Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
v9dVG4fAGa.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_v9dVG4fAGa.exe_37d923ac5075daa3ee77f76dea4fb931ad92bfd7_7048b31b_c9d19246-7878-46f9-bf31-67fc86250348\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D12.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Oct 27 13:47:21 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER205F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20AE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MJtlcJQcMLPNfooLOLTv.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\v9dVG4fAGa.exe
|
"C:\Users\user\Desktop\v9dVG4fAGa.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user~1\AppData\Local\Temp\/service123.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=2140,i,9262034847209018925,11001102924279765534,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 5296 -ip 5296
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5296 -s 728
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gPtventji20vs.top
|
|||
http://home.tventji20vs.top/WoxlPHBXQCCaMPOisKAk1730000596
|
147.45.48.137
|
||
QUERY|rd|AAAA|IN|home.tventji20vs.top
|
|||
http://tventji20vs.top/v1/upload.php
|
147.45.48.137
|
||
tventji20vs.top
|
|||
QUERY|rd|A|IN|home.tventji20vs.top
|
|||
analforeverlovyu.top
|
|||
llowtventji20vs.top
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=br
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
HTTP://tventji20vs.top/v1/upload.php
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://home.tventji20vs.top/WoxlPHBXQCCaMPOisKAk96
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://anglebug.com/7382ar
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://anglebug.com/7369t
|
unknown
|
||
http://anglebug.com/7047h
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.tventji20vs.top
|
147.45.48.137
|
||
tventji20vs.top
|
147.45.48.137
|
||
www.google.com
|
142.250.184.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.45.48.137
|
home.tventji20vs.top
|
Russian Federation
|
||
142.250.184.196
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
ProgramId
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
FileId
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
LowerCaseLongPath
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
LongPathHash
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Name
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
OriginalFileName
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Publisher
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Version
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
BinFileVersion
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
BinaryType
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
ProductName
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
ProductVersion
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
LinkDate
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
BinProductVersion
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
AppxPackageFullName
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Size
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Language
|
||
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4844000
|
heap
|
page read and write
|
||
26E0310E000
|
heap
|
page read and write
|
||
B2197FC000
|
stack
|
page read and write
|
||
72AC00CE0000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
26E0362D000
|
heap
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
5394002F4000
|
trusted library allocation
|
page read and write
|
||
19A00020C000
|
trusted library allocation
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
B2799FE000
|
unkown
|
page readonly
|
||
72AC00654000
|
trusted library allocation
|
page read and write
|
||
72AC004B3000
|
trusted library allocation
|
page read and write
|
||
72AC008A8000
|
trusted library allocation
|
page read and write
|
||
26E7B5C0000
|
trusted library allocation
|
page read and write
|
||
404F000
|
heap
|
page read and write
|
||
72AC00098000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page read and write
|
||
19A000348000
|
trusted library allocation
|
page read and write
|
||
26E03639000
|
heap
|
page read and write
|
||
11F000217000
|
direct allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
26E03689000
|
heap
|
page read and write
|
||
72AC00BAC000
|
trusted library allocation
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
402E000
|
heap
|
page read and write
|
||
B27F9FE000
|
unkown
|
page readonly
|
||
539400238000
|
trusted library allocation
|
page read and write
|
||
B26C9FE000
|
unkown
|
page readonly
|
||
72AC00500000
|
trusted library allocation
|
page read and write
|
||
190A000
|
heap
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
B202FFE000
|
unkown
|
page readonly
|
||
19A00039C000
|
trusted library allocation
|
page read and write
|
||
72AC00B70000
|
trusted library allocation
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
B209FFE000
|
unkown
|
page readonly
|
||
199E000
|
heap
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
26E07842000
|
heap
|
page read and write
|
||
B2719FE000
|
unkown
|
page readonly
|
||
26E030FE000
|
heap
|
page read and write
|
||
72AC00C0C000
|
trusted library allocation
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
26E09C76000
|
trusted library section
|
page read and write
|
||
72AC004B0000
|
trusted library allocation
|
page read and write
|
||
11DC000
|
unkown
|
page read and write
|
||
B2769FE000
|
unkown
|
page readonly
|
||
72AC00218000
|
trusted library allocation
|
page read and write
|
||
B2137FE000
|
stack
|
page read and write
|
||
1085000
|
unkown
|
page read and write
|
||
5394002A0000
|
trusted library allocation
|
page read and write
|
||
19A0007CC000
|
trusted library allocation
|
page read and write
|
||
26E09217000
|
unclassified section
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
26E09392000
|
trusted library section
|
page read and write
|
||
72AC00E7C000
|
trusted library allocation
|
page read and write
|
||
539400230000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
26E09B62000
|
trusted library section
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
72AC007E0000
|
trusted library allocation
|
page read and write
|
||
19A0006E8000
|
trusted library allocation
|
page read and write
|
||
B27D9FE000
|
unkown
|
page readonly
|
||
5394002A0000
|
trusted library allocation
|
page read and write
|
||
72AC001F0000
|
trusted library allocation
|
page read and write
|
||
11C7000
|
unkown
|
page readonly
|
||
539400294000
|
trusted library allocation
|
page read and write
|
||
72AC00C01000
|
trusted library allocation
|
page read and write
|
||
19A000758000
|
trusted library allocation
|
page read and write
|
||
72AC004B0000
|
trusted library allocation
|
page read and write
|
||
3A4C000
|
heap
|
page read and write
|
||
19A000330000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
1997000
|
heap
|
page read and write
|
||
3A71000
|
heap
|
page read and write
|
||
539400201000
|
trusted library allocation
|
page read and write
|
||
6A629000
|
direct allocation
|
page readonly
|
||
6A0F9000
|
direct allocation
|
page read and write
|
||
72AC00C40000
|
trusted library allocation
|
page read and write
