Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SzXZZDlkVE.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SzXZZDlkVE.exe_21c5eb634ba7d98ffc51682d4d3de99864f54e2_d6aa8e09_1229cc53-5a86-4c93-b46e-8dedead03e2b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:51:46 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18B8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18F7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SzXZZDlkVE.exe
|
"C:\Users\user\Desktop\SzXZZDlkVE.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2204,i,6742422220409374108,9298232818822931570,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7320 -s 1844
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://chrome.google.com/webstorep
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
||
http://issuetracker.google.com/200067929
|
unknown
|
||
https://lens.google.com/v3/2
|
unknown
|
||
https://httpbin.org/ip
|
34.226.108.155
|
||
https://anglebug.com/7847
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.68
|
||
home.twentytk20ht.top
|
185.121.15.192
|
||
twentytk20ht.top
|
185.121.15.192
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.twentytk20ht.top
|
Spain
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
ProgramId
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
FileId
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
LongPathHash
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Name
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
OriginalFileName
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Publisher
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Version
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
BinFileVersion
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
BinaryType
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
ProductName
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
ProductVersion
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
LinkDate
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
BinProductVersion
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
AppxPackageFullName
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Size
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Language
|
||
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3E7000AFC000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
7D0400248000
|
trusted library allocation
|
page read and write
|
||
C011FFE000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
1604002CC000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
3E70001AC000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
C019FFC000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000384000
|
trusted library allocation
|
page read and write
|
||
6F01000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7D04002B0000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
3E7000708000
|
trusted library allocation
|
page read and write
|
||
160400688000
|
trusted library allocation
|
page read and write
|
||
7633000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400770000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
1604006D4000
|
trusted library allocation
|
page read and write
|
||
2326228E000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
3E70005C4000
|
trusted library allocation
|
page read and write
|
||
160400718000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604002B8000
|
trusted library allocation
|
page read and write
|
||
160400630000
|
trusted library allocation
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
23268E80000
|
trusted library section
|
page read and write
|
||
3E70002A8000
|
trusted library allocation
|
page read and write
|
||
C02D7FA000
|
stack
|
page read and write
|
||
3E7000001000
|
trusted library allocation
|
page read and write
|
||
16040080C000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
1604006AC000
|
trusted library allocation
|
page read and write
|
||
3E7000064000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E7000508000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23268B20000
|
trusted library section
|
page read and write
|
||
3E70006CC000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page write copy
|
||
160400714000
|
trusted library allocation
|
page read and write
|
||
C024FFB000
|
stack
|
page read and write
|
||
23261C87000
|
heap
|
page read and write
|
||
730A000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E7000A1C000
|
trusted library allocation
|
page read and write
|
||
3E7000D40000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
3E70001B4000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E7000C0C000
|
trusted library allocation
|
page read and write
|
||
3E70002EB000
|
trusted library allocation
|
page read and write
|
||
6C141000
|
unkown
|
page execute read
|
||
C016FFA000
|
stack
|
page read and write
|
||
2325E658000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E70005D8000
|
trusted library allocation
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
160400310000
|
trusted library allocation
|
page read and write
|
||
23262249000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0287FE000
|
unkown
|
page readonly
|
||
A35000
|
heap
|
page read and write
|
||
7631000
|
heap
|
page read and write
|
||
3E7000E20000
|
trusted library allocation
|
page read and write
|
||
72A6000
|
direct allocation
|
page read and write
|
||
1588002D0000
|
direct allocation
|
page read and write
|
||
23261C84000
|
heap
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
C0267FE000
|
unkown
|
page readonly
|
||
3E7000C2C000
|
trusted library allocation
|
page read and write
|
||
C01AFFE000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
3E700057C000
|
trusted library allocation
|
page read and write
|
||
7860000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3E70002E0000
|
trusted library allocation
|
page read and write
|
||
3E700056C000
|
trusted library allocation
|
page read and write
|
||
3E70004D0000
|
trusted library allocation
|
page read and write
|
||
7631000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
2325E6E9000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000E58000
|
trusted library allocation
|
page read and write
|
||
232681B0000
|
trusted library section
|
page read and write
|
||
160400610000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
6B80000
|
direct allocation
|
page read and write
|
||
23267FB7000
|
unclassified section
|
page read and write
|
||
C0187FE000
|
unkown
|
page readonly
|
||
CDF000
|
stack
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
3E7000B7C000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E7000AB4000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page read and write
|
||
3E7000EF8000
|
trusted library allocation
|
page read and write
|
||
3E7000DE0000
|
trusted library allocation
|
page read and write
|
||
3E7000DA8000
|
trusted library allocation
|
page read and write
|
||
3E7000E0C000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000C27000
