Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
WCeE1A6Xyz.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WCeE1A6Xyz.exe_e7e2522a7f8ca0b6d72c4dc44c61e22d561de4_30049ca6_8097d568-4abf-4061-8bf9-edbe858e74ad\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC42.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:52:20 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADE9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE57.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\0fe6fcd7-e6d8-4dd1-8b4c-0c03a1b60f4f.5454a7df-c3d0-4ab8-9367-1ac6ddca0f19.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\0fe6fcd7-e6d8-4dd1-8b4c-0c03a1b60f4f.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
24.4 (Windows), datetime=2023:05:13 18:14:04], baseline, precision 8, 1920x1080, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\221259af-84f1-4957-9af3-b81064ace3fc.3766cdc1-b4ae-44c6-8246-0658b3d99677.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\221259af-84f1-4957-9af3-b81064ace3fc.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\22d9e0cd-5ff9-4437-b472-9be962740a2c.5eb27f51-5751-4fc2-90f7-cee72b37a825.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\22d9e0cd-5ff9-4437-b472-9be962740a2c.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
24.4 (Windows), datetime=2023:05:13 18:14:38], baseline, precision 8, 1080x1920, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3ab48a70-5fcc-43c2-8f69-9defa5f64553.9bef7ed1-7d6a-426e-b8c4-1c2653cf916a.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3ab48a70-5fcc-43c2-8f69-9defa5f64553.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3de8abd4-bc4a-4a03-ba49-fdad2a9ef9ef.8708f345-944a-4b00-9fba-04138dd4f87a.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3de8abd4-bc4a-4a03-ba49-fdad2a9ef9ef.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
24.4 (Windows), datetime=2023:05:13 18:37:38], baseline, precision 8, 1080x1920, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\587ce4a3-e922-4b80-b8ee-345aca8a1540.5454a7df-c3d0-4ab8-9367-1ac6ddca0f19.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\587ce4a3-e922-4b80-b8ee-345aca8a1540.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5bb4cd59-5b52-49a4-a144-1aa6c8f5e72c.0de7df4b-4016-44cb-9873-58c0856c738f.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5bb4cd59-5b52-49a4-a144-1aa6c8f5e72c.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5fd426b9-3ac2-4899-b1f5-65d5fb3af5bc.9bef7ed1-7d6a-426e-b8c4-1c2653cf916a.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5fd426b9-3ac2-4899-b1f5-65d5fb3af5bc.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
24.4 (Windows), datetime=2023:05:13 18:37:11], baseline, precision 8, 1920x1080, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7bf64714-7ac4-4e15-89e7-68caaa54304c.5eb27f51-5751-4fc2-90f7-cee72b37a825.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7bf64714-7ac4-4e15-89e7-68caaa54304c.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\8653c9ab-0984-4097-880c-914f0a067609.8708f345-944a-4b00-9fba-04138dd4f87a.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\8653c9ab-0984-4097-880c-914f0a067609.up_meta_secure
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\9e4a9663-2f29-45c5-ab5f-ea42b51866f2.0de7df4b-4016-44cb-9873-58c0856c738f.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\9e4a9663-2f29-45c5-ab5f-ea42b51866f2.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
21.1 (Windows), datetime=2020:10:22 10:31:41], baseline, precision 8, 1080x1920, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\d9e0ec57-3074-4b2a-8ba4-90a088f69964.3766cdc1-b4ae-44c6-8246-0658b3d99677.down_meta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\d9e0ec57-3074-4b2a-8ba4-90a088f69964.down_data
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop
21.1 (Windows), datetime=2020:10:22 10:30:26], baseline, precision 8, 1920x1080, components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\WCeE1A6Xyz.exe
|
"C:\Users\user\Desktop\WCeE1A6Xyz.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2448 --field-trial-handle=2176,i,4166092667460423,2441331436335028329,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\BackgroundTransferHost.exe
|
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 1172
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
http://anglebug.com/3832;
|
unknown
|
||
https://anglebug.com/4966t
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239359955652_1UH15L5Z2LXM3P8PA&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
|
150.171.27.10
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsRun
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://anglebug.com/7488;
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://anglebug.com/7161gU3
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
http://anglebug.com/8229;
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
http://anglebug.com/4551;
|
unknown
|
||
http://anglebug.com/6439;
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
http://anglebug.com/7406d
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239359955652_1UH15L5Z2LXM3P8PA&pid=21.2&c=16&roil=0&roit=0&ro
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239400982061_1EHZVYH9FVJ5IHVOG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
http://anglebug.com/5421hwJ
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/8229e2
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5055;
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
|
150.171.27.10
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://issuetracker.google.com/issues/166475273e
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
http://anglebug.com/5881;
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/7047f
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0=
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
|
150.171.27.10
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivetk5sb.top
|
185.121.15.192
|
||
www.google.com
|
142.250.181.68
|
||
fivetk5sb.top
|
185.121.15.192
|
||
ax-0001.ax-msedge.net
|
150.171.27.10
|
||
httpbin.org
|
98.85.100.80
|
||
tse1.mm.bing.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.121.15.192
|
home.fivetk5sb.top
|
Spain
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
ProgramId
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
FileId
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
LowerCaseLongPath
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
LongPathHash
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Name
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
OriginalFileName
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Publisher
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Version
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
BinFileVersion
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
BinaryType
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
ProductName
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
ProductVersion
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
LinkDate
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
BinProductVersion
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
AppxPackageFullName
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Size
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Language
|
||
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10D402C5C000
|
trusted library allocation
|
page read and write
|
||
10D402401000
|
trusted library allocation
|
page read and write
|
||
10D402870000
|
trusted library allocation
|
page read and write
|
||
10D402E85000
|
trusted library allocation
|
page read and write
|
||
10D402B63000
|
trusted library allocation
|
page read and write
|
||
10D4023C4000
|
trusted library allocation
|
page read and write
|
||
632800274000
|
trusted library allocation
|
page read and write
|
||
10D402C20000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D4029D8000
|
trusted library allocation
