write
|
||
59B00091C000
|
trusted library allocation
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
5CD802590000
|
trusted library allocation
|
page read and write
|
||
5CD8029AC000
|
trusted library allocation
|
page read and write
|
||
5CD8025E0000
|
trusted library allocation
|
page read and write
|
||
47B4DFD000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
8222000
|
heap
|
page read and write
|
||
5CD800E01000
|
trusted library allocation
|
page read and write
|
||
1589000
|
unkown
|
page execute and write copy
|
||
1D2E8C74000
|
heap
|
page read and write
|
||
443000290000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1AC0002A0000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD803108000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802601000
|
trusted library allocation
|
page read and write
|
||
5CD8032E4000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD80349C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802378000
|
trusted library allocation
|
page read and write
|
||
5CD80240C000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
5CD800201000
|
trusted library allocation
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4A00000
|
heap
|
page read and write
|
||
1D2E0FC0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8030C2000
|
trusted library allocation
|
page read and write
|
||
5CD8024F8000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
154F000
|
stack
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
341000
|
unkown
|
page readonly
|
||
1D2E8E62000
|
trusted library allocation
|
page read and write
|
||
5CD803114000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
821F000
|
heap
|
page read and write
|
||
80BA000
|
heap
|
page read and write
|
||
1AC0002F0000
|
trusted library allocation
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
59B000868000
|
trusted library allocation
|
page read and write
|
||
5CD80299C000
|
trusted library allocation
|
page read and write
|
||
5CD802D28000
|
trusted library allocation
|
page read and write
|
||
81B7000
|
heap
|
page read and write
|
||
5CD802434000
|
trusted library allocation
|
page read and write
|
||
1D2E0FF0000
|
trusted library section
|
page readonly
|
||
5CD802BE4000
|
trusted library allocation
|
page read and write
|
||
59B000220000
|
trusted library allocation
|
page read and write
|
||
59B00020C000
|
trusted library allocation
|
page read and write
|
||
12AF000
|
stack
|
page read and write
|
||
5CD802714000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD8027CC000
|
trusted library allocation
|
page read and write
|
||
5CD803380000
|
trusted library allocation
|
page read and write
|
||
1D2E1010000
|
heap
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
443000260000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
443000234000
|
direct allocation
|
page read and write
|
||
5CD802201000
|
trusted library allocation
|
page read and write
|
||
5CD802AC4000
|
trusted library allocation
|
page read and write
|
||
5CD80340C000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
59B00080C000
|
trusted library allocation
|
page read and write
|
||
1D46000
|
heap
|
page read and write
|
||
5CD8023F4000
|
trusted library allocation
|
page read and write
|
||
6C830000
|
unkown
|
page readonly
|
||
5CD802308000
|
trusted library allocation
|
page read and write
|
||
59B0008F0000
|
trusted library allocation
|
page read and write
|
||
5CD8025E0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8023BC000
|
trusted library allocation
|
page read and write
|
||
1D2E4463000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
134F000
|
stack
|
page read and write
|
||
1AC0002BC000
|
trusted library allocation
|
page read and write
|
||
1AC000288000
|
trusted library allocation
|
page read and write
|
||
5CD8024CC000
|
trusted library allocation
|
page read and write
|
||
5CD800C24000
|
trusted library allocation
|
page read and write
|
||
59B000890000
|
trusted library allocation
|
page read and write
|
||
5CD803201000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
59B00027C000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD8024AC000
|
trusted library allocation
|
page read and write
|
||
47DB5FE000
|
unkown
|
page readonly
|
||
1AC0002B0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E0C000
|
trusted library allocation
|
page read and write
|
||
5CD802EB4000
|
trusted library allocation
|
page read and write
|
||
1D2EA76E000
|
trusted library section
|
page read and write
|
||
1D2EAF27000
|
unclassified section
