Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_ad8e99f4-1128-4a88-8ad8-b8de07056b8d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E04.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 13:29:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FDA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2039.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2284,i,475624526408043289,8302134231628123447,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1140
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b--time-ticks-at-unix-epoc
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultouch
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://chrome.google.cou
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
||
http://issuetracker.google.com/200067929
|
unknown
|
||
https://lens.google.com/v3/2
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6C50000
|
direct allocation
|
page read and write
|
||
76DC000
|
heap
|
page read and write
|
||
4D7C00210000
|
trusted library allocation
|
page read and write
|
||
3EAC00274000
|
trusted library allocation
|
page read and write
|
||
7644000
|
heap
|
page read and write
|
||
4D7C0069C000
|
trusted library allocation
|
page read and write
|
||
196DC471000
|
trusted library section
|
page read and write
|
||
196D5629000
|
heap
|
page read and write
|
||
181400DCC000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
7643000
|
heap
|
page read and write
|
||
18140098C000
|
trusted library allocation
|
page read and write
|
||
764E000
|
heap
|
page read and write
|
||
196DC503000
|
trusted library section
|
page read and write
|
||
196D55FD000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
77F6000
|
heap
|
page read and write
|
||
181400D18000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D561A000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
8E1DDFE000
|
stack
|
page read and write
|
||
181400EB0000
|
trusted library allocation
|
page read and write
|
||
8E3B5FE000
|
unkown
|
page readonly
|
||
181400338000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
181400F68000
|
trusted library allocation
|
page read and write
|
||
4D7C007CC000
|
trusted library allocation
|
page read and write
|
||
3EAC002C0000
|
trusted library allocation
|
page read and write
|
||
196D5AE0000
|
heap
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
8E3ADFA000
|
stack
|
page read and write
|
||
196D5B75000
|
heap
|
page read and write
|
||
1814007F4000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400C7C000
|
trusted library allocation
|
page read and write
|
||
181400C60000
|
trusted library allocation
|
page read and write
|
||
2BF000284000
|
direct allocation
|
page read and write
|
||
6C1AD000
|
unkown
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E2EDFD000
|
stack
|
page read and write
|
||
196D5B1D000
|
heap
|
page read and write
|
||
2BF000294000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
764F000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
60A000
|
unkown
|
page readonly
|
||
181400064000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400E01000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
4D7C006D0000
|
trusted library allocation
|
page read and write
|
||
181400C38000
|
trusted library allocation
|
page read and write
|
||
196D212B000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1814009D4000
|
trusted library allocation
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
77CC000
|
heap
|
page read and write
|
||
611000
|
unkown
|
page readonly
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1814001D4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400888000
|
trusted library allocation
|
page read and write
|
||
1D68000
|
heap
|
page read and write
|
||
4D7C00418000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
775A000
|
heap
|
page read and write
|
||
196D561A000
|
heap
|
page read and write
|
||
196DC4D0000
|
trusted library section
|
page read and write
|
||
181400CA4000
|
trusted library allocation
|
page read and write
|
||
1814002D0000
|
trusted library allocation
|
page read and write
|
||
196D5623000
|
heap
|
page read and write
|
||
181400230000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5A60000
|
trusted library section
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400B68000
|
trusted library allocation
|
page read and write
|
||
181400E44000
|
trusted library allocation
|
page read and write
|
||
601000
|
unkown
|
page execute read
|
||
4D7C00614000
|
trusted library allocation
|
page read and write
|
||
196D1FD0000
|
heap
|
page read and write
|
||
4D7C00630000
|
trusted library allocation
|
page read and write
|
||
3EAC002F0000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
8E31DFE000
|
stack
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E1D5FE000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
296A000
|
heap
|
page read and write
|
||
196D55E0000
|
heap
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
8E2C5FE000
|
unkown
|
page readonly
|
||
181400AF8000
|
trusted library allocation
|
page read and write
|
||
181400CA8000
|
trusted library allocation