|
page read and write
|
||
1DC17E85000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
10D4032B8000
|
trusted library allocation
|
page read and write
|
||
10D4034EC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17EB2000
|
heap
|
page read and write
|
||
75E1000
|
heap
|
page read and write
|
||
676B1FE000
|
unkown
|
page readonly
|
||
10D402418000
|
trusted library allocation
|
page read and write
|
||
78E1000
|
heap
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
7BD8000
|
heap
|
page read and write
|
||
10D402818000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
670B7FE000
|
unkown
|
page readonly
|
||
132800248000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1328002F4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67709FE000
|
stack
|
page read and write
|
||
1DC1BCE0000
|
heap
|
page read and write
|
||
676F9FE000
|
stack
|
page read and write
|
||
7A18000
|
heap
|
page read and write
|
||
10D402E0C000
|
trusted library allocation
|
page read and write
|
||
1DC1DF10000
|
trusted library section
|
page read and write
|
||
675E1FE000
|
unkown
|
page readonly
|
||
1328003EC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
1DC1BCD6000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
4AD400294000
|
direct allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
67619FE000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402990000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17E20000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC1DA02000
|
trusted library section
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
78E1000
|
heap
|
page read and write
|
||
1DC17E65000
|
heap
|
page read and write
|
||
675C9EF000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800664000
|
trusted library allocation
|
page read and write
|
||
4AD400270000
|
direct allocation
|
page read and write
|
||
132800238000
|
trusted library allocation
|
page read and write
|
||
10D403048000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
10D402801000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
13E000
|
stack
|
page read and write
|
||
AD3000
|
unkown
|
page execute and write copy
|
||
67037FE000
|
unkown
|
page readonly
|
||
6703FFD000
|
stack
|
page read and write
|
||
632800220000
|
trusted library allocation
|
page read and write
|
||
10D403440000
|
trusted library allocation
|
page read and write
|
||
10D4031BC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
632800288000
|
trusted library allocation
|
page read and write
|
||
675E9FE000
|
stack
|
page read and write
|
||
4AD400284000
|
direct allocation
|
page read and write
|
||
132800330000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D400601000
|
trusted library allocation
|
page read and write
|
||
10D403388000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6704FFE000
|
stack
|
page read and write
|
||
10D402CE0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
4AD400280000
|
direct allocation
|
page read and write
|
||
4AD4002EC000
|
direct allocation
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
7A8C000
|
heap
|
page read and write
|
||
10D40305C000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
307A000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D40340C000
|
trusted library allocation
|
page read and write
|
||
1328006D4000
|
trusted library allocation
|
page read and write
|
||
132800330000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4032A0000
|
trusted library allocation
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403078000
|
trusted library allocation
|
page read and write
|
||
10D402A01000
|
trusted library allocation
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402E01000
|
trusted library allocation
|
page read and write
|
||
67621FE000
|
unkown
|
page readonly
|
||
7A60000
|
heap
|
page read and write
|
||
10D402AB0000
|
trusted library allocation
|
page read and write
|
||
78E5000
|
heap
|
page read and write
|
||
10D402A54000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
7A6B000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
67711FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D403001000
|
trusted library allocation
|
page read and write
|
||
6C5C0000
|
unkown
|
page readonly
|
||
799D000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
94E000
|
stack
|
page read and write
|
||
10D402F74000
|
trusted library allocation
|
page read and write
|
||
10D40300C000
|
trusted library allocation
|
page read and write
|
||
13280020C000
|
trusted library allocation
|
page read and write
|
||
10D402F1C000
|
trusted library allocation
|
page read and write
|
||
10D402434000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6709FFC000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800694000
|
trusted library allocation
|
page read and write
|
||
67609FE000
|
stack
|
page read and write
|
||
10D403120000
|
trusted library allocation
|
page read and write
|
||
10D4024FC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7C4C000
|
heap
|
page read and write
|
||
1328006F0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17E61000
|
heap
|
page read and write
|
||
1DC17E75000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D40305C000
|
trusted library allocation
|
page read and write
|
||
10D402F04000
|
trusted library allocation
|
page read and write
|
||
1DC17EC1000
|
heap
|
page read and write
|
||
10D402778000
|
trusted library allocation
|
page read and write
|
||
67659FE000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4AD400210000
|
direct allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403234000
|
trusted library allocation
|
page read and write
|
||
10D402E24000
|
trusted library allocation
|
page read and write
|
||
10D402583000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC1431D000
|
heap
|
page read and write
|
||
10D402498000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
10D4028E0000
|
trusted library allocation
|
page read and write
|
||
13280035C000
|
trusted library allocation
|
page read and write
|
||
10D40237C000
|
trusted library allocation
|
page read and write
|
||
7A4C000
|
heap
|
page read and write
|
||
132800288000
|
trusted library allocation
|
page read and write
|
||
10D4029BC000
|
trusted library allocation
|
page read and write
|
||
78EF000
|
heap
|
page read and write
|
||
1DC14290000
|
heap
|
page read and write
|
||
1DC17E65000
|
heap
|
page read and write
|
||
67639FB000
|
stack
|
page read and write
|
||
4AD400220000
|
direct allocation
|
page read and write
|
||
10D402E74000
|
trusted library allocation
|
page read and write
|
||
10D40305C000
|
trusted library allocation
|
page read and write
|
||
10D402530000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
6328002A0000
|
trusted library allocation
|
page read and write
|
||
10D400001000
|
trusted library allocation
|
page read and write
|
||
10D4025A0000
|
trusted library allocation
|
page read and write
|
||
10D402420000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402B00000
|
trusted library allocation
|
page read and write
|
||
78E0000
|
heap
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
1DC1BC93000
|
heap
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
6705FFE000
|
stack
|
page read and write
|
||
10D402EB8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402D0C000
|
trusted library allocation
|
page read and write
|
||
132800430000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402630000
|
trusted library allocation
|
page read and write
|
||
670CFFE000
|
stack
|
page read and write
|
||
677F9FE000
|
stack
|
page read and write
|
||
18D7000
|
heap
|
page read and write
|
||
132800630000
|
trusted library allocation
|
page read and write
|
||
67799FD000
|
stack
|
page read and write
|
||
10D4030BC000
|
trusted library allocation
|
page read and write
|
||
677E1FE000
|
unkown
|
page readonly
|
||
1DC1DBF7000
|
unclassified section
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6DD0000
