Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nRYpZg6i5E.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRYpZg6i5E.exe_776dd69e5b18cac04e4ab92562c42e2fe474b38_68bbd28e_6135b24e-ebe4-4045-ad91-67a42a2a375e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BD9.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:44 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20AD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER210B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\nRYpZg6i5E.exe
|
"C:\Users\user\Desktop\nRYpZg6i5E.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2620 --field-trial-handle=2376,i,13757376621657589230,16986117785964679361,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 1812
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://home.twentytk20ht.top/TQIuuaqjNpwYjtUvFojm1734579850?argument=6Es4F8HJLlz9cVoX1735025759
|
185.121.15.192
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://anglebug.com/77243
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://chrome.google.com/webstoreFw9a61Y8=
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bF
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icoFO
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://www.google.com/async/newtab_b?7
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/70365
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://drive.google.com/mestampz
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.68
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
ProgramId
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
FileId
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
LowerCaseLongPath
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
LongPathHash
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Name
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
OriginalFileName
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Publisher
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Version
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
BinFileVersion
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
BinaryType
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
ProductName
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
ProductVersion
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
LinkDate
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
BinProductVersion
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
AppxPackageFullName
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Size
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Language
|
||
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
961000
|
unkown
|
page execute read
|
||
469000984000
|
trusted library allocation
|
page read and write
|
||
2108C683000
|
heap
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
469000E90000
|
trusted library allocation
|
page read and write
|
||
8D6CBFE000
|
stack
|
page read and write
|
||
469000E44000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
21093B12000
|
trusted library allocation
|
page read and write
|
||
210966D0000
|
trusted library section
|
page read and write
|
||
46900119C000
|
trusted library allocation
|
page read and write
|
||
469001018000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
7887000
|
heap
|
page read and write
|
||
8D09FFE000
|
stack
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
2108FFED000
|
heap
|
page read and write
|
||
8D06FFC000
|
stack
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
2108FA79000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00404000
|
trusted library allocation
|
page read and write
|
||
469000014000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690007E0000
|
trusted library allocation
|
page read and write
|
||
2108FA8B000
|
heap
|
page read and write
|
||
469000CBC000
|
trusted library allocation
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
46900040C000
|
trusted library allocation
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6BF1F000
|
unkown
|
page readonly
|
||
8D62BFC000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690004E0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900004D000
|
trusted library allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
12E8002A0000
|
trusted library allocation
|
page read and write
|
||
469000C30000
|
trusted library allocation
|
page read and write
|
||
6EF1000
|
heap
|
page read and write
|
||
7723000
|
heap
|
page read and write
|
||
1397000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
D70000
|
heap
|
page read and write
|
||
469000DAC000
|
trusted library allocation
|
page read and write
|
||
469000A0C000
|
trusted library allocation
|
page read and write
|
||
469000398000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00644000
|
trusted library allocation
|
page read and write
|
||
7A95000
|
heap
|
page read and write
|
||
8D067FE000
|
unkown
|
page readonly
|
||
21096670000
|
trusted library section
|
page read and write
|
||
2E800215000
|
direct allocation
|
page read and write
|
||
4690001D0000
|
trusted library allocation
|
page read and write
|
||
4690004A4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690004D0000
|
trusted library allocation
|
page read and write
|
||
8D66BFC000
|
stack
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
469000D40000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
12E8002C0000
|
trusted library allocation
|
page read and write
|
||
26AC00688000
|
trusted library allocation
|
page read and write
|
||
26AC00354000
|
trusted library allocation
|
page read and write
|
||
8D01FFE000
|
stack
|
page read and write
|
||
8D6F3FE000
|
unkown
|
page readonly
|
||
1530000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2108FFCC000
|
heap
|
page read and write
|
||
26AC006CC000
|
trusted library allocation
|
page read and write
|
||
8D793FE000
|
unkown
|
page readonly
|
||
26AC006D0000
|
trusted library allocation
|
page read and write
|
||
46900024C000
|
trusted library allocation
|
page read and write
|
||
469000040000
|
trusted library allocation
|
page read and write
|
||
469000EE4000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000228000
|
trusted library allocation
|
page read and write
|
||
469000E28000
|
trusted library allocation
|
page read and write
|
||
8D6B3FE000
|
unkown
|
page readonly
|
||
21092040000
|
trusted library allocation
|
page read and write
|
||
2108FEF4000
|
heap
|
page read and write
|
||
469000D94000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
26AC00220000
|
trusted library allocation
|
page read and write
|
||
26AC002F0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690012E0000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
469000398000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
8BC000
|
stack
|
page read and write
|
||
26AC00380000
|
trusted library allocation
|
page read and write
|
||
469000340000
|
trusted library allocation
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
12E8002D8000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