|
trusted library allocation
|
page read and write
|
||
3E7000FA4000
|
trusted library allocation
|
page read and write
|
||
1ADF000
|
stack
|
page read and write
|
||
3E70008E4000
|
trusted library allocation
|
page read and write
|
||
7D04002B0000
|
trusted library allocation
|
page read and write
|
||
23268346000
|
trusted library section
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E7000C74000
|
trusted library allocation
|
page read and write
|
||
C03BFFE000
|
stack
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
3E7000558000
|
trusted library allocation
|
page read and write
|
||
160400694000
|
trusted library allocation
|
page read and write
|
||
232622E2000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2326225D000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
C0297FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
771E000
|
heap
|
page read and write
|
||
C00CFEF000
|
stack
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
C01BFFE000
|
stack
|
page read and write
|
||
3E7000D30000
|
trusted library allocation
|
page read and write
|
||
3E70001F8000
|
trusted library allocation
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000E01000
|
trusted library allocation
|
page read and write
|
||
160400320000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E700034C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000CC0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E7000E74000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70001B4000
|
trusted library allocation
|
page read and write
|
||
3E7000774000
|
trusted library allocation
|
page read and write
|
||
C03E7FE000
|
unkown
|
page readonly
|
||
C021FFE000
|
stack
|
page read and write
|
||
23261C9E000
|
heap
|
page read and write
|
||
3E7000878000
|
trusted library allocation
|
page read and write
|
||
23268987000
|
unclassified section
|
page read and write
|
||
3E70007A4000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
77BE000
|
heap
|
page read and write
|
||
16040075C000
|
trusted library allocation
|
page read and write
|
||
C0247FE000
|
unkown
|
page readonly
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
7D04002C0000
|
trusted library allocation
|
page read and write
|
||
C033FFD000
|
stack
|
page read and write
|
||
3E700040C000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
unkown
|
page execute and write copy
|
||
3E70009E0000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
783A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C03AFFC000
|
stack
|
page read and write
|
||
3E70002A4000
|
trusted library allocation
|
page read and write
|
||
3E7000980000
|
trusted library allocation
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
23261C9A000
|
heap
|
page read and write
|
||
763A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2325E930000
|
trusted library section
|
page readonly
|
||
23261C94000
|
heap
|
page read and write
|
||
C03DFFE000
|
stack
|
page read and write
|
||
3E7000D4C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000AB0000
|
trusted library allocation
|
page read and write
|
||
3E7000BA8000
|
trusted library allocation
|
page read and write
|
||
2325E6ED000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23268E8E000
|
trusted library section
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CC0000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
6F1F000
|
heap
|
page read and write
|
||
1604003EC000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
160400320000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
23261CAF000
|
heap
|
page read and write
|
||
77E9000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70001F4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7766000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E7000CD0000
|
trusted library allocation
|
page read and write
|
||
3E7000C88000
|
trusted library allocation
|
page read and write
|
||
3E7000F28000
|
trusted library allocation
|
page read and write
|
||
3E7000C1C000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
6701000
|
heap
|
page read and write
|
||
160400684000
|
trusted library allocation
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
788F000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
C0277FE000
|
unkown
|
page readonly
|
||
2326224D000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3E7000658000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
3E7000384000
|
trusted library allocation
|
page read and write
|
||
158800230000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
77B0000
|
heap
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
1604006B8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C012FFD000
|
stack
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E7000E8C000
|
trusted library allocation
|
page read and write
|
||
C030FFE000
|
stack
|
page read and write
|
||
3E7000EA8000
|
trusted library allocation
|
page read and write
|
||
160400698000
|
trusted library allocation
|
page read and write
|
||
3E70006F6000
|
trusted library allocation
|
page read and write
|
||
3E70007C0000
|
trusted library allocation
|
page read and write
|
||
3E7000F8C000
|
trusted library allocation
|
page read and write
|
||
C038FFA000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
3E7000F10000
|
trusted library allocation
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C020FFA000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400658000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
232622AC000
|
heap
|
page read and write
|
||
1604006FC000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23262288000
|
heap
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
3E7000CD0000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
160400368000
|
trusted library allocation
|
page read and write
|
||
7786000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604002F0000
|
trusted library allocation
|
page read and write
|
||
1C70000
|
heap
|
page read and write
|
||
3E7000370000
|
trusted library allocation
|
page read and write
|
||
3E700048C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7431000
|
heap
|
page read and write
|
||
3E7000EDC000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604002FC000
|
trusted library allocation
|
page read and write
|
||
3E700033C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
3E70005EC000
|
trusted library allocation
|
page read and write
|
||
3E700088C000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
7701000
|
heap
|
page read and write
|
||
7D0400220000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
7D04002C0000
|
trusted library allocation
|
page read and write
|
||
3E70001D8000
|
trusted library allocation
|
page read and write
|
||
3E70006C0000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C02E7FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
3E70001C4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70001A0000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