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47DCDFA000
|
stack
|
page read and write
|
||
5CD80259C000
|
trusted library allocation
|
page read and write
|
||
1D5C000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
819E000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
5CD8025B0000
|
trusted library allocation
|
page read and write
|
||
5CD8026A0000
|
trusted library allocation
|
page read and write
|
||
5CD8034AC000
|
trusted library allocation
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
5CD802E20000
|
trusted library allocation
|
page read and write
|
||
1D08000
|
heap
|
page read and write
|
||
5CD802A70000
|
trusted library allocation
|
page read and write
|
||
5CD8026FC000
|
trusted library allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
70F1000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
47DADFE000
|
stack
|
page read and write
|
||
47CE5FE000
|
unkown
|
page readonly
|
||
1AC0002F4000
|
trusted library allocation
|
page read and write
|
||
1D2EA762000
|
trusted library section
|
page read and write
|
||
5CD80315C000
|
trusted library allocation
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
8159000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
1AC0002C0000
|
trusted library allocation
|
page read and write
|
||
5CD802D8C000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5CD802EE8000
|
trusted library allocation
|
page read and write
|
||
7580000
|
direct allocation
|
page read and write
|
||
5CD802420000
|
trusted library allocation
|
page read and write
|
||
5CD802FD0000
|
trusted library allocation
|
page read and write
|
||
59B0008D8000
|
trusted library allocation
|
page read and write
|
||
5CD8023C8000
|
trusted library allocation
|
page read and write
|
||
5CD802A40000
|
trusted library allocation
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
5CD803108000
|
trusted library allocation
|
page read and write
|
||
1AC0002A0000
|
trusted library allocation
|
page read and write
|
||
5CD802554000
|
trusted library allocation
|
page read and write
|
||
5CD8027E8000
|
trusted library allocation
|
page read and write
|
||
5CD802E68000
|
trusted library allocation
|
page read and write
|
||
44300024C000
|
direct allocation
|
page read and write
|
||
59B000230000
|
trusted library allocation
|
page read and write
|
||
47DDDFC000
|
stack
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8399000
|
heap
|
page read and write
|
||
5CD802DF4000
|
trusted library allocation
|
page read and write
|
||
47C95FE000
|
unkown
|
page readonly
|
||
1D2E4AB2000
|
heap
|
page read and write
|
||
47E25FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8026A3000
|
trusted library allocation
|
page read and write
|
||
47B9DFD000
|
stack
|
page read and write
|
||
5CD8028E0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B00084C000
|
trusted library allocation
|
page read and write
|
||
8179000
|
heap
|
page read and write
|
||
47C4DFE000
|
stack
|
page read and write
|
||
1D2EA82D000
|
trusted library section
|
page read and write
|
||
80B7000
|
heap
|
page read and write
|
||
5CD802292000
|
trusted library allocation
|
page read and write
|
||
5CD80302C000
|
trusted library allocation
|
page read and write
|
||
47D0DFE000
|
stack
|
page read and write
|
||
5CD802E68000
|
trusted library allocation
|
page read and write
|
||
81D6000
|
heap
|
page read and write
|
||
47BA5FE000
|
unkown
|
page readonly
|
||
11FA000
|
unkown
|
page write copy
|
||
59B00081C000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802674000
|
trusted library allocation
|
page read and write
|
||
59B0008A8000
|
trusted library allocation
|
page read and write
|
||
5CD802EB4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD803108000
|
trusted library allocation
|
page read and write
|
||
5CD802BC4000
|
trusted library allocation
|
page read and write
|
||
47C75FE000
|
unkown
|
page readonly
|
||
1010000
|
heap
|
page read and write
|
||
794F000
|
heap
|
page read and write
|
||
6C959000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
142E000
|
stack
|
page read and write
|
||
5CD8023C8000
|
trusted library allocation
|
page read and write
|
||
1D63000
|
heap
|
page read and write
|
||
5CD8028FC000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47D45FE000
|
unkown
|
page readonly
|
||
5CD802570000
|
trusted library allocation
|
page read and write
|
||
5CD8031D4000
|
trusted library allocation
|
page read and write
|
||
47BEDFB000
|
stack
|
page read and write
|
||
1AC0002A0000
|
trusted library allocation
|
page read and write
|
||
5CD80335C000
|