|
direct allocation
|
page read and write
|
||
10D402410000
|
trusted library allocation
|
page read and write
|
||
10D402F64000
|
trusted library allocation
|
page read and write
|
||
10D4026A4000
|
trusted library allocation
|
page read and write
|
||
67781FE000
|
unkown
|
page readonly
|
||
18C4000
|
heap
|
page read and write
|
||
1DC17EDB000
|
heap
|
page read and write
|
||
132800624000
|
trusted library allocation
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
10D402601000
|
trusted library allocation
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
10D402CFC000
|
trusted library allocation
|
page read and write
|
||
4AD4002DC000
|
direct allocation
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
10D403448000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
4AD40020C000
|
direct allocation
|
page read and write
|
||
632800201000
|
trusted library allocation
|
page read and write
|
||
10D402700000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4032EC000
|
trusted library allocation
|
page read and write
|
||
1DC17EE7000
|
heap
|
page read and write
|
||
10D402AF4000
|
trusted library allocation
|
page read and write
|
||
10D4023DC000
|
trusted library allocation
|
page read and write
|
||
670D7FE000
|
unkown
|
page readonly
|
||
1328006EC000
|
trusted library allocation
|
page read and write
|
||
10D403140000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
10D403098000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
1328006C4000
|
trusted library allocation
|
page read and write
|
||
4AD4002E4000
|
direct allocation
|
page read and write
|
||
18D2000
|
heap
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
10D402AF0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
1DC17EC4000
|
heap
|
page read and write
|
||
1DC1BC8F000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67631FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
67681FE000
|
unkown
|
page readonly
|
||
1DC14363000
|
heap
|
page read and write
|
||
10D402548000
|
trusted library allocation
|
page read and write
|
||
1DC15FC0000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67729FC000
|
stack
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D401001000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7AED000
|
heap
|
page read and write
|
||
76E1000
|
heap
|
page read and write
|
||
132800374000
|
trusted library allocation
|
page read and write
|
||
10D4031A8000
|
trusted library allocation
|
page read and write
|
||
1DC1E4BE000
|
trusted library section
|
page read and write
|
||
7050000
|
direct allocation
|
page execute and read and write
|
||
10D4031D8000
|
trusted library allocation
|
page read and write
|
||
632800230000
|
trusted library allocation
|
page read and write
|
||
1DC1782F000
|
heap
|
page read and write
|
||
71E2000
|
heap
|
page read and write
|
||
10D402A64000
|
trusted library allocation
|
page read and write
|
||
10D402DC0000
|
trusted library allocation
|
page read and write
|
||
67719FE000
|
stack
|
page read and write
|
||
132800380000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7AD4000
|
heap
|
page read and write
|
||
1DC1E4B0000
|
trusted library section
|
page read and write
|
||
67629FD000
|
stack
|
page read and write
|
||
1DC17E83000
|
heap
|
page read and write
|
||
10D4026C0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6C69D000
|
unkown
|
page read and write
|
||
10D40241C000
|
trusted library allocation
|
page read and write
|
||
132800760000
|
trusted library allocation
|
page read and write
|
||
10D4030A8000
|
trusted library allocation
|
page read and write
|
||
1DC14215000
|
heap
|
page read and write
|
||
1DC1D8F7000
|
unclassified section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6328002C0000
|
trusted library allocation
|
page read and write
|
||
10D402394000
|
trusted library allocation
|
page read and write
|
||
677E9FD000
|
stack
|
page read and write
|
||
10D402EE8000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
79DB000
|
heap
|
page read and write
|
||
132800744000
|
trusted library allocation
|
page read and write
|
||
10D4034D8000
|
trusted library allocation
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
10D4023AC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7A28000
|
heap
|
page read and write
|
||
1328006B4000
|
trusted library allocation
|
page read and write
|
||
10D402498000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
78E7000
|
heap
|
page read and write
|
||
132800401000
|
trusted library allocation
|
page read and write
|
||
67731FE000
|
unkown
|
page readonly
|
||
13280027C000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
10D402638000
|
trusted library allocation
|
page read and write
|
||
10D403434000
|
trusted library allocation
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
676A9FE000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402530000
|
trusted library allocation
|
page read and write
|
||
1DC17827000
|
heap
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
10D402873000
|
trusted library allocation
|
page read and write
|
||
1DC14270000
|
trusted library allocation
|
page read and write
|
||
132800658000
|
trusted library allocation
|
page read and write
|
||
79B4000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6328002A0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
677B9FC000
|
stack
|
page read and write
|
||
1DC17818000
|
heap
|
page read and write
|
||
132800408000
|
trusted library allocation
|
page read and write
|
||
1DC17E38000
|
heap
|
page read and write
|
||
79FC000
|
heap
|
page read and write
|
||
10D402318000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
unkown
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800390000
|
trusted library allocation
|
page read and write
|
||
4AD4002D0000
|
direct allocation
|
page read and write
|
||
10D4022A8000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
A1C000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1328002FC000
|
trusted library allocation
|
page read and write
|
||
10D40256C000
|
trusted library allocation
|
page read and write
|
||
10D4028B0000
|
trusted library allocation
|
page read and write
|
||
6328002F8000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
6328002C0000
|
trusted library allocation
|
page read and write
|
||
6328002E4000
|
trusted library allocation
|
page read and write
|
||
18D7000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
6328002C0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7A71000
|
heap
|
page read and write
|
||
71E3000
|
heap
|
page read and write
|
||
4AD400234000
|
direct allocation
|
page read and write
|
||
7A87000
|
heap
|
page read and write
|
||
675D9FE000
|
unkown
|
page read and write
|
||
67679FB000
|
stack
|
page read and write
|
||
10D4028D4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402788000
|
trusted library allocation
|
page read and write
|
||
670C7FE000
|
unkown
|
page readonly
|
||
1328006D0000
|
trusted library allocation
|
page read and write
|
||
4AD40025C000
|
direct allocation
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
677A9FB000
|
stack
|
page read and write
|
||
10D4025B0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402240000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
67649FB000
|
stack
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
10D402798000
|
trusted library allocation
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
10D403108000
|
trusted library allocation
|
page read and write
|
||
1DC17EED000
|
heap
|
page read and write
|
||
10D402508000
|
trusted library allocation
|
page read and write
|
||
1328006FC000
|
trusted library allocation
|
page read and write
|
||
7030000
|
direct allocation
|
page execute and read and write
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
1DC1781E000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403234000
|
trusted library allocation
|
page read and write