|
||
72AC00478000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
3E78000
|
heap
|
page read and write
|
||
3F41000
|
heap
|
page read and write
|
||
72AC00E40000
|
trusted library allocation
|
page read and write
|
||
26E09CBD000
|
trusted library section
|
page read and write
|
||
72AC00E1C000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
26E09D40000
|
trusted library section
|
page read and write
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
26E0366E000
|
heap
|
page read and write
|
||
72AC00401000
|
trusted library allocation
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
26E7B5D5000
|
heap
|
page read and write
|
||
19A0006D4000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
72AC00B30000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
72AC00D18000
|
trusted library allocation
|
page read and write
|
||
B2781FE000
|
stack
|
page read and write
|
||
B2711FD000
|
stack
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
19A000310000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
72AC00201000
|
trusted library allocation
|
page read and write
|
||
1931000
|
heap
|
page read and write
|
||
26E03693000
|
heap
|
page read and write
|
||
19A0007D0000
|
trusted library allocation
|
page read and write
|
||
B2007FE000
|
stack
|
page read and write
|
||
72AC00F28000
|
trusted library allocation
|
page read and write
|
||
72AC00EF4000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
19A000668000
|
trusted library allocation
|
page read and write
|
||
6CC1C000
|
unkown
|
page readonly
|
||
19A000644000
|
trusted library allocation
|
page read and write
|
||
72AC0018C000
|
trusted library allocation
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
5394002C0000
|
trusted library allocation
|
page read and write
|
||
6A5BE000
|
direct allocation
|
page read and write
|
||
72AC0117C000
|
trusted library allocation
|
page read and write
|
||
72AC0040D000
|
trusted library allocation
|
page read and write
|
||
3ED6000
|
heap
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
72AC009E0000
|
trusted library allocation
|
page read and write
|
||
19A000694000
|
trusted library allocation
|
page read and write
|
||
B27E1FE000
|
stack
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
72AC00708000
|
trusted library allocation
|
page read and write
|
||
19A000404000
|
trusted library allocation
|
page read and write
|
||
72AC00EB4000
|
trusted library allocation
|
page read and write
|
||
72AC00E8C000
|
trusted library allocation
|
page read and write
|
||
B2157FE000
|
stack
|
page read and write
|
||
72AC00DD0000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
72AC001EC000
|
trusted library allocation
|
page read and write
|
||
3F14000
|
heap
|
page read and write
|
||
B21B7FE000
|
stack
|
page read and write
|
||
3DE6000
|
heap
|
page read and write
|
||
26E023A0000
|
unkown
|
page read and write
|
||
72AC008DC000
|
trusted library allocation
|
page read and write
|
||
B2709FE000
|
unkown
|
page readonly
|
||
72AC00A30000
|
trusted library allocation
|
page read and write
|
||
19A000648000
|
trusted library allocation
|
page read and write
|
||
72AC00A70000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
69FB4000
|
direct allocation
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
3F0A000
|
heap
|
page read and write
|
||
B2729FE000
|
unkown
|
page readonly
|
||
72AC004D0000
|
trusted library allocation
|
page read and write
|
||
3EF9000
|
heap
|
page read and write
|
||
26E01950000
|
heap
|
page read and write
|
||
72AC0017C000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
26E018D0000
|
trusted library section
|
page readonly
|
||
72AC003A8000
|
trusted library allocation
|
page read and write
|
||
26E09900000
|
trusted library section
|
page read and write
|
||
26E7B43B000
|
heap
|
page read and write
|
||
539400278000
|
trusted library allocation
|
page read and write
|
||
72AC003B4000
|
trusted library allocation
|
page read and write
|
||
72AC0022C000
|
trusted library allocation
|
page read and write
|
||
26E03635000
|
heap
|
page read and write
|
||
26E03668000
|
heap
|
page read and write
|
||
4073000
|
heap
|
page read and write
|
||
539400270000
|
trusted library allocation
|
page read and write
|
||
72AC001B4000
|
trusted library allocation
|
page read and write
|
||
19A000704000
|
trusted library allocation
|
page read and write
|
||
B20B7FD000
|
stack
|
page read and write
|
||
72AC00D7C000
|
trusted library allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3DE3000
|
heap
|
page read and write
|
||
6A2BE000
|
direct allocation
|
page read and write
|
||
19A0006CC000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
3DEA000
|
heap
|
page read and write
|
||
19A000720000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
heap
|
page read and write
|
||
11F000215000
|
direct allocation
|
page read and write
|
||
72AC001AC000
|
trusted library allocation
|
page read and write
|
||
B210FFE000
|
unkown
|
page readonly
|
||
B2097FC000
|
stack
|
page read and write
|
||
72AC0000C000
|
trusted library allocation
|
page read and write
|
||
72AC001E0000
|
trusted library allocation
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
26E09CF0000
|
trusted library section
|
page read and write
|
||
B27D1FE000
|
stack
|
page read and write
|
||
19A000760000
|
trusted library allocation
|
page read and write
|
||
72AC00CB8000
|
trusted library allocation
|
page read and write
|
||
72AC009B4000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
26E03616000
|
heap
|
page read and write
|
||
6CBCF000
|
unkown
|
page readonly
|
||
72AC006A4000
|
trusted library allocation
|
page read and write
|
||
DC94000
|
heap
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
72AC00ABC000
|
trusted library allocation
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
B204FFE000
|
unkown
|
page readonly
|
||
19C0000
|
heap
|
page read and write
|
||
6CC18000
|
unkown
|
page readonly
|
||
72AC00C7C000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
72AC00735000
|
trusted library allocation
|
page read and write
|
||
B20C7FB000
|
stack
|
page read and write
|
||
72AC00D28000
|
trusted library allocation
|
page read and write
|
||
B20E7FE000
|
stack
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
B2107FD000
|
stack
|
page read and write
|
||
B2739FE000
|
unkown
|
page readonly
|
||
19A00069C000
|
trusted library allocation
|
page read and write
|
||
26E092DE000
|
trusted library section
|
page read and write
|
||
19A000734000
|
trusted library allocation
|
page read and write
|
||
26E077E4000
|
heap
|
page read and write
|
||
11F000290000
|
direct allocation
|
page read and write
|
||
72AC008D0000
|
trusted library allocation
|
page read and write
|
||
72AC00DD0000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
72AC00134000
|
trusted library allocation
|
page read and write
|
||
26E092D2000
|
trusted library section
|
page read and write
|
||
72AC00A50000
|
trusted library allocation
|
page read and write
|
||
26E09B6E000
|
trusted library section
|
page read and write
|
||
19A0002ED000
|
trusted library allocation
|
page read and write
|
||
26E7B397000
|
heap
|
page read and write
|
||
B27A1FE000
|
stack
|
page read and write
|
||
19C1000
|
heap
|