8D69BFE000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
26AC0040C000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
7A5B000
|
heap
|
page read and write
|
||
469000BD0000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
469001084000
|
trusted library allocation
|
page read and write
|
||
469000308000
|
trusted library allocation
|
page read and write
|
||
469000EB8000
|
trusted library allocation
|
page read and write
|
||
469000374000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
8D77BFC000
|
stack
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D703FE000
|
unkown
|
page readonly
|
||
26AC007D0000
|
trusted library allocation
|
page read and write
|
||
469000B28000
|
trusted library allocation
|
page read and write
|
||
469000288000
|
trusted library allocation
|
page read and write
|
||
469000F40000
|
trusted library allocation
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
2E800270000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000F60000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E800238000
|
trusted library allocation
|
page read and write
|
||
46900021C000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
96E000
|
unkown
|
page write copy
|
||
12E8002C8000
|
trusted library allocation
|
page read and write
|
||
26AC00730000
|
trusted library allocation
|
page read and write
|
||
26AC00658000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
21092050000
|
trusted library section
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
772A000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
4690000E4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002B0000
|
trusted library allocation
|
page read and write
|
||
8D7B3FE000
|
unkown
|
page readonly
|
||
8D76BFD000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E800274000
|
direct allocation
|
page read and write
|
||
26AC00788000
|
trusted library allocation
|
page read and write
|
||
4690001E0000
|
trusted library allocation
|
page read and write
|
||
4690002CC000
|
trusted library allocation
|
page read and write
|
||
469001001000
|
trusted library allocation
|
page read and write
|
||
2108FFDF000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7893000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
469000751000
|
trusted library allocation
|
page read and write
|
||
8D6A3FE000
|
unkown
|
page readonly
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000230000
|
trusted library allocation
|
page read and write
|
||
8D623FE000
|
unkown
|
page readonly
|
||
469000757000
|
trusted library allocation
|
page read and write
|
||
469001180000
|
trusted library allocation
|
page read and write
|
||
469000CCC000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000C54000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690004E0000
|
trusted library allocation
|
page read and write
|
||
4690001C8000
|
trusted library allocation
|
page read and write
|
||
2108C548000
|
heap
|
page read and write
|
||
469000A4C000
|
trusted library allocation
|
page read and write
|
||
2E800290000
|
direct allocation
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7A7E000
|
heap
|
page read and write
|
||
8D5FBFE000
|
stack
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
26AC00348000
|
trusted library allocation
|
page read and write
|
||
79FA000
|
heap
|
page read and write
|
||
781B000
|
heap
|
page read and write
|
||
21096796000
|
trusted library section
|
page read and write
|
||
78DE000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
469000EF4000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
66D1000
|
heap
|
page read and write
|
||
2E800217000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FA82000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000784000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
4690007C0000
|
trusted library allocation
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
7935000
|
heap
|
page read and write
|
||
8D04FFD000
|
stack
|
page read and write
|
||
12E8002B0000
|
trusted library allocation
|
page read and write
|
||
26AC00401000
|
trusted library allocation
|
page read and write
|
||
2108FA90000
|
heap
|
page read and write
|
||
4690006C4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469001201000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21095D7E000
|
trusted library section
|
page read and write
|
||
26AC006B0000
|
trusted library allocation
|
page read and write
|
||
26AC00684000
|
trusted library allocation
|
page read and write
|
||
469000C1C000
|
trusted library allocation
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
8D663FE000
|
unkown
|
page readonly
|
||
7723000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000FCC000
|
trusted library allocation
|
page read and write
|
||
4690006E8000
|
trusted library allocation
|
page read and write
|
||
469000C20000
|
trusted library allocation
|
page read and write
|
||
469000601000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
772D000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
8D7ABFD000
|
stack
|
page read and write
|
||
26AC00288000
|
trusted library allocation
|
page read and write
|
||
12E800270000
|
trusted library allocation
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000E38000
|
trusted library allocation
|
page read and write
|
||
26AC00784000
|
trusted library allocation
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000F1C000
|
trusted library allocation
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
2108FA82000
|
heap
|
page read and write
|
||
26AC00648000
|
trusted library allocation
|
page read and write
|
||
8D7BBFB000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002C0000
|
trusted library allocation
|
page read and write
|
||
26AC00678000
|
trusted library allocation
|
page read and write
|
||
7181000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
4690001E4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6BF69000
|
unkown
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
D9E000
|
stack
|
page read and write
|
||
6DB0000
|
direct allocation
|
page execute and read and write
|
||
26AC00430000
|
trusted library allocation
|
page read and write
|
||
469000234000
|
trusted library allocation
|
page read and write
|
||
469000BA0000
|
trusted library allocation
|
page read and write
|
||
8D713FE000
|
unkown
|
page readonly
|
||
26AC00330000
|
trusted library allocation
|
page read and write
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
21094000000
|
trusted library section
|
page read and write
|
||
469000178000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
2108FA50000
|
heap
|
page read and write
|
||
469000C90000
|
trusted library allocation
|
page read and write
|
||
4690002D3000
|
trusted library allocation
|
page read and write
|
||
4690001A8000
|
trusted library allocation
|
page read and write
|
||
4690009B4000
|
trusted library allocation
|
page read and write
|
||
469000244000
|
trusted library allocation
|
page read and write
|
||
469000B64000
|