799F000
|
heap
|
page read and write
|
||
23268BE6000
|
trusted library section
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
7D0400250000
|
trusted library allocation
|
page read and write
|
||
3E7000F60000
|
trusted library allocation
|
page read and write
|
||
3E700000C000
|
trusted library allocation
|
page read and write
|
||
23261CC2000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7131000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
7D04002F0000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
77CF000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
2325E8A0000
|
trusted library allocation
|
page read and write
|
||
3E7000C50000
|
trusted library allocation
|
page read and write
|
||
160400374000
|
trusted library allocation
|
page read and write
|
||
23261F00000
|
heap
|
page read and write
|
||
3E7000C98000
|
trusted library allocation
|
page read and write
|
||
3E7000E20000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
3E7000601000
|
trusted library allocation
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
7D0400230000
|
trusted library allocation
|
page read and write
|
||
160400404000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000201000
|
trusted library allocation
|
page read and write
|
||
C01E7FE000
|
unkown
|
page readonly
|
||
3E700017C000
|
trusted library allocation
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
23268AD2000
|
trusted library section
|
page read and write
|
||
3E7000B70000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C02CFFE000
|
unkown
|
page readonly
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23262272000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000D04000
|
trusted library allocation
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
3E70007CC000
|
trusted library allocation
|
page read and write
|
||
7D04002F4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0107FE000
|
unkown
|
page readonly
|
||
23261C91000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7633000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
2326229B000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
160400330000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
3E7000E34000
|
trusted library allocation
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23262286000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7739000
|
heap
|
page read and write
|
||
1588002DC000
|
direct allocation
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
232622AC000
|
heap
|
page read and write
|
||
3E70001B4000
|
trusted library allocation
|
page read and write
|
||
3E7000F7C000
|
trusted library allocation
|
page read and write
|
||
C02A7FE000
|
unkown
|
page readonly
|
||
7D04002D8000
|
trusted library allocation
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
3E7000C22000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7638000
|
heap
|
page read and write
|
||
16040025C000
|
trusted library allocation
|
page read and write
|
||
23268180000
|
heap
|
page read and write
|
||
160400788000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
23261C96000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2325E955000
|
heap
|
page read and write
|
||
3E7000594000
|
trusted library allocation
|
page read and write
|
||
C023FFE000
|
stack
|
page read and write
|
||
158800215000
|
direct allocation
|
page read and write
|
||
78B6000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
763E000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000F98000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
160400354000
|
trusted library allocation
|
page read and write
|
||
7D0400294000
|
trusted library allocation
|
page read and write
|
||
7633000
|
heap
|
page read and write
|
||
3E700009B000
|
trusted library allocation
|
page read and write
|
||
3E70002B4000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
C0137FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
C00DFFE000
|
unkown
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
3E7000384000
|
trusted library allocation
|
page read and write
|
||
23262282000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C01B7FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6F72000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70006B0000
|
trusted library allocation
|
page read and write
|
||
1604006E0000
|
trusted library allocation
|
page read and write
|
||
7232000
|
heap
|
page read and write
|
||
2326229B000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D0400264000
|
trusted library allocation
|
page read and write
|
||
160400624000
|
trusted library allocation
|
page read and write
|
||
77FC000
|
heap
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
7D04002A0000
|
trusted library allocation
|
page read and write
|
||
232622C5000
|
heap
|
page read and write
|
||
3E700033C000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70001D4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400288000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E700029E000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000A64000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000F60000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
direct allocation
|
page execute and read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3E70001DC000
|
trusted library allocation
|
page read and write
|
||
3E7000358000
|
trusted library allocation
|
page read and write
|
||
C034FFC000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70009B4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
76E3000
|
heap
|
page read and write
|
||
3E7000918000
|
trusted library allocation
|
page read and write
|
||
23262282000
|
heap
|
page read and write
|
||
7712000
|
heap
|
page read and write
|
||
6DC0000
|
direct allocation
|
page execute and read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
3E7000801000
|
trusted library allocation
|
page read and write
|
||
1604006D0000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
3E7000C01000
|
trusted library allocation
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
3E700015C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400744000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70008F8000
|
trusted library allocation
|
page read and write
|
||
3E7000B1C000
|
trusted library allocation
|
page read and write
|
||
3E70001E0000
|
trusted library allocation
|
page read and write
|
||
232644D0000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
158800217000
|
direct allocation
|
page read and write
|
||
3E70003AC000
|
trusted library allocation
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
3E70000DC000
|
trusted library allocation
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
763C000
|
heap
|
page read and write
|
||
77E2000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400678000
|
trusted library allocation
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
23268AC0000
|
trusted library section