trusted library allocation
|
page read and write
|
||
5CD802EDC000
|
trusted library allocation
|
page read and write
|
||
1D2E4A44000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8026A0000
|
trusted library allocation
|
page read and write
|
||
5CD803068000
|
trusted library allocation
|
page read and write
|
||
5CD802EA4000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E445A000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
47DC5FE000
|
unkown
|
page readonly
|
||
6C958000
|
unkown
|
page readonly
|
||
1D2E6900000
|
trusted library allocation
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD800CC2000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
59B000700000
|
trusted library allocation
|
page read and write
|
||
1D2E4471000
|
heap
|
page read and write
|
||
5CD80301C000
|
trusted library allocation
|
page read and write
|
||
59B000210000
|
trusted library allocation
|
page read and write
|
||
5CD8030F4000
|
trusted library allocation
|
page read and write
|
||
5CD8024B0000
|
trusted library allocation
|
page read and write
|
||
5CD8030C0000
|
trusted library allocation
|
page read and write
|
||
5CD800801000
|
trusted library allocation
|
page read and write
|
||
5CD80244C000
|
trusted library allocation
|
page read and write
|
||
5CD8022B8000
|
trusted library allocation
|
page read and write
|
||
5CD803264000
|
trusted library allocation
|
page read and write
|
||
59B00025C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD80243C000
|
trusted library allocation
|
page read and write
|
||
1D2E4AE5000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
59B000980000
|
trusted library allocation
|
page read and write
|
||
59B0002FC000
|
trusted library allocation
|
page read and write
|
||
1D2E4A35000
|
heap
|
page read and write
|
||
5CD802E1C000
|
trusted library allocation
|
page read and write
|
||
4430002A8000
|
direct allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802E58000
|
trusted library allocation
|
page read and write
|
||
5CD802C89000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
7810000
|
direct allocation
|
page execute and read and write
|
||
1D2EACC1000
|
trusted library section
|
page read and write
|
||
5CD8023C8000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1D2EA7C3000
|
trusted library section
|
page read and write
|
||
59B0008B4000
|
trusted library allocation
|
page read and write
|
||
59B0006F4000
|
trusted library allocation
|
page read and write
|
||
59B0008F4000
|
trusted library allocation
|
page read and write
|
||
5CD802C74000
|
trusted library allocation
|
page read and write
|
||
5CD8025E0000
|
trusted library allocation
|
page read and write
|
||
80BE000
|
heap
|
page read and write
|
||
81FE000
|
heap
|
page read and write
|
||
80B4000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
8204000
|
heap
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
59B0008B8000
|
trusted library allocation
|
page read and write
|
||
5CD80283C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4430000
|
heap
|
page read and write
|
||
33A000
|
unkown
|
page readonly
|
||
5CD8030B0000
|
trusted library allocation
|
page read and write
|
||
47D55FE000
|
unkown
|
page readonly
|
||
9A0000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
47D35FE000
|
unkown
|
page readonly
|
||
33E000
|
unkown
|
page write copy
|
||
1D2EAD10000
|
trusted library section
|
page read and write
|
||
5CD802328000
|
trusted library allocation
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
5CD80309C000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD802360000
|
trusted library allocation
|
page read and write
|
||
47DE5FE000
|
unkown
|
page readonly
|
||
70F1000
|
heap
|
page read and write
|
||
1D2E4790000
|
trusted library section
|
page read and write
|
||
5CD802F14000
|
trusted library allocation
|
page read and write
|
||
5CD8025A4000
|
trusted library allocation
|
page read and write
|
||
834D000
|
heap
|
page read and write
|
||
80BA000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000408000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8023B0000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
59B000840000
|
trusted library allocation
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5CD8024B2000
|
trusted library allocation
|
page read and write
|
||
59B00070C000
|
trusted library allocation
|
page read and write
|
||
5CD803038000
|
trusted library allocation
|
page read and write
|
||
5CD80240C000
|
trusted library allocation
|
page read and write
|
There are 1334 hidden memdumps, click here to show them.