trusted library allocation
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000EA4000
|
trusted library allocation
|
page read and write
|
||
469000E38000
|
trusted library allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
469000EE4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469001118000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
26AC00364000
|
trusted library allocation
|
page read and write
|
||
2108FF4E000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00620000
|
trusted library allocation
|
page read and write
|
||
4690001D0000
|
trusted library allocation
|
page read and write
|
||
8D78BFC000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00640000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
C4F000
|
stack
|
page read and write
|
||
8D5C3FE000
|
unkown
|
page readonly
|
||
8D07FFE000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
469000118000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
stack
|
page read and write
|
||
4690010A0000
|
trusted library allocation
|
page read and write
|
||
4690008E8000
|
trusted library allocation
|
page read and write
|
||
469000C70000
|
trusted library allocation
|
page read and write
|
||
2108C470000
|
heap
|
page readonly
|
||
96A000
|
unkown
|
page readonly
|
||
21095E32000
|
trusted library section
|
page read and write
|
||
4690009F0000
|
trusted library allocation
|
page read and write
|
||
4690012A0000
|
trusted library allocation
|
page read and write
|
||
2108FA90000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000E74000
|
trusted library allocation
|
page read and write
|
||
21095710000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
469000D14000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FFD3000
|
heap
|
page read and write
|
||
469000944000
|
trusted library allocation
|
page read and write
|
||
7723000
|
heap
|
page read and write
|
||
4690006DC000
|
trusted library allocation
|
page read and write
|
||
469000ECE000
|
trusted library allocation
|
page read and write
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
469000F50000
|
trusted library allocation
|
page read and write
|
||
8D7D3FE000
|
unkown
|
page readonly
|
||
26AC006FC000
|
trusted library allocation
|
page read and write
|
||
8D60BFD000
|
stack
|
page read and write
|
||
7276000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000828000
|
trusted library allocation
|
page read and write
|
||
4690006D4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
8D057FE000
|
unkown
|
page readonly
|
||
469000303000
|
trusted library allocation
|
page read and write
|
||
26AC00724000
|
trusted library allocation
|
page read and write
|
||
26AC00624000
|
trusted library allocation
|
page read and write
|
||
4690001BC000
|
trusted library allocation
|
page read and write
|
||
8D6C3FE000
|
unkown
|
page readonly
|
||
8E0000
|
heap
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
12E8002C0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
CD5000
|
unkown
|
page execute and write copy
|
||
66D1000
|
heap
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
4690000EC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
2E8002D0000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
78A9000
|
heap
|
page read and write
|
||
469000BC8000
|
trusted library allocation
|
page read and write
|
||
26AC002E4000
|
trusted library allocation
|
page read and write
|
||
2108C4D0000
|
trusted library allocation
|
page read and write
|
||
26AC00230000
|
trusted library allocation
|
page read and write
|
||
94A000
|
unkown
|
page write copy
|
||
718D000
|
heap
|
page read and write
|
||
469000E84000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2108FFA6000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00320000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
26AC0035C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690002F8000
|
trusted library allocation
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
469000C84000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00201000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
DFC000
|
stack
|
page read and write
|
||
8D5EBFE000
|
stack
|
page read and write
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
21095A67000
|
unclassified section
|
page read and write
|
||
8D5F3FE000
|
unkown
|
page readonly
|
||
2108FFE1000
|
heap
|
page read and write
|
||
469000CB8000
|
trusted library allocation
|
page read and write
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
7944000
|
heap
|
page read and write
|
||
26AC00754000
|
trusted library allocation
|
page read and write
|
||
469000C01000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690005B8000
|
trusted library allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
7521000
|
heap
|
page read and write
|
||
469000328000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000E38000
|
trusted library allocation
|
page read and write
|
||
469000160000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
960000
|
unkown
|
page readonly
|
||
46900035C000
|
trusted library allocation
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
469000348000
|
trusted library allocation
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
2108C540000
|
heap
|
page read and write
|
||
77CA000
|
heap
|
page read and write
|
||
469000F6C000
|
trusted library allocation
|
page read and write
|
||
7840000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
8D5CBFF000
|
stack
|
page read and write
|
||
8D65BFB000
|
stack
|
page read and write
|
||
4690004CA000
|
trusted library allocation
|
page read and write
|
||
469000348000
|
trusted library allocation
|
page read and write
|
||
77DF000
|
heap
|
page read and write
|
||
2108FF27000
|
heap
|
page read and write
|
||
26AC00250000
|
trusted library allocation
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
2E800210000
|
direct allocation
|
page read and write
|
||
21096682000
|
trusted library section
|
page read and write
|
||
EB7000
|
heap
|
page read and write
|
||
46900060C000
|
trusted library allocation
|
page read and write
|
||
8D75BFC000
|
stack
|
page read and write
|
||
8D7A3FE000
|
unkown
|
page readonly
|
||
469000938000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC0075C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4690005CC000
|
trusted library allocation
|
page read and write
|
||
4690007BC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000224000
|
trusted library allocation
|
page read and write
|
||
469000D50000
|
trusted library allocation
|
page read and write
|
||
2108C680000
|
heap
|
page read and write
|
||
7AB0000
|
heap
|
page read and write
|
||
6BF6C000
|
unkown
|
page readonly
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
2109645E000
|
trusted library section
|
page read and write
|
||
12E8002F0000
|
trusted library allocation
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
26AC006E8000
|
trusted library allocation
|
page read and write
|
||
26AC0035C000
|
trusted library allocation
|
page read and write