|
||
78E5000
|
heap
|
page read and write
|
||
10D402268000
|
trusted library allocation
|
page read and write
|
||
78E1000
|
heap
|
page read and write
|
||
7A5D000
|
heap
|
page read and write
|
||
10D403401000
|
trusted library allocation
|
page read and write
|
||
10D4031A8000
|
trusted library allocation
|
page read and write
|
||
10D402328000
|
trusted library allocation
|
page read and write
|
||
10D402A34000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17826000
|
heap
|
page read and write
|
||
1DC1E6C1000
|
trusted library section
|
page read and write
|
||
1328007E0000
|
trusted library allocation
|
page read and write
|
||
1DC16A10000
|
unkown
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
10D402694000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
10D4025F8000
|
trusted library allocation
|
page read and write
|
||
67661FE000
|
unkown
|
page readonly
|
||
950000
|
heap
|
page read and write
|
||
7973000
|
heap
|
page read and write
|
||
7A43000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
676E9FE000
|
stack
|
page read and write
|
||
10D402B7E000
|
trusted library allocation
|
page read and write
|
||
10D402F0C000
|
trusted library allocation
|
page read and write
|
||
10D4032CC000
|
trusted library allocation
|
page read and write
|
||
1DC1D983000
|
trusted library section
|
page read and write
|
||
10D403364000
|
trusted library allocation
|
page read and write
|
||
10D40235C000
|
trusted library allocation
|
page read and write
|
||
7C6C000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402940000
|
trusted library allocation
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
1DC1DAA0000
|
trusted library section
|
page read and write
|
||
1DC17831000
|
heap
|
page read and write
|
||
10D402508000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402BD0000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402694000
|
trusted library allocation
|
page read and write
|
||
10D403254000
|
trusted library allocation
|
page read and write
|
||
10D4024B4000
|
trusted library allocation
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
A70000
|
unkown
|
page readonly
|
||
132800610000
|
trusted library allocation
|
page read and write
|
||
67691FE000
|
unkown
|
page readonly
|
||
676F1FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
10D4027D8000
|
trusted library allocation
|
page read and write
|
||
10D402928000
|
trusted library allocation
|
page read and write
|
||
10D40240C000
|
trusted library allocation
|
page read and write
|
||
1DC17F00000
|
heap
|
page read and write
|
||
1328002CC000
|
trusted library allocation
|
page read and write
|
||
6328002B0000
|
trusted library allocation
|
page read and write
|
||
10D4023EC000
|
trusted library allocation
|
page read and write
|
||
13280060C000
|
trusted library allocation
|
page read and write
|
||
132800640000
|
trusted library allocation
|
page read and write
|
||
79B6000
|
heap
|
page read and write
|
||
6328002C8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7B6C000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D402AEA000
|
trusted library allocation
|
page read and write
|
||
10D40270C000
|
trusted library allocation
|
page read and write
|
||
1DC1E25E000
|
trusted library section
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
677C1FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
1DC1781E000
|
heap
|
page read and write
|
||
1DC1E9A0000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17823000
|
heap
|
page read and write
|
||
10D4023A0000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
1DC1DABE000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
4AD400250000
|
direct allocation
|
page read and write
|
||
10D4022EC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
1328002B8000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
632800264000
|
trusted library allocation
|
page read and write
|
||
18C4000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7BB9000
|
heap
|
page read and write
|
||
79DE000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402DEC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D40315C000
|
trusted library allocation
|
page read and write
|
||
10D40251C000
|
trusted library allocation
|
page read and write
|
||
10D4024FC000
|
trusted library allocation
|
page read and write
|
||
10D402878000
|
trusted library allocation
|
page read and write
|
||
10D402DD8000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
1328006B8000
|
trusted library allocation
|
page read and write
|
||
10D4028D4000
|
trusted library allocation
|
page read and write
|
||
10D4031BC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67789FC000
|
stack
|
page read and write
|
||
1DC1BC80000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
10D4023E4000
|
trusted library allocation
|
page read and write
|
||
10D40286D000
|
trusted library allocation
|
page read and write
|
||
1DC1E812000
|
trusted library section
|
page read and write
|
||
1DC1D8B0000
|
heap
|
page read and write
|
||
10D4030D4000
|
trusted library allocation
|
page read and write
|
||
10D402E8B000
|
trusted library allocation
|
page read and write
|
||
10D4030C8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
10D402C84000
|
trusted library allocation
|
page read and write
|
||
13280033C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403248000
|
trusted library allocation
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
1DC14344000
|
heap
|
page read and write
|
||
78E9000
|
heap
|
page read and write
|
||
78E9000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402CEC000
|
trusted library allocation
|
page read and write
|
||
78E3000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403174000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4028D4000
|
trusted library allocation
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
1DC17E61000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4031F4000
|
trusted library allocation
|
page read and write
|
||
132800668000
|
trusted library allocation
|
page read and write
|
||
10D402201000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
10D403318000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
A71000
|
unkown
|
page execute read
|
||
78E8000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4028D4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67751FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402724000
|
trusted library allocation
|
page read and write
|
||
10D4032FC000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
1328002E4000
|
trusted library allocation
|
page read and write
|
||
1DC1BFD2000
|
trusted library allocation
|
page read and write
|
||
7B1F000
|
heap
|
page read and write
|
||
10D402514000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17E49000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
10D40246C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1328002D4000
|
trusted library allocation
|
page read and write
|
||
67651FE000
|
unkown
|
page readonly
|
||
A81000
|
unkown
|
page readonly
|
||
1DC17EF0000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D400F74000
|
trusted library allocation
|
page read and write
|
||
132800788000
|
trusted library allocation
|
page read and write
|
||
67087FE000
|
unkown
|
page readonly
|
||
10D402E80000
|
trusted library allocation
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403084000
|
trusted library allocation
|
page read and write
|
||
677D1FE000
|
unkown
|
page readonly
|
||
1DC1E720000
|
trusted library section
|
page read and write
|
||
1DC1429B000
|
heap
|
page read and write
|
||
7AAE000
|
heap
|
page read and write
|
||
6706FFE000
|
stack
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1DC14260000
|
trusted library allocation
|
page read and write
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
132800354000
|
trusted library allocation
|
page read and write
|
||
132800700000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