|
page read and write
|
||
7631000
|
heap
|
page read and write
|
||
3E7000298000
|
trusted library allocation
|
page read and write
|
||
772C000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
3E7000B70000
|
trusted library allocation
|
page read and write
|
||
23261C60000
|
heap
|
page read and write
|
||
7639000
|
heap
|
page read and write
|
||
7D0400260000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23265FA4000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
160400401000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
1604006C8000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
7634000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70003C8000
|
trusted library allocation
|
page read and write
|
||
16040027C000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page write copy
|
||
23268B43000
|
trusted library section
|
page read and write
|
||
3E7000118000
|
trusted library allocation
|
page read and write
|
||
3E7000C78000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2326228E000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E7000F90000
|
trusted library allocation
|
page read and write
|
||
3E7000401000
|
trusted library allocation
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
A9B000
|
heap
|
page read and write
|
||
232622C0000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
3E7000D14000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
2326228A000
|
heap
|
page read and write
|
||
160400620000
|
trusted library allocation
|
page read and write
|
||
7D04002B0000
|
trusted library allocation
|
page read and write
|
||
3E700064C000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E7000230000
|
trusted library allocation
|
page read and write
|
||
C031FFE000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
74D000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400730000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C013FFB000
|
stack
|
page read and write
|
||
779C000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
C025FFD000
|
stack
|
page read and write
|
||
16B7000
|
heap
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000748000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
232623C0000
|
trusted library section
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70004EC000
|
trusted library allocation
|
page read and write
|
||
3E7000C68000
|
trusted library allocation
|
page read and write
|
||
7639000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
3E70008D0000
|
trusted library allocation
|
page read and write
|
||
160400310000
|
trusted library allocation
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
6C140000
|
unkown
|
page readonly
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70003A4000
|
trusted library allocation
|
page read and write
|
||
78A000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000228000
|
trusted library allocation
|
page read and write
|
||
3E7000E34000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
160400754000
|
trusted library allocation
|
page read and write
|
||
C0177FE000
|
unkown
|
page readonly
|
||
3E70000A4000
|
trusted library allocation
|
page read and write
|
||
1604007D0000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E70005A8000
|
trusted library allocation
|
page read and write
|
||
3E7000AC0000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page execute and read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C99000
|
heap
|
page read and write
|
||
158800234000
|
direct allocation
|
page read and write
|
||
782B000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E700081C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000EC4000
|
trusted library allocation
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
3E70003E8000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
3E7000E64000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70001E8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23262200000
|
heap
|
page read and write
|
||
C00E7FE000
|
unkown
|
page readonly
|
||
18DE000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2326228C000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E7000974000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA7000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
3E7000C18000
|
trusted library allocation
|
page read and write
|
||
C017FFB000
|
stack
|
page read and write
|
||
3E7000904000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000294000
|
trusted library allocation
|
page read and write
|
||
C03D7FE000
|
unkown
|
page readonly
|
||
23265F00000
|
trusted library section
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
797A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70002BB000
|
trusted library allocation
|
page read and write
|
||
C032FFD000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261CC0000
|
heap
|
page read and write
|
||
3E7000E28000
|
trusted library allocation
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
23268157000
|
unclassified section
|
page read and write
|
||
76D6000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
763A000
|
heap
|
page read and write
|
||
3E70001E4000
|
trusted library allocation
|
page read and write
|
||
76F4000
|
heap
|
page read and write
|
||
160400724000
|
trusted library allocation
|
page read and write
|
||
C03CFFE000
|
stack
|
page read and write
|
||
160400704000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E700027C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
232622BC000
|
heap
|
page read and write
|
||
7D04002C0000
|
trusted library allocation
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
C010FFE000
|
stack
|
page read and write
|
||
3E7000850000
|
trusted library allocation
|
page read and write
|
||
3E70008B4000
|
trusted library allocation
|
page read and write
|
||
3E7000AA0000
|
trusted library allocation
|
page read and write
|
||
3E70006A0000
|
trusted library allocation
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
3E700038C000
|
trusted library allocation
|
page read and write
|
||
3E70009E8000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
unkown
|
page read and write
|
||
3E700034C000
|
trusted library allocation
|
page read and write
|
||
C02BFFC000
|
stack
|
page read and write
|
||
23262286000
|
heap
|
page read and write
|
||
1604006B4000
|
trusted library allocation
|
page read and write
|
||
7D0400288000
|
trusted library allocation
|
page read and write
|
||
77AA000
|
heap
|
page read and write
|
||
7D04002C0000
|
trusted library allocation
|
page read and write
|
||
158800274000
|
direct allocation
|
page read and write
|
||
3E70006D4000
|
trusted library allocation
|
page read and write
|
||
158800210000
|
direct allocation
|
page read and write
|
||
3E70003C8000
|
trusted library allocation
|
page read and write
|
||
158800220000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000D94000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000898000
|
trusted library allocation