|
||
46900070D000
|
trusted library allocation
|
page read and write
|
||
26AC00700000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
220000
|
unkown
|
page readonly
|
||
210967B2000
|
trusted library section
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
6F72000
|
heap
|
page read and write
|
||
2108FA75000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900129C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC002B0000
|
trusted library allocation
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
469000888000
|
trusted library allocation
|
page read and write
|
||
2108FEF8000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
469000DA0000
|
trusted library allocation
|
page read and write
|
||
2108FFD5000
|
heap
|
page read and write
|
||
2108FFDB000
|
heap
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
469000C20000
|
trusted library allocation
|
page read and write
|
||
46900053C000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
8D03FFE000
|
stack
|
page read and write
|
||
26AC006C4000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002C0000
|
trusted library allocation
|
page read and write
|
||
4690001D0000
|
trusted library allocation
|
page read and write
|
||
46900067C000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00760000
|
trusted library allocation
|
page read and write
|
||
8D017FE000
|
unkown
|
page readonly
|
||
12E8002E4000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
2E8002E4000
|
direct allocation
|
page read and write
|
||
21095DB3000
|
trusted library section
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
788C000
|
heap
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
786D000
|
heap
|
page read and write
|
||
2108FFB9000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
8D723FE000
|
unkown
|
page readonly
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
8D653FE000
|
unkown
|
page readonly
|
||
772D000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000F7C000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900035C000
|
trusted library allocation
|
page read and write
|
||
21096B50000
|
trusted library section
|
page read and write
|
||
469000ED2000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
8D7F3FE000
|
unkown
|
page readonly
|
||
9B0000
|
heap
|
page read and write
|
||
4690002B2000
|
trusted library allocation
|
page read and write
|
||
210968B0000
|
trusted library section
|
page read and write
|
||
78AB000
|
heap
|
page read and write
|
||
469000AC8000
|
trusted library allocation
|
page read and write
|
||
26AC00238000
|
trusted library allocation
|
page read and write
|
||
77D3000
|
heap
|
page read and write
|
||
2108FF52000
|
heap
|
page read and write
|
||
8D693FE000
|
unkown
|
page readonly
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
469000090000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
96E000
|
unkown
|
page read and write
|
||
2108C390000
|
heap
|
page read and write
|
||
6F12000
|
heap
|
page read and write
|
||
469000A74000
|
trusted library allocation
|
page read and write
|
||
26AC003EC000
|
trusted library allocation
|
page read and write
|
||
46900040C000
|
trusted library allocation
|
page read and write
|
||
4690010F0000
|
trusted library allocation
|
page read and write
|
||
78B6000
|
heap
|
page read and write
|
||
2E8002EC000
|
direct allocation
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
2108C4E0000
|
trusted library allocation
|
page read and write
|
||
26AC00770000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2108C5FB000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
26AC007B4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900115C000
|
trusted library allocation
|
page read and write
|
||
469000EAC000
|
trusted library allocation
|
page read and write
|
||
21095E3D000
|
trusted library section
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
7723000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
26AC00354000
|
trusted library allocation
|
page read and write
|
||
469000BA0000
|
trusted library allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
26AC00614000
|
trusted library allocation
|
page read and write
|
||
8D783FE000
|
unkown
|
page readonly
|
||
21095C50000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
469000801000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
8D007FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
469000EE4000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469001118000
|
trusted library allocation
|
page read and write
|
||
7812000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
182F000
|
stack
|
page read and write
|
||
46900103C000
|
trusted library allocation
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
26AC007CC000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
26AC00320000
|
trusted library allocation
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
210966E1000
|
trusted library section
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
8D5DBFE000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
8D7FBFE000
|
stack
|
page read and write
|
||
8D5ABEF000
|
stack
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
2108C4B0000
|
heap
|
page read and write
|
||
2108FF18000
|
heap
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
8D633FE000
|
unkown
|
page readonly
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900120C000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
2E8002DC000
|
direct allocation
|
page read and write
|
||
8D6E3FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
4690008F8000
|
trusted library allocation
|
page read and write
|
||
2108FFCD000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000F50000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
11FC000
|
stack
|
page read and write
|
||
469000B50000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC002F4000
|
trusted library allocation
|
page read and write
|
||
469000638000
|
trusted library allocation
|
page read and write
|
||
7729000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900103C000
|
trusted library allocation
|
page read and write
|
||
2108C5E1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E800248000
|
trusted library allocation
|
page read and write
|
||
2108FF58000
|
heap
|
page read and write
|
||
469000D78000
|
trusted library allocation
|
page read and write
|
||
26AC002CC000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
469000FCC000
|
trusted library allocation
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
469000A3C000
|
trusted library allocation
|
page read and write
|
||
2108FFE1000
|
heap
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
7110000
|
direct allocation
|
page read and write
|
||
469000CD8000
|
trusted library allocation
|
page read and write
|
||
8D79BFB000
|
stack
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
2108C600000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7805000
|
heap
|
page read and write
|
||
4690000BA000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FA7D000