13280035C000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
132800614000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
10D403120000
|
trusted library allocation
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
10D4026C0000
|
trusted library allocation
|
page read and write
|
||
10D402BA0000
|
trusted library allocation
|
page read and write
|
||
10D4032E8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403278000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC141E0000
|
heap
|
page read and write
|
||
1DC17E6D000
|
heap
|
page read and write
|
||
67641FE000
|
unkown
|
page readonly
|
||
10D4023B4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402CC8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
18B1000
|
heap
|
page read and write
|
||
1DC17F10000
|
heap
|
page read and write
|
||
632800260000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
676A1FE000
|
unkown
|
page readonly
|
||
1DC17D40000
|
trusted library section
|
page read and write
|
||
10D4030B8000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
10D402B58000
|
trusted library allocation
|
page read and write
|
||
632800248000
|
trusted library allocation
|
page read and write
|
||
10D4028E0000
|
trusted library allocation
|
page read and write
|
||
10D402274000
|
trusted library allocation
|
page read and write
|
||
670AFFD000
|
stack
|
page read and write
|
||
10D403050000
|
trusted library allocation
|
page read and write
|
||
10D40337C000
|
trusted library allocation
|
page read and write
|
||
18D9000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
10D4025F8000
|
trusted library allocation
|
page read and write
|
||
132800230000
|
trusted library allocation
|
page read and write
|
||
1DC1D853000
|
heap
|
page read and write
|
||
1DC1D94E000
|
trusted library section
|
page read and write
|
||
1328007D0000
|
trusted library allocation
|
page read and write
|
||
132800601000
|
trusted library allocation
|
page read and write
|
||
132800714000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
6DD0000
|
direct allocation
|
page read and write
|
||
78E4000
|
heap
|
page read and write
|
||
1328006C8000
|
trusted library allocation
|
page read and write
|
||
67759FC000
|
stack
|
page read and write
|
||
675F9FE000
|
stack
|
page read and write
|
||
10D403168000
|
trusted library allocation
|
page read and write
|
||
10D4028FC000
|
trusted library allocation
|
page read and write
|
||
10D4023E8000
|
trusted library allocation
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
18BB000
|
heap
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
10D402B70000
|
trusted library allocation
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
67601FE000
|
unkown
|
page readonly
|
||
10D402DD0000
|
trusted library allocation
|
page read and write
|
||
799A000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402B95000
|
trusted library allocation
|
page read and write
|
||
67769FB000
|
stack
|
page read and write
|
||
10D40290C000
|
trusted library allocation
|
page read and write
|
||
78E6000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
10D402CB8000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
4AD400290000
|
direct allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
100A000
|
heap
|
page read and write
|
||
677D9FB000
|
stack
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
10D403120000
|
trusted library allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6941000
|
heap
|
page read and write
|
||
7ABC000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D402530000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
10D402888000
|
trusted library allocation
|
page read and write
|
||
632800278000
|
trusted library allocation
|
page read and write
|
||
10D403038000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800754000
|
trusted library allocation
|
page read and write
|
||
10D40234C000
|
trusted library allocation
|
page read and write
|
||
10D4033E4000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
10D4033E4000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
1DC17E73000
|
heap
|
page read and write
|
||
78EE000
|
heap
|
page read and write
|
||
1DC17EAA000
|
heap
|
page read and write
|
||
1DC1E7F6000
|
trusted library section
|
page read and write
|
||
132800758000
|
trusted library allocation
|
page read and write
|
||
10D4022DC000
|
trusted library allocation
|
page read and write
|
||
1DC1E6D0000
|
trusted library section
|
page read and write
|
||
10D403028000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
67017FE000
|
unkown
|
page readonly
|
||
6C69F000
|
unkown
|
page readonly
|
||
1DC17E81000
|
heap
|
page read and write
|
||
7AB8000
|
heap
|
page read and write
|
||
1DC17F10000
|
heap
|
page read and write
|
||
10D40228C000
|
trusted library allocation
|
page read and write
|
||
78E1000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800250000
|
trusted library allocation
|
page read and write
|
||
1DC1DAB2000
|
trusted library section
|
page read and write
|
||
132800724000
|
trusted library allocation
|
page read and write
|
||
10D400E01000
|
trusted library allocation
|
page read and write
|
||
79E5000
|
heap
|
page read and write
|
||
67791FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402EF8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67701FE000
|
unkown
|
page readonly
|
||
6328002A0000
|
trusted library allocation
|
page read and write
|
||
1DC1782B000
|
heap
|
page read and write
|
||
10D400A01000
|
trusted library allocation
|
page read and write
|
||
10D40320C000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
18D7000
|
heap
|
page read and write
|
||
10D4026CC000
|
trusted library allocation
|
page read and write
|
||
1DC1DA0D000
|
trusted library section
|
page read and write
|
||
132800320000
|
trusted library allocation
|
page read and write
|
||
10D402530000
|
trusted library allocation
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
13280025C000
|
trusted library allocation
|
page read and write
|
||
10D402424000
|
trusted library allocation
|
page read and write
|
||
67779FD000
|
stack
|
page read and write
|
||
6328002D8000
|
trusted library allocation
|
page read and write
|
||
10D402554000
|
trusted library allocation
|
page read and write
|
||
4AD400201000
|
direct allocation
|
page read and write
|
||
1DC15FB0000
|
trusted library section
|
page readonly
|
||
73D0000
|
heap
|
page read and write
|
||
10D400401000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17E78000
|
heap
|
page read and write
|
||
1328006B0000
|
trusted library allocation
|
page read and write
|
||
1328006CC000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
676C9FD000
|
stack
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
10D4033F4000
|
trusted library allocation
|
page read and write
|
||
1DC14220000
|
heap
|
page read and write
|
||
676D1FE000
|
unkown
|
page readonly
|
||
A70000
|
unkown
|
page readonly
|
||
1DC1DB72000
|
trusted library section
|
page read and write
|
||
1DC1D787000
|
unclassified section
|
page read and write
|
||
132800620000
|
trusted library allocation
|
page read and write
|
||
1DC1A080000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
10D402ACC000
|
trusted library allocation
|
page read and write
|
||
676C1FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402280000
|
trusted library allocation
|
page read and write
|
||
10D402AEE000
|
trusted library allocation
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
738F000
|
direct allocation
|
page read and write
|
||
10D4031A8000
|
trusted library allocation
|
page read and write
|
||
1DC1A070000
|
trusted library allocation
|
page read and write
|
||
10D40283C000
|
trusted library allocation
|
page read and write
|
||
10D4024B9000
|
trusted library allocation
|
page read and write
|
||
7971000
|
heap
|
page read and write
|
||
1DC14210000
|
heap
|
page read and write
|
||
67749FB000
|
stack