|
page read and write
|
||
196D5613000
|
heap
|
page read and write
|
||
1814001E4000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814000A0000
|
trusted library allocation
|
page read and write
|
||
18140037C000
|
trusted library allocation
|
page read and write
|
||
196D5617000
|
heap
|
page read and write
|
||
4D7C00668000
|
trusted library allocation
|
page read and write
|
||
1814003DC000
|
trusted library allocation
|
page read and write
|
||
196DC49E000
|
trusted library section
|
page read and write
|
||
181400CE0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
3EAC002B0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
196D9AD4000
|
trusted library allocation
|
page read and write
|
||
181400D48000
|
trusted library allocation
|
page read and write
|
||
8E37DFE000
|
stack
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400BC8000
|
trusted library allocation
|
page read and write
|
||
4D7C006B8000
|
trusted library allocation
|
page read and write
|
||
196D5622000
|
heap
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
6C0D0000
|
unkown
|
page readonly
|
||
181400E50000
|
trusted library allocation
|
page read and write
|
||
4D7C00664000
|
trusted library allocation
|
page read and write
|
||
196D59F0000
|
trusted library section
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
8E1EDFE000
|
stack
|
page read and write
|
||
4D7C00698000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
181400300000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E12DFE000
|
stack
|
page read and write
|
||
8E315FE000
|
unkown
|
page readonly
|
||
784D000
|
heap
|
page read and write
|
||
18140009E000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E345FE000
|
unkown
|
page readonly
|
||
196D5622000
|
heap
|
page read and write
|
||
4D7C00700000
|
trusted library allocation
|
page read and write
|
||
181400554000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
8E335FE000
|
unkown
|
page readonly
|
||
77A8000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400EA8000
|
trusted library allocation
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
196D2000000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D20DF000
|
heap
|
page read and write
|
||
76E7000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5B1B000
|
heap
|
page read and write
|
||
18140080C000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
4D7C00718000
|
trusted library allocation
|
page read and write
|
||
1814002C0000
|
trusted library allocation
|
page read and write
|
||
77E9000
|
heap
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
8E40DFE000
|
stack
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
76E4000
|
heap
|
page read and write
|
||
181400E80000
|
trusted library allocation
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
8E2F5FE000
|
unkown
|
page readonly
|
||
8E22DFE000
|
stack
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196DC4E0000
|
trusted library section
|
page read and write
|
||
181400944000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
2BF000215000
|
direct allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
181400D70000
|
trusted library allocation
|
page read and write
|
||
2BF0002E4000
|
direct allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
76A2000
|
direct allocation
|
page read and write
|
||
181400F20000
|
trusted library allocation
|
page read and write
|
||
3EAC00270000
|
trusted library allocation
|
page read and write
|
||
196D55F6000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
2BF000201000
|
direct allocation
|
page read and write
|
||
8E325FE000
|
unkown
|
page readonly
|
||
1B74000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
3EAC002A0000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
8E395FE000
|
unkown
|
page readonly
|
||
76E6000
|
heap
|
page read and write
|
||
181400194000
|
trusted library allocation
|
page read and write
|
||
181400F80000
|
trusted library allocation
|
page read and write
|
||
196D5AE8000
|
heap
|
page read and write
|
||
1814006DC000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1814002A4000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400214000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E2FDFD000
|
stack
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400A44000
|
trusted library allocation
|
page read and write
|
||
196D3F20000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400840000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
7737000
|
heap
|
page read and write
|
||
1814001F4000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D55FB000
|
heap
|
page read and write
|
||
4D7C0075C000
|
trusted library allocation
|
page read and write
|
||
2BF000210000
|
direct allocation
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
4D7C003EC000
|
trusted library allocation
|
page read and write
|
||
60A000
|
unkown
|
page readonly
|
||
196D5610000
|
heap
|
page read and write
|
||
181400338000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
18140021C000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
181400318000
|
trusted library allocation
|