|
heap
|
page read and write
|
||
78DD000
|
heap
|
page read and write
|
||
2108FFDF000
|
heap
|
page read and write
|
||
77C7000
|
heap
|
page read and write
|
||
4690001E8000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
12E800260000
|
trusted library allocation
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
469000B04000
|
trusted library allocation
|
page read and write
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
2108C790000
|
heap
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
4690008D0000
|
trusted library allocation
|
page read and write
|
||
8D7E3FE000
|
unkown
|
page readonly
|
||
961000
|
unkown
|
page execute read
|
||
26AC006E0000
|
trusted library allocation
|
page read and write
|
||
26AC00368000
|
trusted library allocation
|
page read and write
|
||
469001194000
|
trusted library allocation
|
page read and write
|
||
12E800288000
|
trusted library allocation
|
page read and write
|
||
12E800278000
|
trusted library allocation
|
page read and write
|
||
2108FF1A000
|
heap
|
page read and write
|
||
79B0000
|
heap
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
2E800250000
|
direct allocation
|
page read and write
|
||
46900020C000
|
trusted library allocation
|
page read and write
|
||
26AC002D4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
2108FEF0000
|
heap
|
page read and write
|
||
3DC000
|
stack
|
page read and write
|
||
2108FF14000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7843000
|
heap
|
page read and write
|
||
4690008C3000
|
trusted library allocation
|
page read and write
|
||
12E800264000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
4690009C8000
|
trusted library allocation
|
page read and write
|
||
469000C4C000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
78F4000
|
heap
|
page read and write
|
||
2108FF16000
|
heap
|
page read and write
|
||
12E800235000
|
trusted library allocation
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900087C000
|
trusted library allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D64BFB000
|
stack
|
page read and write
|
||
21093EF0000
|
trusted library section
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
2108C795000
|
heap
|
page read and write
|
||
8D02FFE000
|
stack
|
page read and write
|
||
2E8002AC000
|
direct allocation
|
page read and write
|
||
8D71BFE000
|
stack
|
page read and write
|
||
210966C0000
|
trusted library section
|
page read and write
|
||
78B7000
|
heap
|
page read and write
|
||
8D037FE000
|
unkown
|
page readonly
|
||
4690002B6000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FA8A000
|
heap
|
page read and write
|
||
78DB000
|
heap
|
page read and write
|
||
21096450000
|
trusted library section
|
page read and write
|
||
26AC0069C000
|
trusted library allocation
|
page read and write
|
||
469000A68000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E800280000
|
direct allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690012C4000
|
trusted library allocation
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
153A000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC0078C000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
8D7DBFD000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
26AC002B8000
|
trusted library allocation
|
page read and write
|
||
8D753FE000
|
unkown
|
page readonly
|
||
26AC0033C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002F8000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
4690012D4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21096240000
|
trusted library section
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
8D7C3FE000
|
unkown
|
page readonly
|
||
77FD000
|
heap
|
page read and write
|
||
26AC006B4000
|
trusted library allocation
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
46900104C000
|
trusted library allocation
|
page read and write
|
||
4690009E7000
|
trusted library allocation
|
page read and write
|
||
8D6FBFE000
|
stack
|
page read and write
|
||
21096650000
|
trusted library section
|
page read and write
|
||
26AC00744000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
2E800260000
|
direct allocation
|
page read and write
|
||
21095E70000
|
trusted library section
|
page read and write
|
||
26AC0033C000
|
trusted library allocation
|
page read and write
|
||
26AC00368000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000C7C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000238000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page execute and read and write
|
||
D78000
|
heap
|
page read and write
|
||
469000A84000
|
trusted library allocation
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
8D74BFC000
|
stack
|
page read and write
|
||
8D72BFB000
|
stack
|
page read and write
|
||
469000201000
|
trusted library allocation
|
page read and write
|
||
46900009C000
|
trusted library allocation
|
page read and write
|
||
21095A37000
|
unclassified section
|
page read and write
|
||
46900103C000
|
trusted library allocation
|
page read and write
|
||
4690002F8000
|
trusted library allocation
|
page read and write
|
||
154C000
|
heap
|
page read and write
|
||
469001070000
|
trusted library allocation
|
page read and write
|
||
469000144000
|
trusted library allocation
|
page read and write
|
||
26AC00714000
|
trusted library allocation
|
page read and write
|
||
469000398000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC006D4000
|
trusted library allocation
|
page read and write
|
||
8D63BFE000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
26AC00694000
|
trusted library allocation
|
page read and write
|
||
4690001D0000
|
trusted library allocation
|
page read and write
|
||
77C6000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000C1C000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
46900075C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
469000ECC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
78AB000
|
heap
|
page read and write
|
||
2E800294000
|
direct allocation
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
2E800234000
|
direct allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
152E000
|
heap
|
page read and write
|
||
469000198000
|
trusted library allocation
|
page read and write
|
||
469000BAC000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
4690012A4000
|
trusted library allocation
|
page read and write
|
||
8D6EBFE000
|
stack
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
12E8002A0000
|
trusted library allocation
|
page read and write
|
||
469000E38000
|
trusted library allocation
|
page read and write
|
||
26AC00720000
|
trusted library allocation
|
page read and write
|
||
469000CAC000
|
trusted library allocation
|
page read and write
|
||
469000E50000
|
trusted library allocation
|
page read and write
|
||
469000794000
|
trusted library allocation
|
page read and write
|
||
8D73BFD000
|
stack
|
page read and write
|
||
2108FF12000
|
heap
|
page read and write
|
||
4690004E0000
|
trusted library allocation
|
page read and write