page read and write
|
||
B2017FB000
|
stack
|
page read and write
|
||
3F39000
|
heap
|
page read and write
|
||
19A00025C000
|
trusted library allocation
|
page read and write
|
||
72AC00908000
|
trusted library allocation
|
page read and write
|
||
39E1000
|
heap
|
page read and write
|
||
6A2FF000
|
direct allocation
|
page read and write
|
||
72AC00C1C000
|
trusted library allocation
|
page read and write
|
||
B217FFE000
|
unkown
|
page readonly
|
||
199A000
|
heap
|
page read and write
|
||
72AC000EC000
|
trusted library allocation
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
B2751FA000
|
stack
|
page read and write
|
||
3A57000
|
heap
|
page read and write
|
||
11E1000
|
unkown
|
page readonly
|
||
72AC003E4000
|
trusted library allocation
|
page read and write
|
||
72AC0100C000
|
trusted library allocation
|
page read and write
|
||
72AC00418000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
unkown
|
page readonly
|
||
19A0002FC000
|
trusted library allocation
|
page read and write
|
||
72AC00380000
|
trusted library allocation
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
72AC00B34000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
72AC0056C000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
72AC006B8000
|
trusted library allocation
|
page read and write
|
||
72AC009E4000
|
trusted library allocation
|
page read and write
|
||
19A00027C000
|
trusted library allocation
|
page read and write
|
||
3F5F000
|
heap
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
26E0367B000
|
heap
|
page read and write
|
||
6A310000
|
direct allocation
|
page read and write
|
||
72AC00850000
|
trusted library allocation
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
72AC00614000
|
trusted library allocation
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
72AC00EC0000
|
trusted library allocation
|
page read and write
|
||
19A00040C000
|
trusted library allocation
|
page read and write
|
||
72AC00980000
|
trusted library allocation
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
3EAA000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
180000
|
heap
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
72AC007C8000
|
trusted library allocation
|
page read and write
|
||
26E09BB0000
|
trusted library section
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
11F000201000
|
direct allocation
|
page read and write
|
||
72AC00054000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
72AC00601000
|
trusted library allocation
|
page read and write
|
||
B2701FE000
|
stack
|
page read and write
|
||
72AC01078000
|
trusted library allocation
|
page read and write
|
||
26E7B39E000
|
heap
|
page read and write
|
||
19A0003EC000
|
trusted library allocation
|
page read and write
|
||
19A0002D4000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page execute read
|
||
3F25000
|
heap
|
page read and write
|
||
11DC000
|
unkown
|
page write copy
|
||
19A0002B8000
|
trusted library allocation
|
page read and write
|
||
26E09190000
|
heap
|
page read and write
|
||
26E09290000
|
heap
|
page read and write
|
||
B205FFE000
|
unkown
|
page readonly
|
||
72AC0016C000
|
trusted library allocation
|
page read and write
|
||
B20F7FC000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
19A000201000
|
trusted library allocation
|
page read and write
|
||
19A000230000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
72AC00F18000
|
trusted library allocation
|
page read and write
|
||
B2759FE000
|
unkown
|
page readonly
|
||
72AC00E01000
|
trusted library allocation
|
page read and write
|
||
B21AFFE000
|
unkown
|
page readonly
|
||
27AF000
|
stack
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
3A5C000
|
heap
|
page read and write
|
||
19A00035C000
|
trusted library allocation
|
page read and write
|
||
72AC00B9C000
|
trusted library allocation
|
page read and write
|
||
72AC00801000
|
trusted library allocation
|
page read and write
|
||
72AC002D0000
|
trusted library allocation
|
page read and write
|
||
6CBCD000
|
unkown
|
page read and write
|
||
3F1A000
|
heap
|
page read and write
|
||
6CAF0000
|
unkown
|
page readonly
|
||
19A6000
|
heap
|
page read and write
|
||
72AC00D48000
|
trusted library allocation
|
page read and write
|
||
72AC00C1C000
|
trusted library allocation
|
page read and write
|
||
19A0002F0000
|
trusted library allocation
|
page read and write
|
||
108E000
|
unkown
|
page readonly
|
||
72AC00380000
|
trusted library allocation
|
page read and write
|
||
198D000
|
heap
|
page read and write
|
||
72AC00EA4000
|
trusted library allocation
|
page read and write
|
||
72AC00778000
|
trusted library allocation
|
page read and write
|
||
B27C1FA000
|
stack
|
page read and write
|
||
19A0006D0000
|
trusted library allocation
|
page read and write
|
||
11F0002D0000
|
direct allocation
|
page read and write
|
||
26E077E8000
|
heap
|
page read and write
|
||
72AC00954000
|
trusted library allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
6A31B000
|
direct allocation
|
page read and write
|
||
26E09BD3000
|
trusted library section
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
26E03648000
|
heap
|
page read and write
|
||
26E07812000
|
heap
|
page read and write
|
||
3A9C000
|
heap
|
page read and write
|
||
25CD000
|
unkown
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
B2027FB000
|
stack
|
page read and write
|
||
19A000664000
|
trusted library allocation
|
page read and write
|
||
72AC002F0000
|
trusted library allocation
|
page read and write
|
||
B200FFE000
|
unkown
|
page readonly
|
||
26E7B440000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page write copy
|
||
72AC00590000
|
trusted library allocation
|
page read and write
|
||
72AC0006C000
|
trusted library allocation
|
page read and write
|
||
72AC00ADC000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
72AC00584000
|
trusted library allocation
|
page read and write
|
||
11F0002AC000
|
direct allocation
|
page read and write
|
||
6A326000
|
direct allocation
|
page read and write
|
||
72AC00F7C000
|
trusted library allocation
|
page read and write
|
||
72AC004B8000
|
trusted library allocation
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
B27A9FE000
|
unkown
|
page readonly
|
||
19E1000
|
heap
|
page read and write
|
||
72AC01158000
|
trusted library allocation
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
3A7A000
|
heap
|
page read and write
|
||
72AC00290000
|
trusted library allocation
|
page read and write
|
||
72AC002AA000
|
trusted library allocation
|
page read and write
|
||
B20AFFE000
|
unkown
|
page readonly
|
||
3DE3000
|
heap
|
page read and write
|
||
11DD000
|
unkown
|
page write copy
|
||
17ED000
|
stack
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
539400288000
|
trusted library allocation
|
page read and write
|
||
19A0006FC000
|
trusted library allocation
|
page read and write
|
||
B26D1FF000
|
stack
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
B2067FE000
|
stack
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
72AC0052F000
|
trusted library allocation
|
page read and write
|
||
72AC009AB000
|
trusted library allocation
|
page read and write
|
||
3DE4000
|
heap
|
page read and write
|
||
539400220000
|
trusted library allocation
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