|
page read and write
|
||
6328002F0000
|
trusted library allocation
|
page read and write
|
||
10D402B30000
|
trusted library allocation
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
10D402B84000
|
trusted library allocation
|
page read and write
|
||
132800424000
|
trusted library allocation
|
page read and write
|
||
1DC17EB5000
|
heap
|
page read and write
|
||
10D40256C000
|
trusted library allocation
|
page read and write
|
||
10D403248000
|
trusted library allocation
|
page read and write
|
||
78E7000
|
heap
|
page read and write
|
||
79DA000
|
heap
|
page read and write
|
||
10D402E48000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4025F8000
|
trusted library allocation
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4023D4000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
132800330000
|
trusted library allocation
|
page read and write
|
||
1DC1E81D000
|
trusted library section
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
10D4026DC000
|
trusted library allocation
|
page read and write
|
||
10D4024E0000
|
trusted library allocation
|
page read and write
|
||
7B3C000
|
heap
|
page read and write
|
||
1DC1433F000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D402688000
|
trusted library allocation
|
page read and write
|
||
10D402678000
|
trusted library allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D403168000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
13280069C000
|
trusted library allocation
|
page read and write
|
||
10D402F34000
|
trusted library allocation
|
page read and write
|
||
18BA000
|
heap
|
page read and write
|
||
10D403278000
|
trusted library allocation
|
page read and write
|
||
1DC17E89000
|
heap
|
page read and write
|
||
10D402A3C000
|
trusted library allocation
|
page read and write
|
||
10D402FE8000
|
trusted library allocation
|
page read and write
|
||
10D402490000
|
trusted library allocation
|
page read and write
|
||
6C6EC000
|
unkown
|
page readonly
|
||
10D403294000
|
trusted library allocation
|
page read and write
|
||
4AD40026C000
|
direct allocation
|
page read and write
|
||
10D402E4C000
|
trusted library allocation
|
page read and write
|
||
10D402D48000
|
trusted library allocation
|
page read and write
|
||
10D400801000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
14BF000
|
stack
|
page read and write
|
||
6707FFD000
|
stack
|
page read and write
|
||
13280080C000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
632800270000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4023F8000
|
trusted library allocation
|
page read and write
|
||
10D403244000
|
trusted library allocation
|
page read and write
|
||
10D4031A8000
|
trusted library allocation
|
page read and write
|
||
10D4023C8000
|
trusted library allocation
|
page read and write
|
||
10D402F90000
|
trusted library allocation
|
page read and write
|
||
10D4023B4000
|
trusted library allocation
|
page read and write
|
||
10D403234000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
132800354000
|
trusted library allocation
|
page read and write
|
||
10D40011A000
|
trusted library allocation
|
page read and write
|
||
10D402B20000
|
trusted library allocation
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
7B9B000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67047FE000
|
unkown
|
page readonly
|
||
10D402214000
|
trusted library allocation
|
page read and write
|
||
10D402898000
|
trusted library allocation
|
page read and write
|
||
10D403428000
|
trusted library allocation
|
page read and write
|
||
10D40262D000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67097FE000
|
unkown
|
page readonly
|
||
1328006E8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
13280075C000
|
trusted library allocation
|
page read and write
|
||
10D4030E0000
|
trusted library allocation
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
6DD0000
|
direct allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800730000
|
trusted library allocation
|
page read and write
|
||
10D4028D4000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
10D402694000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4030EC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC1D850000
|
heap
|
page read and write
|
||
10D4028EC000
|
trusted library allocation
|
page read and write
|
||
67669FA000
|
stack
|
page read and write
|
||
67067FE000
|
unkown
|
page readonly
|
||
21000
|
unkown
|
page execute and write copy
|
||
10D402E90000
|
trusted library allocation
|
page read and write
|
||
6708FFA000
|
stack
|
page read and write
|
||
132800248000
|
trusted library allocation
|
page read and write
|
||
10D4032B8000
|
trusted library allocation
|
page read and write
|
||
677A1FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
1DC17EB9000
|
heap
|
page read and write
|
||
132800784000
|
trusted library allocation
|
page read and write
|
||
10D40238C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4024B4000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page write copy
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
10D403194000
|
trusted library allocation
|
page read and write
|
||
6328002F4000
|
trusted library allocation
|
page read and write
|
||
4AD40023C000
|
direct allocation
|
page read and write
|
||
10D402E6C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402828000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
10D402974000
|
trusted library allocation
|
page read and write
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
6700FFD000
|
stack
|
page read and write
|
||
676B9FE000
|
stack
|
page read and write
|
||
10D40236C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402AA4000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
132800320000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC14321000
|
heap
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
67077FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402414000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC1DD10000
|
trusted library section
|
page read and write
|
||
10D402FA0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D400201000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
stack
|
page read and write
|
||
10D402C01000
|
trusted library allocation
|
page read and write
|
||
10D402B79000
|
trusted library allocation
|
page read and write
|
||
1DC17800000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
79CD000
|
heap
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
4AD400230000
|
direct allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
79B2000
|
heap
|
page read and write
|
||
78E5000
|
heap
|
page read and write
|
||
10D4024F0000
|
trusted library allocation
|
page read and write
|
||
670BFFE000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4034E4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4025F8000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
78E6000
|
heap
|
page read and write
|
||
10D4023D8000
|
trusted library allocation
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
10D40314C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D40229E000
|
trusted library allocation
|
page read and write
|
||
10D403288000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
10D4022A2000
|
trusted library allocation
|
page read and write
|
||
132800644000
|
trusted library allocation
|
page read and write
|
||
1328006AC000
|
trusted library allocation
|
page read and write
|
||
144F000
|
stack
|
page read and write
|
||
7A4C000
|
heap
|
page read and write
|
||
132800698000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
78E4000
|
heap
|
page read and write
|
||
7996000
|
heap
|
page read and write
|
||
67771FE000
|
unkown
|
page readonly
|
||
10D402580000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
677F1FE000
|
unkown
|
page readonly
|
||
10D4027AC000
|
trusted library allocation
|
page read and write
|
||
1DC17E86000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403248000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC177F0000