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
469000388000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
961000
|
unkown
|
page execute read
|
||
8D61BFA000
|
stack
|
page read and write
|
||
26AC002FC000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
4690000C0000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
469000F00000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FFD3000
|
heap
|
page read and write
|
||
26AC00310000
|
trusted library allocation
|
page read and write
|
||
9BC000
|
stack
|
page read and write
|
||
7887000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
26AC006C8000
|
trusted library allocation
|
page read and write
|
||
26AC006B8000
|
trusted library allocation
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900114C000
|
trusted library allocation
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
12E8002A0000
|
trusted library allocation
|
page read and write
|
||
469000928000
|
trusted library allocation
|
page read and write
|
||
469000220000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690012B0000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
46900089C000
|
trusted library allocation
|
page read and write
|
||
21095C53000
|
heap
|
page read and write
|
||
2E800284000
|
direct allocation
|
page read and write
|
||
7728000
|
heap
|
page read and write
|
||
8D027FE000
|
unkown
|
page readonly
|
||
7274000
|
direct allocation
|
page read and write
|
||
469000F6C000
|
trusted library allocation
|
page read and write
|
||
469000E01000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
772C000
|
heap
|
page read and write
|
||
B8A000
|
stack
|
page read and write
|
||
26AC00390000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
4690010F8000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page execute and write copy
|
||
66D1000
|
heap
|
page read and write
|
||
469000154000
|
trusted library allocation
|
page read and write
|
||
2108FF0E000
|
heap
|
page read and write
|
||
2E800201000
|
direct allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
96A000
|
unkown
|
page readonly
|
||
469000CE4000
|
trusted library allocation
|
page read and write
|
||
4690004E8000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
2108FA83000
|
heap
|
page read and write
|
||
4690007F0000
|
trusted library allocation
|
page read and write
|
||
2108FF06000
|
heap
|
page read and write
|
||
469000F2C000
|
trusted library allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
77FE000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
783D000
|
heap
|
page read and write
|
||
469000B60000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E800303000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
12E800220000
|
trusted library allocation
|
page read and write
|
||
7895000
|
heap
|
page read and write
|
||
26AC00750000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page execute and write copy
|
||
469000E68000
|
trusted library allocation
|
page read and write
|
||
469000E38000
|
trusted library allocation
|
page read and write
|
||
469000548000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00630000
|
trusted library allocation
|
page read and write
|
||
4690001F8000
|
trusted library allocation
|
page read and write
|
||
26AC00424000
|
trusted library allocation
|
page read and write
|
||
46900000C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
F37000
|
heap
|
page read and write
|
||
772B000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000354000
|
trusted library allocation
|
page read and write
|
||
469000888000
|
trusted library allocation
|
page read and write
|
||
4690005DC000
|
trusted library allocation
|
page read and write
|
||
78F9000
|
heap
|
page read and write
|
||
469000D58000
|
trusted library allocation
|
page read and write
|
||
7865000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D047FE000
|
unkown
|
page readonly
|
||
7864000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
2108C510000
|
trusted library section
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
2108C606000
|
heap
|
page read and write
|
||
469000D30000
|
trusted library allocation
|
page read and write
|
||
26AC00408000
|
trusted library allocation
|
page read and write
|
||
469001070000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
4690004E0000
|
trusted library allocation
|
page read and write
|
||
7A9F000
|
heap
|
page read and write
|
||
46900020C000
|
trusted library allocation
|
page read and write
|
||
469000AAC000
|
trusted library allocation
|
page read and write
|
||
2108FFDB000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
8D5BBFD000
|
unkown
|
page read and write
|
||
469000708000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
77CC000
|
heap
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
4690004E0000
|
trusted library allocation
|
page read and write
|
||
469001100000
|
trusted library allocation
|
page read and write
|
||
210967F0000
|
trusted library section
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000F10000
|
trusted library allocation
|
page read and write
|
||
8D68BFE000
|
stack
|
page read and write
|
||
469000888000
|
trusted library allocation
|
page read and write
|
||
8D0A7FE000
|
unkown
|
page readonly
|
||
E00000
|
heap
|
page read and write
|
||
469000DB8000
|
trusted library allocation
|
page read and write
|
||
469000C7C000
|
trusted library allocation
|
page read and write
|
||
469000D04000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
7919000
|
heap
|
page read and write
|
||
2108FA83000
|
heap
|
page read and write
|
||
8D70BFE000
|
stack
|
page read and write
|
||
469000718000
|
trusted library allocation
|
page read and write
|
||
26AC00668000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
26AC00310000
|
trusted library allocation
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
8D6DBFA000
|
stack
|
page read and write
|
||
782C000
|
heap
|
page read and write
|
||
6BE41000
|
unkown
|
page execute read
|
||
66D1000
|
heap
|
page read and write
|
||
8D00FFD000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000D6C000
|
trusted library allocation
|
page read and write
|
||
46900073C000
|
trusted library allocation
|
page read and write
|
||
46900104C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FA60000
|
heap
|
page read and write
|
||
469000A01000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000779000
|
trusted library allocation
|
page read and write
|
||
469000454000
|
trusted library allocation
|
page read and write
|
||
4690007B9000
|
trusted library allocation
|
page read and write
|
||
797D000
|
heap
|
page read and write
|
||
469000EC4000
|
trusted library allocation
|
page read and write
|
||
469000994000
|
trusted library allocation
|
page read and write
|
||
8D05FFA000
|
stack
|
page read and write
|
||
8D5E3FE000
|
unkown
|
page readonly
|
||
26AC00248000
|
trusted library allocation
|
page read and write
|
||
4690004B4000
|
trusted library allocation
|
page read and write
|
||
21095BB0000
|
heap
|