B203FFE000
|
unkown
|
page readonly
|
||
EE1000
|
unkown
|
page execute read
|
||
72AC001AC000
|
trusted library allocation
|
page read and write
|
||
6A321000
|
direct allocation
|
page read and write
|
||
B26C1FE000
|
unkown
|
page read and write
|
||
6CAF1000
|
unkown
|
page execute read
|
||
19A000750000
|
trusted library allocation
|
page read and write
|
||
19A000248000
|
trusted library allocation
|
page read and write
|
||
19A0002F4000
|
trusted library allocation
|
page read and write
|
||
5394002C0000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
3EF7000
|
heap
|
page read and write
|
||
72AC00368000
|
trusted library allocation
|
page read and write
|
||
539400274000
|
trusted library allocation
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
72AC000B4000
|
trusted library allocation
|
page read and write
|
||
19A000250000
|
trusted library allocation
|
page read and write
|
||
72AC00E4C000
|
trusted library allocation
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
72AC001D0000
|
trusted library allocation
|
page read and write
|
||
B216FFE000
|
unkown
|
page readonly
|
||
5394002C0000
|
trusted library allocation
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
72AC00694000
|
trusted library allocation
|
page read and write
|
||
3DEC000
|
heap
|
page read and write
|
||
108E000
|
unkown
|
page readonly
|
||
B213FFE000
|
unkown
|
page readonly
|
||
72AC00078000
|
trusted library allocation
|
page read and write
|
||
26E03106000
|
heap
|
page read and write
|
||
108D000
|
unkown
|
page read and write
|
||
19A000430000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page write copy
|
||
72AC00918000
|
trusted library allocation
|
page read and write
|
||
3ED9000
|
heap
|
page read and write
|
||
19A000678000
|
trusted library allocation
|
page read and write
|
||
19A6000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
72AC00DE1000
|
trusted library allocation
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
72AC00234000
|
trusted library allocation
|
page read and write
|
||
72AC001F4000
|
trusted library allocation
|
page read and write
|
||
72AC00FD4000
|
trusted library allocation
|
page read and write
|
||
72AC00DD0000
|
trusted library allocation
|
page read and write
|
||
26E09B27000
|
unclassified section
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
190E000
|
heap
|
page read and write
|
||
B2117FD000
|
stack
|
page read and write
|
||
B2047FC000
|
stack
|
page read and write
|
||
3A5C000
|
heap
|
page read and write
|
||
72AC003A8000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
DF7F000
|
heap
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
72AC00198000
|
trusted library allocation
|
page read and write
|
||
19A0007B4000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
unkown
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
19A000688000
|
trusted library allocation
|
page read and write
|
||
3E97000
|
heap
|
page read and write
|
||
11F000210000
|
direct allocation
|
page read and write
|
||
193B000
|
heap
|
page read and write
|
||
19A000658000
|
trusted library allocation
|
page read and write
|
||
19A000354000
|
trusted library allocation
|
page read and write
|
||
5394002A0000
|
trusted library allocation
|
page read and write
|
||
19A000684000
|
trusted library allocation
|
page read and write
|
||
26E07807000
|
heap
|
page read and write
|
||
26E0366E000
|
heap
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
19BF000
|
heap
|
page read and write
|
||
B2087FC000
|
stack
|
page read and write
|
||
19A0002CC000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
72AC00D5C000
|
trusted library allocation
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
72AC00699000
|
trusted library allocation
|
page read and write
|
||
19A000320000
|
trusted library allocation
|
page read and write
|
||
72AC001B4000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
heap
|
page read and write
|
||
6A6F3000
|
direct allocation
|
page read and write
|
||
3F66000
|
heap
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
72AC00224000
|
trusted library allocation
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
72AC00A24000
|
trusted library allocation
|
page read and write
|
||
11F00026C000
|
direct allocation
|
page read and write
|
||
72AC00E6C000
|
trusted library allocation
|
page read and write
|
||
B218FFE000
|
unkown
|
page readonly
|
||
19C4000
|
heap
|
page read and write
|
||
72AC0129C000
|
trusted library allocation
|
page read and write
|
||
5394002F0000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
539400264000
|
trusted library allocation
|
page read and write
|
||
72AC010B4000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
72AC000DC000
|
trusted library allocation
|
page read and write
|
||
72AC010D4000
|
trusted library allocation
|
page read and write
|
||
B2789FE000
|
unkown
|
page readonly
|
||
72AC003B4000
|
trusted library allocation
|
page read and write
|
||
72AC002FB000
|
trusted library allocation
|
page read and write
|
||
B2761FC000
|
stack
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
72AC011B4000
|
trusted library allocation
|
page read and write
|
||
11C7000
|
unkown
|
page readonly
|
||
72AC012C4000
|
trusted library allocation
|
page read and write
|
||
3DE2000
|
heap
|
page read and write
|
||
69CC0000
|
direct allocation
|
page read and write
|
||
72AC002F3000
|
trusted library allocation
|
page read and write
|
||
72AC00E9C000
|
trusted library allocation
|
page read and write
|
||
3EB2000
|
heap
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
72AC003C0000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
72AC00EA8000
|
trusted library allocation
|
page read and write
|
||
5394002D8000
|
trusted library allocation
|
page read and write
|
||
19A00033C000
|
trusted library allocation
|
page read and write
|
||
3EB8000
|
heap
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
72AC00C4C000
|
trusted library allocation
|
page read and write
|
||
19A0006F0000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
26E035E0000
|
heap
|
page read and write
|
||
3EBA000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
72AC00CE0000
|
trusted library allocation
|
page read and write
|
||
72AC00B20000
|
trusted library allocation
|
page read and write
|
||
3EB4000
|
heap
|
page read and write
|
||
72AC004F4000
|
trusted library allocation
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
26E09477000
|
unclassified section
|
page read and write
|
||
19A00035C000
|
trusted library allocation
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
72AC00CD0000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
72AC00680000
|
trusted library allocation
|
page read and write
|
||
72AC00E58000
|
trusted library allocation
|
page read and write
|
||
5394002C8000
|
trusted library allocation
|
page read and write
|
||
72AC00724000
|
trusted library allocation
|
page read and write
|
||
19A0007E0000
|
trusted library allocation
|
page read and write
|
||
72AC00C5C000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
26E0310F000
|
heap
|
page read and write
|
||
26E058E0000
|
trusted library allocation
|
page read and write
|
||
19A000610000
|
trusted library allocation
|