|
page read and write
|
||
EEC000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E70001F0000
|
trusted library allocation
|
page read and write
|
||
3E700033C000
|
trusted library allocation
|
page read and write
|
||
7D040020C000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
C0347FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
16040069C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
2325E890000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
2326227A000
|
heap
|
page read and write
|
||
3E7000214000
|
trusted library allocation
|
page read and write
|
||
C0367FE000
|
unkown
|
page readonly
|
||
7636000
|
heap
|
page read and write
|
||
14EA000
|
unkown
|
page write copy
|
||
6701000
|
heap
|
page read and write
|
||
763B000
|
heap
|
page read and write
|
||
3E7000C98000
|
trusted library allocation
|
page read and write
|
||
2326227A000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268780000
|
trusted library section
|
page read and write
|
||
3E70003B8000
|
trusted library allocation
|
page read and write
|
||
7D0400235000
|
trusted library allocation
|
page read and write
|
||
3E70003DC000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
160400601000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000FC8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E700080C000
|
trusted library allocation
|
page read and write
|
||
3E7000B30000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E70004E0000
|
trusted library allocation
|
page read and write
|
||
3E7000290000
|
trusted library allocation
|
page read and write
|
||
C0157FE000
|
unkown
|
page readonly
|
||
15A0000
|
heap
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
3E7000D38000
|
trusted library allocation
|
page read and write
|
||
7996000
|
heap
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
3E700014C000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000F6C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C01D7FE000
|
unkown
|
page readonly
|
||
16040035C000
|
trusted library allocation
|
page read and write
|
||
76F6000
|
heap
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
794D000
|
heap
|
page read and write
|
||
C036FFE000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0387FE000
|
unkown
|
page readonly
|
||
16040060C000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6C26C000
|
unkown
|
page readonly
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
C027FFC000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000034000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
3E7000480000
|
trusted library allocation
|
page read and write
|
||
3E700020C000
|
trusted library allocation
|
page read and write
|
||
23261CAF000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70002B4000
|
trusted library allocation
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
3E7000680000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E700029A000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
23261CA5000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268203000
|
trusted library section
|
page read and write
|
||
C03C7FE000
|
unkown
|
page readonly
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70004AC000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000928000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
2326226D000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
16040085C000
|
trusted library allocation
|
page read and write
|
||
3E70006E4000
|
trusted library allocation
|
page read and write
|
||
1604006E4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268C40000
|
trusted library section
|
page read and write
|
||
3E70002E3000
|
trusted library allocation
|
page read and write
|
||
7D0400201000
|
trusted library allocation
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
3E70001C8000
|
trusted library allocation
|
page read and write
|
||
3E7000C4C000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C00EFFF000
|
stack
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E70007BA000
|
trusted library allocation
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
23261CC0000
|
heap
|
page read and write
|
||
3E7000E80000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D0400274000
|
trusted library allocation
|
page read and write
|
||
2325E870000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
72A4000
|
direct allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
C0167FE000
|
unkown
|
page readonly
|
||
8A0000
|
heap
|
page read and write
|
||
3E7000A34000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
779B000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
158800294000
|
direct allocation
|
page read and write
|
||
3E7000A01000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23268C8E000
|
trusted library section
|
page read and write
|
||
160400750000
|
trusted library allocation
|
page read and write
|
||
23268C80000
|
trusted library section
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604007C8000
|
trusted library allocation
|
page read and write
|
||
160400210000
|
trusted library allocation
|
page read and write
|
||
3E7000184000
|
trusted library allocation
|
page read and write
|
||
15880024C000
|
direct allocation
|
page read and write
|
||
3E7000474000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
2325E70A000
|
heap
|
page read and write
|
||
763D000
|
heap
|
page read and write
|
||
C01FFFE000
|
unkown
|
page readonly
|
||
23261CA6000
|
heap
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23268183000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000E1C000
|
trusted library allocation
|
page read and write
|
||
C01F7FE000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
2325E705000
|
heap
|
page read and write
|
||
3E70001B4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page write copy
|
||
3E7000298000
|
trusted library allocation
|
page read and write
|
||
3E7000690000
|
trusted library allocation
|
page read and write
|
||
160400320000
|
trusted library allocation
|
page read and write
|
||
3E7000D64000
|
trusted library allocation
|
page read and write
|
||
3E700034C000
|
trusted library allocation
|
page read and write
|
||
160400348000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
158800201000
|
direct allocation
|
page read and write
|
||
3E7000728000
|
trusted library allocation
|
page read and write
|
||
3E7000B0C000
|
trusted library allocation
|
page read and write
|
||
232663F0000
|
heap
|
page read and write
|
||
77BC000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
C00FFFE000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
1604006F0000
|
trusted library allocation
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000848000
|
trusted library allocation
|
page read and write
|
||
3E700020C000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000294000
|
trusted library allocation
|
page read and write
|
||
16040035C000
|
trusted library allocation
|
page read and write
|
||