page read and write
|
||
8D6D3FE000
|
unkown
|
page readonly
|
||
469000F38000
|
trusted library allocation
|
page read and write
|
||
469000EE4000
|
trusted library allocation
|
page read and write
|
||
2108FFA8000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D08FFE000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000250000
|
trusted library allocation
|
page read and write
|
||
6BF1D000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900069C000
|
trusted library allocation
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
469000C9C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000F50000
|
trusted library allocation
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690003AC000
|
trusted library allocation
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
46900100C000
|
trusted library allocation
|
page read and write
|
||
469000FAC000
|
trusted library allocation
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21094097000
|
unclassified section
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D643FE000
|
unkown
|
page readonly
|
||
8D6ABFE000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000218000
|
trusted library allocation
|
page read and write
|
||
718A000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FFDF000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
772E000
|
heap
|
page read and write
|
||
4690002D8000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E800230000
|
direct allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
7863000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900061C000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
469000248000
|
trusted library allocation
|
page read and write
|
||
8D603FE000
|
unkown
|
page readonly
|
||
469000A24000
|
trusted library allocation
|
page read and write
|
||
8D077FE000
|
unkown
|
page readonly
|
||
46900031C000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
26AC0025C000
|
trusted library allocation
|
page read and write
|
||
469000401000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D743FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
2108C650000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
8D773FE000
|
unkown
|
page readonly
|
||
469000D88000
|
trusted library allocation
|
page read and write
|
||
7800000
|
heap
|
page read and write
|
||
469001058000
|
trusted library allocation
|
page read and write
|
||
469000FA0000
|
trusted library allocation
|
page read and write
|
||
26AC00704000
|
trusted library allocation
|
page read and write
|
||
4690012B8000
|
trusted library allocation
|
page read and write
|
||
77E6000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000B14000
|
trusted library allocation
|
page read and write
|
||
7726000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
469000001000
|
trusted library allocation
|
page read and write
|
||
772C000
|
heap
|
page read and write
|
||
B4D000
|
stack
|
page read and write
|
||
8D087FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000D98000
|
trusted library allocation
|
page read and write
|
||
46900035C000
|
trusted library allocation
|
page read and write
|
||
26AC00610000
|
trusted library allocation
|
page read and write
|
||
7829000
|
heap
|
page read and write
|
||
26AC00330000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
8D673FE000
|
unkown
|
page readonly
|
||
469000874000
|
trusted library allocation
|
page read and write
|
||
12E80020C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21096877000
|
unclassified section
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000108000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
26AC00698000
|
trusted library allocation
|
page read and write
|
||
78B6000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
469000128000
|
trusted library allocation
|
page read and write
|
||
26AC00601000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000BD8000
|
trusted library allocation
|
page read and write
|
||
4690002D0000
|
trusted library allocation
|
page read and write
|
||
469000F8C000
|
trusted library allocation
|
page read and write
|
||
26AC002ED000
|
trusted library allocation
|
page read and write
|
||
26AC006AC000
|
trusted library allocation
|
page read and write
|
||
469000188000
|
trusted library allocation
|
page read and write
|
||
26AC0060C000
|
trusted library allocation
|
page read and write
|
||
2108FF98000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
469000518000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
971000
|
unkown
|
page readonly
|
||
469000398000
|
trusted library allocation
|
page read and write
|
||
4690001B4000
|
trusted library allocation
|
page read and write
|
||
153E000
|
heap
|
page read and write
|
||
469000214000
|
trusted library allocation
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
21095F27000
|
unclassified section
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21095C60000
|
trusted library section
|
page read and write
|
||
14E9000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
469000554000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
7847000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page write copy
|
||
961000
|
unkown
|
page execute read
|
||
F1E000
|
stack
|
page read and write
|
||
2108C635000
|
heap
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
4690001EC000
|
trusted library allocation
|
page read and write
|
||
26AC006EC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FF50000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469001090000
|
trusted library allocation
|
page read and write
|
||
971000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
8D733FE000
|
unkown
|
page readonly
|
||
2108C480000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
6B50000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
469000E18000
|
trusted library allocation
|
page read and write
|
||
469000BB4000
|
trusted library allocation
|
page read and write
|
||
210966F3000
|
trusted library section
|
page read and write
|
||
8D097FE000
|
unkown
|
page readonly
|
||
21096040000
|
trusted library section
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000ED8000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00320000
|
trusted library allocation
|
page read and write
|
||
12E8002F4000
|
trusted library allocation
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7A2B000
|
heap
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
26AC0027C000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
469000DE0000
|
trusted library allocation
|
page read and write
|
||
12E8002BC000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page readonly
|
||
2109572B000
|
heap
|
page read and write
|
||
2108FF02000
|
heap
|
page read and write
|
||
4690001C8000
|
trusted library allocation
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6BF68000
|
unkown
|
page readonly
|
||
1470000
|
direct allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
46900084C000
|
trusted library allocation
|
page read and write