page read and write
|
||
B2037FC000
|
stack
|
page read and write
|
||
72AC010F0000
|
trusted library allocation
|
page read and write
|
||
72AC00FB0000
|
trusted library allocation
|
page read and write
|
||
19A000320000
|
trusted library allocation
|
page read and write
|
||
19A000330000
|
trusted library allocation
|
page read and write
|
||
4849000
|
heap
|
page read and write
|
||
26E096B0000
|
trusted library section
|
page read and write
|
||
3EC7000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
72AC005A4000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
heap
|
page read and write
|
||
72AC00C70000
|
trusted library allocation
|
page read and write
|
||
26E0363B000
|
heap
|
page read and write
|
||
5394002B0000
|
trusted library allocation
|
page read and write
|
||
72AC00CF0000
|
trusted library allocation
|
page read and write
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
72AC00300000
|
trusted library allocation
|
page read and write
|
||
72AC006C8000
|
trusted library allocation
|
page read and write
|
||
72AC00EC0000
|
trusted library allocation
|
page read and write
|
||
B2187FA000
|
stack
|
page read and write
|
||
19A000330000
|
trusted library allocation
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
960000
|
heap
|
page read and write
|
||
B201FFE000
|
unkown
|
page readonly
|
||
72AC00D20000
|
trusted library allocation
|
page read and write
|
||
B20A7FD000
|
stack
|
page read and write
|
||
3DEA000
|
heap
|
page read and write
|
||
72AC006E4000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
19A0006AC000
|
trusted library allocation
|
page read and write
|
||
19A000624000
|
trusted library allocation
|
page read and write
|
||
19A00080C000
|
trusted library allocation
|
page read and write
|
||
72AC00220000
|
trusted library allocation
|
page read and write
|
||
18B6000
|
heap
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
3F3F000
|
heap
|
page read and write
|
||
3E9A000
|
heap
|
page read and write
|
||
72AC00820000
|
trusted library allocation
|
page read and write
|
||
19A00075C000
|
trusted library allocation
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
72AC00C20000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
72AC001A0000
|
trusted library allocation
|
page read and write
|
||
B2771FC000
|
stack
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
72AC001D8000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page write copy
|
||
19A0006BC000
|
trusted library allocation
|
page read and write
|
||
26E7B41C000
|
heap
|
page read and write
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
72AC0038C000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
19A0006C8000
|
trusted library allocation
|
page read and write
|
||
6A6EE000
|
direct allocation
|
page read and write
|
||
EEE000
|
unkown
|
page write copy
|
||
19A5000
|
heap
|
page read and write
|
||
19C1000
|
heap
|
page read and write
|
||
72AC00124000
|
trusted library allocation
|
page read and write
|
||
69CC1000
|
direct allocation
|
page execute read
|
||
3DE4000
|
heap
|
page read and write
|
||
72AC01170000
|
trusted library allocation
|
page read and write
|
||
19A000418000
|
trusted library allocation
|
page read and write
|
||
11F00020C000
|
direct allocation
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
19B4000
|
heap
|
page read and write
|
||
11F0002E4000
|
direct allocation
|
page read and write
|
||
26E7B388000
|
heap
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
3DE6000
|
heap
|
page read and write
|
||
72AC00CFC000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
72AC003C8000
|
trusted library allocation
|
page read and write
|
||
26E092A7000
|
unclassified section
|
page read and write
|
||
26E03102000
|
heap
|
page read and write
|
||
72AC00EB4000
|
trusted library allocation
|
page read and write
|
||
19A000714000
|
trusted library allocation
|
page read and write
|
||
72AC00001000
|
trusted library allocation
|
page read and write
|
||
72AC008F8000
|
trusted library allocation
|
page read and write
|
||
19A0002B0000
|
trusted library allocation
|
page read and write
|
||
72AC00E34000
|
trusted library allocation
|
page read and write
|
||
B20BFFE000
|
unkown
|
page readonly
|
||
26E03674000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
26E0A230000
|
trusted library section
|
page read and write
|
||
72AC010E0000
|
trusted library allocation
|
page read and write
|
||
72AC012B8000
|
trusted library allocation
|
page read and write
|
||
3A4D000
|
heap
|
page read and write
|
||
E961000
|
heap
|
page read and write
|
||
198A000
|
heap
|
page read and write
|
||
72AC0041C000
|
trusted library allocation
|
page read and write
|
||
B20EFFE000
|
unkown
|
page readonly
|
||
72AC00ED1000
|
trusted library allocation
|
page read and write
|
||
72AC00974000
|
trusted library allocation
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
3A4C000
|
heap
|
page read and write
|
||
72AC00B70000
|
trusted library allocation
|
page read and write
|
||
26E037C0000
|
trusted library section
|
page read and write
|
||
19A0006B4000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
243A000
|
stack
|
page read and write
|
||
19A000238000
|
trusted library allocation
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
26E09530000
|
trusted library section
|
page read and write
|
||
72AC00848000
|
trusted library allocation
|
page read and write
|
||
72AC00314000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
4047000
|
heap
|
page read and write
|
||
72AC009E4000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
72AC00E0C000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
72AC0021C000
|
trusted library allocation
|
page read and write
|
||
5394002F8000
|
trusted library allocation
|
page read and write
|
||
72AC00F44000
|
trusted library allocation
|
page read and write
|
||
72AC00DC4000
|
trusted library allocation
|
page read and write
|
||
5249000
|
heap
|
page read and write
|
||
B2779FE000
|
unkown
|
page readonly
|
||
19A000601000
|
trusted library allocation
|
page read and write
|
||
B26E9FE000
|
unkown
|
page readonly
|
||
72AC00E28000
|
trusted library allocation
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
B206FFE000
|
unkown
|
page readonly
|
||
3DEC000
|
heap
|
page read and write
|
||
72AC005DC000
|
trusted library allocation
|
page read and write
|
||
72AC00394000
|
trusted library allocation
|
page read and write
|
||
72AC000A0000
|
trusted library allocation
|
page read and write
|
||
46E2000
|
heap
|
page read and write
|
||
108C000
|
unkown
|
page write copy
|
||
19E1000
|
heap
|
page read and write
|
||
72AC0105C000
|
trusted library allocation
|
page read and write
|
||
19B5000
|
heap
|
page read and write
|
||
26E0363D000
|
heap
|
page read and write
|
||
72AC00518000
|
trusted library allocation
|
page read and write
|
||
B2147FE000
|
stack
|
page read and write
|
||
1087000
|
unkown
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
72AC003A8000
|
trusted library allocation
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
72AC00C98000
|
trusted library allocation
|
page read and write
|
||
3A63000
|
heap
|
page read and write
|
||
26E0360D000
|
heap
|
page read and write
|
||
72AC00890000
|
trusted library allocation
|