|
heap
|
page read and write
|
||
78E3000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67741FE000
|
unkown
|
page readonly
|
||
7040000
|
direct allocation
|
page execute and read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
632800250000
|
trusted library allocation
|
page read and write
|
||
10D40242C000
|
trusted library allocation
|
page read and write
|
||
1DC1E6EE000
|
trusted library section
|
page read and write
|
||
132800320000
|
trusted library allocation
|
page read and write
|
||
7A0D000
|
heap
|
page read and write
|
||
1DC1DB7D000
|
trusted library section
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D4022B4000
|
trusted library allocation
|
page read and write
|
||
10D400C01000
|
trusted library allocation
|
page read and write
|
||
67027FE000
|
unkown
|
page readonly
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6941000
|
heap
|
page read and write
|
||
78E7000
|
heap
|
page read and write
|
||
1328007B4000
|
trusted library allocation
|
page read and write
|
||
78E5000
|
heap
|
page read and write
|
||
1DC17824000
|
heap
|
page read and write
|
||
10D402F54000
|
trusted library allocation
|
page read and write
|
||
1DC1E741000
|
trusted library section
|
page read and write
|
||
733D000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
7A36000
|
heap
|
page read and write
|
||
6328002BD000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
677C9FE000
|
stack
|
page read and write
|
||
10D4029A0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC1E753000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
677B1FE000
|
unkown
|
page readonly
|
||
6930000
|
direct allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
10D40260C000
|
trusted library allocation
|
page read and write
|
||
18C4000
|
heap
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
6328002A0000
|
trusted library allocation
|
page read and write
|
||
632800294000
|
trusted library allocation
|
page read and write
|
||
10D4023B4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
6941000
|
heap
|
page read and write
|
||
10D4030F4000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402B77000
|
trusted library allocation
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
10D402BAC000
|
trusted library allocation
|
page read and write
|
||
10D402A7C000
|
trusted library allocation
|
page read and write
|
||
10D402FE0000
|
trusted library allocation
|
page read and write
|
||
132800220000
|
trusted library allocation
|
page read and write
|
||
10D4022FC000
|
trusted library allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402334000
|
trusted library allocation
|
page read and write
|
||
7A94000
|
heap
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
10D402F0C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
10D403278000
|
trusted library allocation
|
page read and write
|
||
1DC17ED3000
|
heap
|
page read and write
|
||
10D402694000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
4AD400303000
|
direct allocation
|
page read and write
|
||
18D6000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67699FE000
|
stack
|
page read and write
|
||
10D402F67000
|
trusted library allocation
|
page read and write
|
||
1DC15FC3000
|
heap
|
page read and write
|
||
670A7FE000
|
unkown
|
page readonly
|
||
10D402BE4000
|
trusted library allocation
|
page read and write
|
||
74EC000
|
direct allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
10D402C0C000
|
trusted library allocation
|
page read and write
|
||
10D40295C000
|
trusted library allocation
|
page read and write
|
||
1DC14240000
|
heap
|
page read and write
|
||
1DC1E6E2000
|
trusted library section
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D402590000
|
trusted library allocation
|
page read and write
|
||
1328007C8000
|
trusted library allocation
|
page read and write
|
||
4AD4002A8000
|
direct allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
132800368000
|
trusted library allocation
|
page read and write
|
||
10D402428000
|
trusted library allocation
|
page read and write
|
||
10D403018000
|
trusted library allocation
|
page read and write
|
||
132800704000
|
trusted library allocation
|
page read and write
|
||
10D402694000
|
trusted library allocation
|
page read and write
|
||
6328002B0000
|
trusted library allocation
|
page read and write
|
||
1DC1E250000
|
trusted library section
|
page read and write
|
||
10D4025B0000
|
trusted library allocation
|
page read and write
|
||
1DC1E6B0000
|
trusted library section
|
page read and write
|
||
67739FD000
|
stack
|
page read and write
|
||
13280033C000
|
trusted library allocation
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D40280C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
632800238000
|
trusted library allocation
|
page read and write
|
||
10D402EDC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7C79000
|
heap
|
page read and write
|
||
132800648000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
A81000
|
unkown
|
page readonly
|
||
10D403120000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
stack
|
page read and write
|
||
10D4023AC000
|
trusted library allocation
|
page read and write
|
||
1DC141F0000
|
heap
|
page readonly
|
||
18C4000
|
heap
|
page read and write
|
||
1DC1E227000
|
unclassified section
|
page read and write
|
||
10D402E9C000
|
trusted library allocation
|
page read and write
|
||
132800368000
|
trusted library allocation
|
page read and write
|
||
10D4024A8000
|
trusted library allocation
|
page read and write
|
||
1328002B0000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D40255C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402B75000
|
trusted library allocation
|
page read and write
|
||
67761FE000
|
unkown
|
page readonly
|
||
1DC1E730000
|
trusted library section
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
7AB4000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4032DC000
|
trusted library allocation
|
page read and write
|
||
13280040C000
|
trusted library allocation
|
page read and write
|
||
10D402B50000
|
trusted library allocation
|
page read and write
|
||
1DC17823000
|
heap
|
page read and write
|
||
10D403130000
|
trusted library allocation
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
132800404000
|
trusted library allocation
|
page read and write
|
||
10D40338C000
|
trusted library allocation
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
10D4026C4000
|
trusted library allocation
|
page read and write
|
||
7A3C000
|
heap
|
page read and write
|
||
6C6E9000
|
unkown
|
page read and write
|
||
63280020C000
|
trusted library allocation
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
4AD400215000
|
direct allocation
|
page read and write
|
||
10D402F24000
|
trusted library allocation
|
page read and write
|
||
132800720000
|
trusted library allocation
|
page read and write
|
||
1DC17A90000
|
heap
|
page read and write
|
||
4AD4002AC000
|
direct allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
13280078C000
|
trusted library allocation
|
page read and write
|
||
1328006E4000
|
trusted library allocation
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
1DC17D90000
|
trusted library section
|
page read and write
|
||
1DC1D942000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
74EA000
|
direct allocation
|
page read and write
|
||
10D4031CC000
|
trusted library allocation
|
page read and write
|
||
7AE2000
|
heap
|
page read and write
|
||
1DC1DB13000
|
trusted library section
|
page read and write
|
||
132800678000
|
trusted library allocation
|
page read and write
|
||
6328002C0000
|
trusted library allocation
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
18D7000
|
heap
|
page read and write
|
||
10D402F3C000
|
trusted library allocation
|
page read and write
|
||
10D4023F0000
|
trusted library allocation
|
page read and write
|
||
1328007CC000
|
trusted library allocation