|
||
2108FFAF000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
469001168000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC006F0000
|
trusted library allocation
|
page read and write
|
||
469000AEC000
|
trusted library allocation
|
page read and write
|
||
26AC007C8000
|
trusted library allocation
|
page read and write
|
||
2E80020C000
|
direct allocation
|
page read and write
|
||
7725000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690000B6000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
12E8002B0000
|
trusted library allocation
|
page read and write
|
||
46900023C000
|
trusted library allocation
|
page read and write
|
||
469000910000
|
trusted library allocation
|
page read and write
|
||
12E800294000
|
trusted library allocation
|
page read and write
|
||
469000F00000
|
trusted library allocation
|
page read and write
|
||
4690004E3000
|
trusted library allocation
|
page read and write
|
||
210968BE000
|
trusted library section
|
page read and write
|
||
4690002B0000
|
trusted library allocation
|
page read and write
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC006E4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900072C000
|
trusted library allocation
|
page read and write
|
||
469000334000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000C0C000
|
trusted library allocation
|
page read and write
|
||
8D683FE000
|
unkown
|
page readonly
|
||
4690007B4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690002B0000
|
trusted library allocation
|
page read and write
|
||
2E800220000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D7EBFD000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690008B0000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute read
|
||
66D1000
|
heap
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
26AC00330000
|
trusted library allocation
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12E800201000
|
trusted library allocation
|
page read and write
|
||
469000368000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00664000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
2108ECC0000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000240000
|
trusted library allocation
|
page read and write
|
||
469000D48000
|
trusted library allocation
|
page read and write
|
||
469000E84000
|
trusted library allocation
|
page read and write
|
||
2108C5E5000
|
heap
|
page read and write
|
||
210967BD000
|
trusted library section
|
page read and write
|
||
77E3000
|
heap
|
page read and write
|
||
4690004C8000
|
trusted library allocation
|
page read and write
|
||
12E800250000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4690010BC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000D24000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
8D7CBFE000
|
stack
|
page read and write
|
||
469000713000
|
trusted library allocation
|
page read and write
|
||
2109668E000
|
trusted library section
|
page read and write
|
||
26AC0020C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E8002A8000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
469000EE4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6F72000
|
heap
|
page read and write
|
||
469001124000
|
trusted library allocation
|
page read and write
|
||
2108FA74000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900037C000
|
trusted library allocation
|
page read and write
|
||
469000E5C000
|
trusted library allocation
|
page read and write
|
||
8D613FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
78CE000
|
heap
|
page read and write
|
||
26AC00418000
|
trusted library allocation
|
page read and write
|
||
46900080C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
6BE40000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
78D9000
|
heap
|
page read and write
|
||
469000A30000
|
trusted library allocation
|
page read and write
|
||
4690002BC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
46900064C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
2108C558000
|
heap
|
page read and write
|
||
26AC00248000
|
trusted library allocation
|
page read and write
|
||
2E80024C000
|
direct allocation
|
page read and write
|
||
4690000A8000
|
trusted library allocation
|
page read and write
|
||
21095D72000
|
trusted library section
|
page read and write
|
||
469000210000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
469001018000
|
trusted library allocation
|
page read and write
|
||
4690002AC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
26AC00374000
|
trusted library allocation
|
page read and write
|
||
4690004C4000
|
trusted library allocation
|
page read and write
|
||
12E8002C0000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
469000AF8000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
unkown
|
page read and write
|
||
26AC00734000
|
trusted library allocation
|
page read and write
|
||
469000FC4000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
unkown
|
page read and write
|
||
12E800230000
|
trusted library allocation
|
page read and write
|
||
46900022C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FA8F000
|
heap
|
page read and write
|
||
469000DC4000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
21095ED6000
|
trusted library section
|
page read and write
|
||
26AC0039C000
|
trusted library allocation
|
page read and write
|
||
26AC0080C000
|
trusted library allocation
|
page read and write
|
||
12E800274000
|
trusted library allocation
|
page read and write
|
||
469000E0C000
|
trusted library allocation
|
page read and write
|
||
795E000
|
heap
|
page read and write
|
||
46900095C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21096661000
|
trusted library section
|
page read and write
|
||
26AC00758000
|
trusted library allocation
|
page read and write
|
||
4690001C8000
|
trusted library allocation
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E80023C000
|
direct allocation
|
page read and write
|
||
469000CF4000
|
trusted library allocation
|
page read and write
|
||
2108FFE1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
4690005A8000
|
trusted library allocation
|
page read and write
|
||
26AC00210000
|
trusted library allocation
|
page read and write
|
||
78ED000
|
heap
|
page read and write
|
||
46900005C000
|
trusted library allocation
|
page read and write
|
||
2108FF56000
|
heap
|
page read and write
|
||
77BB000
|
heap
|
page read and write
|
||
12E8002A0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
21096B60000
|
trusted library section
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
8D6BBFD000
|
stack
|
page read and write
|
||
469000A5C000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2108FFC9000
|
heap
|
page read and write
|
||
4690005F4000
|
trusted library allocation
|
page read and write
|
||
8D67BFA000
|
stack
|
page read and write
|
||
772F000
|
heap
|
page read and write
|
||
26AC00320000
|
trusted library allocation
|
page read and write
|
||
8D763FE000
|
unkown
|
page readonly
|
There are 1347 hidden memdumps, click here to show them.