page read and write
|
||
72AC009E4000
|
trusted library allocation
|
page read and write
|
||
19A00078C000
|
trusted library allocation
|
page read and write
|
||
72AC01158000
|
trusted library allocation
|
page read and write
|
||
3F0A000
|
heap
|
page read and write
|
||
72AC00C20000
|
trusted library allocation
|
page read and write
|
||
18BA000
|
heap
|
page read and write
|
||
11F000270000
|
direct allocation
|
page read and write
|
||
3FCB000
|
heap
|
page read and write
|
||
3DE2000
|
heap
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
26E09313000
|
trusted library section
|
page read and write
|
||
72AC00D34000
|
trusted library allocation
|
page read and write
|
||
72AC00D0C000
|
trusted library allocation
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
26E0310B000
|
heap
|
page read and write
|
||
E197000
|
heap
|
page read and write
|
||
72AC008BC000
|
trusted library allocation
|
page read and write
|
||
72AC011A4000
|
trusted library allocation
|
page read and write
|
||
5394002B0000
|
trusted library allocation
|
page read and write
|
||
5394002BC000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
1993000
|
heap
|
page read and write
|
||
3DEC000
|
heap
|
page read and write
|
||
539400260000
|
trusted library allocation
|
page read and write
|
||
2638000
|
heap
|
page read and write
|
||
19A000408000
|
trusted library allocation
|
page read and write
|
||
3E92000
|
heap
|
page read and write
|
||
26E07720000
|
trusted library section
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
539400250000
|
trusted library allocation
|
page read and write
|
||
26E7B426000
|
heap
|
page read and write
|
||
72AC00FD4000
|
trusted library allocation
|
page read and write
|
||
72AC010CC000
|
trusted library allocation
|
page read and write
|
||
5394002C0000
|
trusted library allocation
|
page read and write
|
||
19A000788000
|
trusted library allocation
|
page read and write
|
||
72AC01201000
|
trusted library allocation
|
page read and write
|
||
26E0363F000
|
heap
|
page read and write
|
||
21CD000
|
stack
|
page read and write
|
||
B27C9FE000
|
unkown
|
page readonly
|
||
26E03110000
|
heap
|
page read and write
|
||
19A6000
|
heap
|
page read and write
|
||
26E077E0000
|
heap
|
page read and write
|
||
72AC00DE8000
|
trusted library allocation
|
page read and write
|
||
26E7B380000
|
heap
|
page read and write
|
||
11F00023C000
|
direct allocation
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
72AC00DDC000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
19A000784000
|
trusted library allocation
|
page read and write
|
||
72AC00B10000
|
trusted library allocation
|
page read and write
|
||
19A000424000
|
trusted library allocation
|
page read and write
|
||
72AC004A4000
|
trusted library allocation
|
page read and write
|
||
19A000730000
|
trusted library allocation
|
page read and write
|
||
B2721FA000
|
stack
|
page read and write
|
||
26E09BC1000
|
trusted library section
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
72AC00BA4000
|
trusted library allocation
|
page read and write
|
||
3FFD000
|
heap
|
page read and write
|
||
4006000
|
heap
|
page read and write
|
||
72AC00F88000
|
trusted library allocation
|
page read and write
|
||
72AC00EB4000
|
trusted library allocation
|
page read and write
|
||
19A000640000
|
trusted library allocation
|
page read and write
|
||
19A000248000
|
trusted library allocation
|
page read and write
|
||
3F29000
|
heap
|
page read and write
|
||
72AC00F04000
|
trusted library allocation
|
page read and write
|
||
B2177FE000
|
stack
|
page read and write
|
||
26E035FF000
|
heap
|
page read and write
|
||
3A75000
|
heap
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
11F000230000
|
direct allocation
|
page read and write
|
||
72AC0014C000
|
trusted library allocation
|
page read and write
|
||
5394002A0000
|
trusted library allocation
|
page read and write
|
||
72AC006FF000
|
trusted library allocation
|
page read and write
|
||
6A0BA000
|
direct allocation
|
page read and write
|
||
72AC0104C000
|
trusted library allocation
|
page read and write
|
||
72AC00AA8000
|
trusted library allocation
|
page read and write
|
||
72AC00E8C000
|
trusted library allocation
|
page read and write
|
||
72AC00214000
|
trusted library allocation
|
page read and write
|
||
5394002B0000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
heap
|
page read and write
|
||
EF1000
|
unkown
|
page readonly
|
||
3FEF000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
72AC01001000
|
trusted library allocation
|
page read and write
|
||
19A000401000
|
trusted library allocation
|
page read and write
|
||
3DEA000
|
heap
|
page read and write
|
||
26E0939D000
|
trusted library section
|
page read and write
|
||
19A0006B8000
|
trusted library allocation
|
page read and write
|
||
B2077FD000
|
stack
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
3E8F000
|
heap
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
B27E9FE000
|
unkown
|
page readonly
|
||
EE1000
|
unkown
|
page execute read
|
||
72AC00B84000
|
trusted library allocation
|
page read and write
|
||
72AC0015C000
|
trusted library allocation
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
26E0367B000
|
heap
|
page read and write
|
||
72AC00A01000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
72AC00210000
|
trusted library allocation
|
page read and write
|
||
72AC00230000
|
trusted library allocation
|
page read and write
|
||
72AC002A4000
|
trusted library allocation
|
page read and write
|
||
3ECE000
|
heap
|
page read and write
|
||
72AC00314000
|
trusted library allocation
|
page read and write
|
||
72AC00410000
|
trusted library allocation
|
page read and write
|
||
72AC00C68000
|
trusted library allocation
|
page read and write
|
||
72AC003D4000
|
trusted library allocation
|
page read and write
|
||
B211FFE000
|
unkown
|
page readonly
|
||
539400235000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
DE0000
|
heap
|
page read and write
|
||
72AC0080C000
|
trusted library allocation
|
page read and write
|
||
26E7B5B0000
|
trusted library allocation
|
page read and write
|
||
26E09436000
|
trusted library section
|
page read and write
|
||
72AC00FB0000
|
trusted library allocation
|
page read and write
|
||
72AC001AC000
|
trusted library allocation
|
page read and write
|
||
B2741FE000
|
stack
|
page read and write
|
||
B2127FD000
|
stack
|
page read and write
|
||
72AC006FC000
|
trusted library allocation
|
page read and write
|
||
26E09B41000
|
trusted library section
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
72AC00374000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
heap
|
page read and write
|
||
B27F1FE000
|
stack
|
page read and write
|
||
B2749FE000
|
unkown
|
page readonly
|
||
72AC0092C000
|
trusted library allocation
|
page read and write
|
||
72AC002B4000
|
trusted library allocation
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
26E035B0000
|
heap
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
26E7B550000
|
heap
|
page readonly
|
||
26E03103000
|
heap
|
page read and write
|
||
72AC00374000
|
trusted library allocation
|
page read and write
|
||
72AC00EB4000
|
trusted library allocation
|
page read and write
|
||
3F4F000
|
heap
|
page read and write
|
||