777B000
|
heap
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000DC0000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
15880020C000
|
direct allocation
|
page read and write
|
||
3E7000954000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1588002AC000
|
direct allocation
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
A27000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E70001EC000
|
trusted library allocation
|
page read and write
|
||
3E70001AC000
|
trusted library allocation
|
page read and write
|
||
3E7000EB4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000364000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E700034C000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
C01EFFE000
|
stack
|
page read and write
|
||
3E7000E18000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
232622ED000
|
heap
|
page read and write
|
||
1604002ED000
|
trusted library allocation
|
page read and write
|
||
3E70001D0000
|
trusted library allocation
|
page read and write
|
||
158800260000
|
direct allocation
|
page read and write
|
||
3E7000E40000
|
trusted library allocation
|
page read and write
|
||
160400614000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400248000
|
trusted library allocation
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
C026FFD000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0207FE000
|
unkown
|
page readonly
|
||
3E7000398000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0357FE000
|
unkown
|
page readonly
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E7000210000
|
trusted library allocation
|
page read and write
|
||
3E7000689000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
1604006EC000
|
trusted library allocation
|
page read and write
|
||
160400668000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E700046D000
|
trusted library allocation
|
page read and write
|
||
763F000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
7F4000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
C022FFE000
|
stack
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
160400700000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D0400238000
|
trusted library allocation
|
page read and write
|
||
3E7000398000
|
trusted library allocation
|
page read and write
|
||
3E700021C000
|
trusted library allocation
|
page read and write
|
||
C039FF4000
|
stack
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23262288000
|
heap
|
page read and write
|
||
3CA000
|
unkown
|
page readonly
|
||
3D1000
|
unkown
|
page readonly
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
158800284000
|
direct allocation
|
page read and write
|
||
3E700000C000
|
trusted library allocation
|
page read and write
|
||
3E7000224000
|
trusted library allocation
|
page read and write
|
||
232682A2000
|
trusted library section
|
page read and write
|
||
3E7000CA8000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
3E7000F04000
|
trusted library allocation
|
page read and write
|
||
C01CFFE000
|
stack
|
page read and write
|
||
C0327FE000
|
unkown
|
page readonly
|
||
23261C92000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
6701000
|
heap
|
page read and write
|
||
160400734000
|
trusted library allocation
|
page read and write
|
||
3E70000CC000
|
trusted library allocation
|
page read and write
|
||
7D04002E4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
14D0000
|
heap
|
page read and write
|
||
1588002E4000
|
direct allocation
|
page read and write
|
||
160400230000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
3E7000D20000
|
trusted library allocation
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261C70000
|
heap
|
page read and write
|
||
160400760000
|
trusted library allocation
|
page read and write
|
||
763B000
|
heap
|
page read and write
|
||
1604002D4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C02B7FE000
|
unkown
|
page readonly
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
C02C7FD000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000378000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
16040020C000
|
trusted library allocation
|
page read and write
|
||
2325E940000
|
heap
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000378000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6C268000
|
unkown
|
page readonly
|
||
C03B7FE000
|
unkown
|
page readonly
|
||
3E70003C8000
|
trusted library allocation
|
page read and write
|
||
7D0400270000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70002E0000
|
trusted library allocation
|
page read and write
|
||
1604002B0000
|
trusted library allocation
|
page read and write
|
||
9D3000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page write copy
|
||
160400364000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
C014FFB000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604006E8000
|
trusted library allocation
|
page read and write
|
||
7D0400278000
|
trusted library allocation
|
page read and write
|
||
160400654000
|
trusted library allocation
|
page read and write
|
||
160400784000
|
trusted library allocation
|
page read and write
|
||
1604002F4000
|
trusted library allocation
|
page read and write
|
||
3E7000220000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23262250000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
2325E950000
|
heap
|
page read and write
|
||
3E7000E4C000
|
trusted library allocation
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
7D04002A0000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268AA0000
|
trusted library section
|
page read and write
|
||
2325E667000
|
heap
|
page read and write
|
||
3E7000ECC000
|
trusted library allocation
|
page read and write
|
||
3E70006B6000
|
trusted library allocation
|
page read and write
|
||
771D000
|
heap
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
16040033C000
|
trusted library allocation
|
page read and write
|
||
160400758000
|
trusted library allocation
|
page read and write
|
||
232682AE000
|
trusted library section
|
page read and write
|
||
3E7000DAD000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268362000
|
trusted library section
|
page read and write
|
||
3E7000D6C000
|
trusted library allocation
|
page read and write
|
||
3E7000AE0000
|
trusted library allocation
|
page read and write
|
||
160400640000
|
trusted library allocation
|
page read and write
|
||
C03A7FE000
|
unkown
|
page readonly
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
160400238000
|
trusted library allocation
|
page read and write
|
||
3E7000A80000
|
trusted library allocation
|
page read and write
|
||
776B000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
3E70002F0000
|
trusted library allocation
|
page read and write
|
||
7726000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
160400201000
|
trusted library allocation
|
page read and write
|
||
3E7000CD8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
6F72000
|
heap
|
page read and write
|
||
774C000
|
heap
|
page read and write