|
page read and write
|
||
10D4034E8000
|
trusted library allocation
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800684000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
10D40220C000
|
trusted library allocation
|
page read and write
|
||
740000
|
unkown
|
page write copy
|
||
10D403354000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7BEF000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4025F8000
|
trusted library allocation
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
6C5C1000
|
unkown
|
page execute read
|
||
1DC17E58000
|
heap
|
page read and write
|
||
1328006E0000
|
trusted library allocation
|
page read and write
|
||
1DC1E467000
|
unclassified section
|
page read and write
|
||
1DC17EEB000
|
heap
|
page read and write
|
||
78E6000
|
heap
|
page read and write
|
||
6C6E8000
|
unkown
|
page readonly
|
||
718F000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
18BA000
|
heap
|
page read and write
|
||
10D4029E0000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
132800210000
|
trusted library allocation
|
page read and write
|
||
10D402F80000
|
trusted library allocation
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
10D403094000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
4AD400217000
|
direct allocation
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
6941000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
1417000
|
heap
|
page read and write
|
||
10D403098000
|
trusted library allocation
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
132800734000
|
trusted library allocation
|
page read and write
|
||
10D402A94000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
10D4028D0000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
676D9FA000
|
stack
|
page read and write
|
||
10D4027C0000
|
trusted library allocation
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
132800750000
|
trusted library allocation
|
page read and write
|
||
1328002ED000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
1DC1DB56000
|
trusted library section
|
page read and write
|
||
10D4023AC000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402CAC000
|
trusted library allocation
|
page read and write
|
||
10D402430000
|
trusted library allocation
|
page read and write
|
||
132800364000
|
trusted library allocation
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
1DC1D930000
|
trusted library section
|
page read and write
|
||
132800770000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
10D4024A4000
|
trusted library allocation
|
page read and write
|
||
67611FE000
|
unkown
|
page readonly
|
||
67689FC000
|
stack
|
page read and write
|
||
132800688000
|
trusted library allocation
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
1DC17E65000
|
heap
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
164F000
|
stack
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
7A1D000
|
heap
|
page read and write
|
||
7384000
|
direct allocation
|
page read and write
|
||
1DC17E61000
|
heap
|
page read and write
|
||
10D4031E0000
|
trusted library allocation
|
page read and write
|
||
7993000
|
heap
|
page read and write
|
||
67721FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402A0C000
|
trusted library allocation
|
page read and write
|
||
10D402587000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
A7A000
|
unkown
|
page readonly
|
||
10D403114000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
132800201000
|
trusted library allocation
|
page read and write
|
||
78E9000
|
heap
|
page read and write
|
||
10D40320C000
|
trusted library allocation
|
page read and write
|
||
10D40256C000
|
trusted library allocation
|
page read and write
|
||
78EF000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
10D402F5C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
632800235000
|
trusted library allocation
|
page read and write
|
||
6328002BC000
|
trusted library allocation
|
page read and write
|
||
7C0C000
|
heap
|
page read and write
|
||
10D402530000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
676E1FE000
|
unkown
|
page readonly
|
||
10D402F2C000
|
trusted library allocation
|
page read and write
|
||
13280039C000
|
trusted library allocation
|
page read and write
|
||
10D402C4C000
|
trusted library allocation
|
page read and write
|
||
33FB000
|
heap
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
7A40000
|
heap
|
page read and write
|
||
132800310000
|
trusted library allocation
|
page read and write
|
||
6702FFD000
|
stack
|
page read and write
|
||
10D402FD0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
1DC1DA40000
|
trusted library section
|
page read and write
|
||
10D402528000
|
trusted library allocation
|
page read and write
|
||
132800310000
|
trusted library allocation
|
page read and write
|
||
797B000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
10D4024C0000
|
trusted library allocation
|
page read and write
|
||
73DA000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
67057FE000
|
unkown
|
page readonly
|
||
7A10000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D403201000
|
trusted library allocation
|
page read and write
|
||
10D4023E0000
|
trusted library allocation
|
page read and write
|
||
10D402494000
|
trusted library allocation
|
page read and write
|
||
10D4023F4000
|
trusted library allocation
|
page read and write
|
||
132800320000
|
trusted library allocation
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
6328002C0000
|
trusted library allocation
|
page read and write
|
||
1DC1E850000
|
trusted library section
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D402FD4000
|
trusted library allocation
|
page read and write
|
||
10D402E48000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4031A0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
10D40251C000
|
trusted library allocation
|
page read and write
|
||
10D402DC0000
|
trusted library allocation
|
page read and write
|
||
7C39000
|
heap
|
page read and write
|
||
10D4034D8000
|
trusted library allocation
|
page read and write
|
||
1DC17830000
|
heap
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
10D403254000
|
trusted library allocation
|
page read and write
|
||
323E000
|
unkown
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7AA2000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4023AC000
|
trusted library allocation
|
page read and write
|
||
10D402DC0000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
10D40253C000
|
trusted library allocation
|
page read and write
|
||
67671FE000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
10D402E4C000
|
trusted library allocation
|
page read and write
|
||
10D40294C000
|
trusted library allocation
|
page read and write
|
||
799E000
|
heap
|
page read and write
|
||
A81000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
10D402BDC000
|
trusted library allocation
|
page read and write
|
||
78E9000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page execute and read and write
|
||
67007FE000
|
unkown
|
page readonly
|
||
10D403070000
|
trusted library allocation
|
page read and write
|
||
10D40334C000
|
trusted library allocation
|
page read and write
|
||
4AD40024C000
|
direct allocation
|
page read and write
|
||
78E3000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
10D4031B0000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
6941000
|
heap
|
page read and write
|
||
132800348000
|
trusted library allocation
|
page read and write
|
||
10D40240C000
|
trusted library allocation
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
10D403234000
|
trusted library allocation
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
132800418000
|
trusted library allocation
|
page read and write
|
||
6701FFD000
|
stack
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
6941000
|
heap
|
page read and write
|
||
7B4F000
|
heap
|
page read and write
|
There are 1316 hidden memdumps, click here to show them.