11F000234000
|
direct allocation
|
page read and write
|
||
11F000280000
|
direct allocation
|
page read and write
|
||
11F00024C000
|
direct allocation
|
page read and write
|
||
72AC001D4000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
unkown
|
page read and write
|
||
26E03641000
|
heap
|
page read and write
|
||
26E09CB2000
|
trusted library section
|
page read and write
|
||
11F00025C000
|
direct allocation
|
page read and write
|
||
72AC002C4000
|
trusted library allocation
|
page read and write
|
||
11F0002DC000
|
direct allocation
|
page read and write
|
||
72AC00228000
|
trusted library allocation
|
page read and write
|
||
72AC003A8000
|
trusted library allocation
|
page read and write
|
||
26E01910000
|
heap
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
72AC010AC000
|
trusted library allocation
|
page read and write
|
||
3EAB000
|
heap
|
page read and write
|
||
72AC001AC000
|
trusted library allocation
|
page read and write
|
||
B2167FE000
|
stack
|
page read and write
|
||
72AC00D6C000
|
trusted library allocation
|
page read and write
|
||
19A000320000
|
trusted library allocation
|
page read and write
|
||
72AC007B1000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
B21A7FE000
|
stack
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
26E03690000
|
heap
|
page read and write
|
||
72AC00DB4000
|
trusted library allocation
|
page read and write
|
||
3EC0000
|
heap
|
page read and write
|
||
72AC001E8000
|
trusted library allocation
|
page read and write
|
||
72AC002A8000
|
trusted library allocation
|
page read and write
|
||
26E09F40000
|
trusted library section
|
page read and write
|
||
26E0368D000
|
heap
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
B219FFE000
|
unkown
|
page readonly
|
||
19A000288000
|
trusted library allocation
|
page read and write
|
||
72AC0020C000
|
trusted library allocation
|
page read and write
|
||
3DE3000
|
heap
|
page read and write
|
||
26E7B5D0000
|
heap
|
page read and write
|
||
B27B1FD000
|
stack
|
page read and write
|
||
26E7B418000
|
heap
|
page read and write
|
||
72AC00E4C000
|
trusted library allocation
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
72AC002C4000
|
trusted library allocation
|
page read and write
|
||
26E7B560000
|
heap
|
page read and write
|
||
199C000
|
heap
|
page read and write
|
||
72AC0118C000
|
trusted library allocation
|
page read and write
|
||
72AC012A8000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
72AC00AF8000
|
trusted library allocation
|
page read and write
|
||
72AC002A8000
|
trusted library allocation
|
page read and write
|
||
72AC00F54000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
26E03102000
|
heap
|
page read and write
|
||
72AC00C83000
|
trusted library allocation
|
page read and write
|
||
19A000700000
|
trusted library allocation
|
page read and write
|
||
39DA000
|
heap
|
page read and write
|
||
B212FFE000
|
unkown
|
page readonly
|
||
199A000
|
heap
|
page read and write
|
||
72AC003E4000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page execute read
|
||
72AC00C68000
|
trusted library allocation
|
page read and write
|
||
19A000310000
|
trusted library allocation
|
page read and write
|
||
26E7B370000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
1997000
|
heap
|
page read and write
|
||
11F000284000
|
direct allocation
|
page read and write
|
||
3ED6000
|
heap
|
page read and write
|
||
26E030FE000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
19A000770000
|
trusted library allocation
|
page read and write
|
||
19A000630000
|
trusted library allocation
|
page read and write
|
||
3A74000
|
heap
|
page read and write
|
||
19A0006B0000
|
trusted library allocation
|
page read and write
|
||
72AC003E4000
|
trusted library allocation
|
page read and write
|
||
72AC00A18000
|
trusted library allocation
|
page read and write
|
||
19A0006EC000
|
trusted library allocation
|
page read and write
|
||
26E01953000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
5394002B0000
|
trusted library allocation
|
page read and write
|
||
72AC00C88000
|
trusted library allocation
|
page read and write
|
||
19A000380000
|
trusted library allocation
|
page read and write
|
||
B26F1FE000
|
stack
|
page read and write
|
||
3DE9000
|
heap
|
page read and write
|
||
11F000250000
|
direct allocation
|
page read and write
|
||
19A000220000
|
trusted library allocation
|
page read and write
|
||
26E077B7000
|
unclassified section
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
B26B1EF000
|
stack
|
page read and write
|
||
11F000220000
|
direct allocation
|
page read and write
|
||
72AC0020C000
|
trusted library allocation
|
page read and write
|
||
72AC00A80000
|
trusted library allocation
|
page read and write
|
||
72AC005C8000
|
trusted library allocation
|
page read and write
|
||
260E000
|
unkown
|
page read and write
|
||
19A000368000
|
trusted library allocation
|
page read and write
|
||
B26F9FE000
|
unkown
|
page readonly
|
||
72AC00F7C000
|
trusted library allocation
|
page read and write
|
||
72AC00394000
|
trusted library allocation
|
page read and write
|
||
26E7B590000
|
heap
|
page read and write
|
||
72AC00870000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
heap
|
page read and write
|
||
72AC009D0000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
19A000614000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
3A4C000
|
heap
|
page read and write
|
||
72AC012BC000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
199B000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
1085000
|
unkown
|
page write copy
|
||
72AC00DD0000
|
trusted library allocation
|
page read and write
|
||
3F2C000
|
heap
|
page read and write
|
||
3FBC000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page read and write
|
||
72AC00D50000
|
trusted library allocation
|
page read and write
|
||
72AC00B04000
|
trusted library allocation
|
page read and write
|
||
53940020C000
|
trusted library allocation
|
page read and write
|
||
72AC00B98000
|
trusted library allocation
|
page read and write
|
||
72AC003A0000
|
trusted library allocation
|
page read and write
|
||
72AC00DA8000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
72AC0060C000
|
trusted library allocation
|
page read and write
|
||
72AC00634000
|
trusted library allocation
|
page read and write
|
||
26E09F4E000
|
trusted library section
|
page read and write
|
||
72AC00CC4000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
3EA3000
|
heap
|
page read and write
|
||
3DEB000
|
heap
|
page read and write
|
||
19A000368000
|
trusted library allocation
|
page read and write
|
||
11F0002EC000
|
direct allocation
|
page read and write
|
||
FF9000
|
unkown
|
page write copy
|
||
19B4000
|
heap
|
page read and write
|
||
B2731FA000
|
stack
|
page read and write
|
||
19A000354000
|
trusted library allocation
|
page read and write
|
||
72AC002B8000
|
trusted library allocation
|
page read and write
|
||
72AC0008F000
|
trusted library allocation
|
page read and write
|
||
26E09293000
|
heap
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
26E030E0000
|
heap
|
page read and write
|
||
6CC19000
|
unkown
|
page read and write
|
||
26E09B50000
|
trusted library section
|
page read and write
|
||
B27B9FE000
|
unkown
|