|
||
6C269000
|
unkown
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
792C000
|
heap
|
page read and write
|
||
3E7000FD4000
|
trusted library allocation
|
page read and write
|
||
3E7000C3C000
|
trusted library allocation
|
page read and write
|
||
3E70009C4000
|
trusted library allocation
|
page read and write
|
||
23261C88000
|
heap
|
page read and write
|
||
23267FF7000
|
unclassified section
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D04002A0000
|
trusted library allocation
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
C0127FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
C0147FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
3E7000C58000
|
trusted library allocation
|
page read and write
|
||
C02AFFC000
|
stack
|
page read and write
|
||
7D04002C8000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3E7000020000
|
trusted library allocation
|
page read and write
|
||
3E70006FD000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
232681C2000
|
trusted library section
|
page read and write
|
||
3E7000BB8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
C0337FE000
|
unkown
|
page readonly
|
||
3E7000294000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
2325E650000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
2326836D000
|
trusted library section
|
page read and write
|
||
78E7000
|
heap
|
page read and write
|
||
1604006B0000
|
trusted library allocation
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
77D9000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23268303000
|
trusted library section
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
3E7000BB0000
|
trusted library allocation
|
page read and write
|
||
3E7000484000
|
trusted library allocation
|
page read and write
|
||
2325E943000
|
heap
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
79C4000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
158800270000
|
direct allocation
|
page read and write
|
||
A8E000
|
unkown
|
page read and write
|
||
763E000
|
heap
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
23268C02000
|
trusted library section
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
6F74000
|
heap
|
page read and write
|
||
3E700076C000
|
trusted library allocation
|
page read and write
|
||
1588002EC000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
15880023C000
|
direct allocation
|
page read and write
|
||
3E7000CE8000
|
trusted library allocation
|
page read and write
|
||
3E700016C000
|
trusted library allocation
|
page read and write
|
||
3E700060C000
|
trusted library allocation
|
page read and write
|
||
1604007B4000
|
trusted library allocation
|
page read and write
|
||
3E700007C000
|
trusted library allocation
|
page read and write
|
||
C0117FE000
|
unkown
|
page readonly
|
||
DC0000
|
unkown
|
page readonly
|
||
3E7000C64000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C01DFFE000
|
stack
|
page read and write
|
||
C0257FE000
|
unkown
|
page readonly
|
||
A35000
|
heap
|
page read and write
|
||
2326228C000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C018FFB000
|
stack
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E7000AF0000
|
trusted library allocation
|
page read and write
|
||
160400644000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
160400664000
|
trusted library allocation
|
page read and write
|
||
763E000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000134000
|
trusted library allocation
|
page read and write
|
||
C0377FE000
|
unkown
|
page readonly
|
||
160400430000
|
trusted library allocation
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
3E7000548000
|
trusted library allocation
|
page read and write
|
||
23261CC4000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000718000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
3E7000EE8000
|
trusted library allocation
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7908000
|
heap
|
page read and write
|
||
160400354000
|
trusted library allocation
|
page read and write
|
||
23261C91000
|
heap
|
page read and write
|
||
3E7000C1C000
|
trusted library allocation
|
page read and write
|
||
16040040C000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261CA7000
|
heap
|
page read and write
|
||
158800280000
|
direct allocation
|
page read and write
|
||
C02FFFE000
|
stack
|
page read and write
|
||
3E70001AC000
|
trusted library allocation
|
page read and write
|
||
232680D0000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E70007B0000
|
trusted library allocation
|
page read and write
|
||
2326228A000
|
heap
|
page read and write
|
||
23261CAA000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000DEC000
|
trusted library allocation
|
page read and write
|
||
16040078C000
|
trusted library allocation
|
page read and write
|
||
232681CE000
|
trusted library section
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E700033C000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
7E0000
|
direct allocation
|
page read and write
|
||
3E7000EDC000
|
trusted library allocation
|
page read and write
|
||
3E7000740000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C8A000
|
heap
|
page read and write
|
||
C0397FE000
|
unkown
|
page readonly
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
C01A7FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
3E7000E98000
|
trusted library allocation
|
page read and write
|
||
23268ADE000
|
trusted library section
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
2325E750000
|
heap
|
page read and write
|
||
1588002A8000
|
direct allocation
|
page read and write
|
||
3E7000B94000
|
trusted library allocation
|
page read and write
|
||
3E7000358000
|
trusted library allocation
|
page read and write
|
||
3E7000F6C000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
C0237FE000
|
unkown
|
page readonly
|
||
7F4000
|
heap
|
page read and write
|
||
C02EFFE000
|
stack
|
page read and write
|
||
3E7000194000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
C0217FE000
|
unkown
|
page readonly
|
||
76E7000
|
heap
|
page read and write
|
||
160400408000
|
trusted library allocation
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
23268580000
|
trusted library section
|
page read and write
|
||
232622BE000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
6701000
|
heap
|
page read and write
|
||
23260E80000
|
unkown
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
3E7000F38000
|
trusted library allocation
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
C0317FE000
|
unkown
|
page readonly
|
||
6701000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
7966000
|
heap
|
page read and write
|
||
76CA000
|
heap
|
page read and write
|
||
7633000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
158800290000
|
direct allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
23268AB1000
|
trusted library section
|
page read and write
|
||
3E7000C22000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70002C0000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
C015FFE000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
16040039C000
|
trusted library allocation
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3E7000618000
|
trusted library allocation
|
page read and write
|
||
3E70009F8000
|
trusted library allocation
|
page read and write
|
||
3E7000C94000
|
trusted library allocation
|
page read and write
|
||
C0307FE000
|
unkown
|
page readonly
|
||
23262190000
|
trusted library section
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
1604006CC000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
23261C8D000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23262271000
|
heap
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
C02F7FE000
|
unkown
|
page readonly
|
||
3E7000128000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
1604006C4000
|
trusted library allocation
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E7000E6F000
|
trusted library allocation
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
3E700022C000
|
trusted library allocation
|
page read and write
|
||
77BD000
|
heap
|
page read and write
|
||
C01C7FE000
|
unkown
|
page readonly
|
||
7632000
|
heap
|
page read and write
|
||
774F000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
23266404000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
3E70006CF000
|
trusted library allocation
|
page read and write
|
||
23266429000
|
heap
|
page read and write
|
||
7D04002BC000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
160400220000
|
trusted library allocation
|
page read and write
|
||
3E7000D84000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6C21F000
|
unkown
|
page readonly
|
||
1604002E4000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
3E7000FC8000
|
trusted library allocation
|
page read and write
|
||
3E7000CF8000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
763D000
|
heap
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
C02DFFE000
|
unkown
|
page readonly
|
||
C0227FE000
|
unkown
|
page readonly
|
||
23261CA5000
|
heap
|
page read and write
|
||
C029FFC000
|
stack
|
page read and write
|
||
3E7000218000
|
trusted library allocation
|
page read and write
|
||
6C21D000
|
unkown
|
page read and write
|
||
3E7000DD0000
|
trusted library allocation
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
789E000
|
heap
|
page read and write
|
||
C035FFE000
|
stack
|
page read and write
|
||
3E7000A40000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
77F3000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400320000
|
trusted library allocation
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
C028FFC000
|
stack
|
page read and write
|
||
160400390000
|
trusted library allocation
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
160400424000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
2325E721000
|
heap
|
page read and write
|
||
3E7000D78000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
direct allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
77AC000
|
heap
|
page read and write
|
||
1604007CC000
|
trusted library allocation
|
page read and write
|
||
3E700008D000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
775E000
|
heap
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
23268B31000
|
trusted library section
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
158800303000
|
direct allocation
|
page read and write
|
||
2325E840000
|
heap
|
page read and write
|
||
7773000
|
heap
|
page read and write
|
||
7A1F000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
158800250000
|
direct allocation
|
page read and write
|
||
7743000
|
heap
|
page read and write
|
||
3E70000EC000
|
trusted library allocation
|
page read and write
|
||
3E7000CD8000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
160400330000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000F20000
|
trusted library allocation
|
page read and write
|
||
3E700038C000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page readonly
|
||
160400250000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7D04002F8000
|
trusted library allocation
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
1872000
|
unkown
|
page execute and write copy
|
||
3E700075C000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
direct allocation
|
page execute and read and write
|
||
23261C8C000
|
heap
|
page read and write
|
||
160400418000
|
trusted library allocation
|
page read and write
|
||
C0197FE000
|
unkown
|
page readonly
|
||
23268C0D000
|
trusted library section
|
page read and write
|
||
160400248000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
7636000
|
heap
|
page read and write
|
||
23261C9A000
|
heap
|
page read and write
|
||
3E70007E4000
|
trusted library allocation
|
page read and write
|
||
3E7000CD0000
|
trusted library allocation
|
page read and write
|
||
C037FFE000
|
stack
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23265FC2000
|
trusted library allocation
|
page read and write
|
||
16040033C000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3E7000DB4000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
160400380000
|
trusted library allocation
|
page read and write
|
||
3E70004D7000
|
trusted library allocation
|
page read and write
|
||
23261C92000
|
heap
|
page read and write
|
||
23261CA5000
|
heap
|
page read and write
|
||
23261C9F000
|
heap
|
page read and write
|
||
85C000
|
stack
|
page read and write
|
||
23261CA2000
|
heap
|
page read and write
|
||
23261CA3000
|
heap
|
page read and write
|
||
7638000
|
heap
|
page read and write
|
||
3E7000A0C000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E70001AC000
|
trusted library allocation
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
23261C94000
|
heap
|
page read and write
|
||
7D04002C0000
|
trusted library allocation
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6F72000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23268290000
|
trusted library section
|
page read and write
|
||
76C0000
|
heap
|
page read and write
|
||
23261CA6000
|
heap
|
page read and write
|
||
23268B10000
|
trusted library section
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
3E7000638000
|
trusted library allocation
|
page read and write
|
||
3E7000469000
|
trusted library allocation
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
160400330000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
77DE000
|
heap
|
page read and write
|
||
3E7000070000
|
trusted library allocation
|
page read and write
|
||
23261C8D000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
23261CAF000
|
heap
|
page read and write
|
||
3E70003E8000
|
trusted library allocation
|
page read and write
|
||
2325E830000
|
heap
|
page readonly
|
||
3A0000
|
heap
|
page read and write
|
||
7D04002A0000
|
trusted library allocation
|
page read and write
|
||
23262244000
|
heap
|
page read and write
|
There are 1480 hidden memdumps, click here to show them.