page readonly
|
||
3DE4000
|
heap
|
page read and write
|
||
72AC001E4000
|
trusted library allocation
|
page read and write
|
||
72AC007B8000
|
trusted library allocation
|
page read and write
|
||
72AC00F74000
|
trusted library allocation
|
page read and write
|
||
72AC006EC000
|
trusted library allocation
|
page read and write
|
||
26E0A220000
|
trusted library section
|
page read and write
|
||
199C000
|
heap
|
page read and write
|
||
72AC009A4000
|
trusted library allocation
|
page read and write
|
||
72AC0009E000
|
trusted library allocation
|
page read and write
|
||
E824000
|
heap
|
page read and write
|
||
19A000754000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
72AC001DC000
|
trusted library allocation
|
page read and write
|
||
3A4C000
|
heap
|
page read and write
|
||
72AC00F64000
|
trusted library allocation
|
page read and write
|
||
26E03628000
|
heap
|
page read and write
|
||
406A000
|
heap
|
page read and write
|
||
19A000390000
|
trusted library allocation
|
page read and write
|
||
19A000374000
|
trusted library allocation
|
page read and write
|
||
26E09D4E000
|
trusted library section
|
page read and write
|
||
19A000620000
|
trusted library allocation
|
page read and write
|
||
72AC00624000
|
trusted library allocation
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
72AC00538000
|
trusted library allocation
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
72AC001B4000
|
trusted library allocation
|
page read and write
|
||
72AC00488000
|
trusted library allocation
|
page read and write
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
72AC00EE8000
|
trusted library allocation
|
page read and write
|
||
72AC00E40000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
26E030F9000
|
heap
|
page read and write
|
||
26E03675000
|
heap
|
page read and write
|
||
B214FFE000
|
unkown
|
page readonly
|
||
3DEA000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
B215FFE000
|
unkown
|
page readonly
|
||
72AC01040000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
72AC005B4000
|
trusted library allocation
|
page read and write
|
||
19A000320000
|
trusted library allocation
|
page read and write
|
||
72AC001CC000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
heap
|
page read and write
|
||
19A00033C000
|
trusted library allocation
|
page read and write
|
||
72AC01020000
|
trusted library allocation
|
page read and write
|
||
539400248000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
stack
|
page read and write
|
||
72AC00798000
|
trusted library allocation
|
page read and write
|
||
19A0002E4000
|
trusted library allocation
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
B2057FD000
|
stack
|
page read and write
|
||
11F000294000
|
direct allocation
|
page read and write
|
||
72AC00CD0000
|
trusted library allocation
|
page read and write
|
||
B21BFFE000
|
unkown
|
page readonly
|
||
72AC0035C000
|
trusted library allocation
|
page read and write
|
||
72AC0076C000
|
trusted library allocation
|
page read and write
|
||
19A000364000
|
trusted library allocation
|
page read and write
|
||
B208FFE000
|
unkown
|
page readonly
|
||
19A000744000
|
trusted library allocation
|
page read and write
|
||
19A0006E4000
|
trusted library allocation
|
page read and write
|
||
26E0364F000
|
heap
|
page read and write
|
||
72AC00CA4000
|
trusted library allocation
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
3FD4000
|
heap
|
page read and write
|
||
72AC00F6C000
|
trusted library allocation
|
page read and write
|
||
19A000724000
|
trusted library allocation
|
page read and write
|
||
B20DFFE000
|
unkown
|
page readonly
|
||
19BF000
|
heap
|
page read and write
|
||
3E7A000
|
heap
|
page read and write
|
||
6A309000
|
direct allocation
|
page read and write
|
||
3DE6000
|
heap
|
page read and write
|
||
72AC001C4000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
72AC0001C000
|
trusted library allocation
|
page read and write
|
||
72AC000AC000
|
trusted library allocation
|
page read and write
|
||
72AC0120C000
|
trusted library allocation
|
page read and write
|
||
72AC00F44000
|
trusted library allocation
|
page read and write
|
||
19A000698000
|
trusted library allocation
|
page read and write
|
||
B20D7FE000
|
stack
|
page read and write
|
||
72AC00DD0000
|
trusted library allocation
|
page read and write
|
||
72AC00740000
|
trusted library allocation
|
page read and write
|
||
72AC002F0000
|
trusted library allocation
|
page read and write
|
||
198A000
|
heap
|
page read and write
|
||
72AC00A0C000
|
trusted library allocation
|
page read and write
|
||
72AC00EDC000
|
trusted library allocation
|
page read and write
|
||
72AC01030000
|
trusted library allocation
|
page read and write
|
||
72AC01100000
|
trusted library allocation
|
page read and write
|
||
3F79000
|
heap
|
page read and write
|
||
26E030D0000
|
heap
|
page read and write
|
||
B20CFFE000
|
unkown
|
page readonly
|
||
3DE2000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
19A0007C8000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
26E09B30000
|
trusted library section
|
page read and write
|
||
72AC00EC0000
|
trusted library allocation
|
page read and write
|
||
72AC00B7C000
|
trusted library allocation
|
page read and write
|
||
B2791FE000
|
stack
|
page read and write
|
||
11F0002A8000
|
direct allocation
|
page read and write
|
||
B26E1FE000
|
stack
|
page read and write
|
||
3EE9000
|
heap
|
page read and write
|
||
3EED000
|
heap
|
page read and write
|
||
72AC0129C000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
11F000303000
|
direct allocation
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
19A000210000
|
trusted library allocation
|
page read and write
|
||
72AC001B4000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page read and write
|
||
26E036B0000
|
trusted library section
|
page read and write
|
||
72AC00268000
|
trusted library allocation
|
page read and write
|
||
72AC000FC000
|
trusted library allocation
|
page read and write
|
||
198A000
|
heap
|
page read and write
|
||
72AC00A8C000
|
trusted library allocation
|
page read and write
|
||
19A0006E0000
|
trusted library allocation
|
page read and write
|
||
72AC00060000
|
trusted library allocation
|
page read and write
|
||
26E03693000
|
heap
|
page read and write
|
||
72AC001F8000
|
trusted library allocation
|
page read and write
|
||
5394002E4000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
heap
|
page read and write
|
||
72AC00AC8000
|
trusted library allocation
|
page read and write
|
||
B207FFE000
|
unkown
|
page readonly
|
||
3A4C000
|
heap
|
page read and write
|
||
26E09BA0000
|
trusted library section
|
page read and write
|
||
26E093D0000
|
trusted library section
|
page read and write
|
||
1086000
|
unkown
|
page write copy
|
||
19A00060C000
|
trusted library allocation
|
page read and write
|
||
B20FFFE000
|
unkown
|
page readonly
|
||
DFD000
|
stack
|
page read and write
|
||
421D000
|
heap
|
page read and write
|
||
72AC00494000
|
trusted library allocation
|
page read and write
|
||
26E07322000
|
trusted library allocation
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
72AC00750000
|
trusted library allocation
|
page read and write
|
There are 1112 hidden memdumps, click here to show them.