page read and write
|
||
196D55FB000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
181400CF8000
|
trusted library allocation
|
page read and write
|
||
4D7C006C8000
|
trusted library allocation
|
page read and write
|
||
8E1B5FE000
|
unkown
|
page readonly
|
||
181400F04000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E19DFE000
|
stack
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E3A5FE000
|
unkown
|
page readonly
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
2BF00020C000
|
direct allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
181400504000
|
trusted library allocation
|
page read and write
|
||
196D563A000
|
heap
|
page read and write
|
||
60E000
|
unkown
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C00694000
|
trusted library allocation
|
page read and write
|
||
196D1F90000
|
heap
|
page readonly
|
||
1B74000
|
heap
|
page read and write
|
||
2BF0002EC000
|
direct allocation
|
page read and write
|
||
181400E0C000
|
trusted library allocation
|
page read and write
|
||
1814002AA000
|
trusted library allocation
|
page read and write
|
||
181400C55000
|
trusted library allocation
|
page read and write
|
||
4D7C00320000
|
trusted library allocation
|
page read and write
|
||
8E26DFC000
|
stack
|
page read and write
|
||
181400454000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196DBC00000
|
trusted library section
|
page read and write
|
||
181400824000
|
trusted library allocation
|
page read and write
|
||
196D5B8A000
|
heap
|
page read and write
|
||
7787000
|
heap
|
page read and write
|
||
196D2113000
|
heap
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
8E33DFD000
|
stack
|
page read and write
|
||
3EAC00235000
|
trusted library allocation
|
page read and write
|
||
77AD000
|
heap
|
page read and write
|
||
3EAC00264000
|
trusted library allocation
|
page read and write
|
||
8E375FE000
|
unkown
|
page readonly
|
||
2BF000230000
|
direct allocation
|
page read and write
|
||
181400CA4000
|
trusted library allocation
|
page read and write
|
||
1814002E0000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
8E29DFB000
|
stack
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
1814008F0000
|
trusted library allocation
|
page read and write
|
||
181400A0C000
|
trusted library allocation
|
page read and write
|
||
4D7C00248000
|
trusted library allocation
|
page read and write
|
||
4D7C006E4000
|
trusted library allocation
|
page read and write
|
||
181400F9C000
|
trusted library allocation
|
page read and write
|
||
181400338000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
18140027C000
|
trusted library allocation
|
page read and write
|
||
196D2240000
|
trusted library section
|
page readonly
|
||
181400CF0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
181400F10000
|
trusted library allocation
|
page read and write
|
||
196D563A000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400300000
|
trusted library allocation
|
page read and write
|
||
778D000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
2BF000280000
|
direct allocation
|
page read and write
|
||
8E1C5FE000
|
unkown
|
page readonly
|
||
181400444000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
8E3BDFE000
|
stack
|
page read and write
|
||
8E15DFE000
|
stack
|
page read and write
|
||
181400CF8000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400ED0000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
196D5B13000
|
heap
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
181400E8C000
|
trusted library allocation
|
page read and write
|
||
8E2D5FE000
|
unkown
|
page readonly
|
||
181400BA4000
|
trusted library allocation
|
page read and write
|
||
1814004E4000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E10DEF000
|
stack
|
page read and write
|
||
4D7C0027C000
|
trusted library allocation
|
page read and write
|
||
181400904000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E30DFB000
|
stack
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
1814002AA000
|
trusted library allocation
|
page read and write
|
||
181400AEB000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page read and write
|
||
196D9220000
|
trusted library allocation
|
page read and write
|
||
181400C50000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
4D7C00724000
|
trusted library allocation
|
page read and write
|
||
76DF000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
181400B7C000
|
trusted library allocation
|
page read and write
|
||
196DC5A6000
|
trusted library section
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400CF0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C006E0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5CB0000
|
trusted library section
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
1814001F8000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
80A9000
|
heap
|
page read and write
|
||
18140030C000
|
trusted library allocation
|
page read and write
|
||
181400E24000
|
trusted library allocation
|
page read and write
|
||
8E21DFA000
|
stack
|
page read and write
|
||
1814002B4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
18140032C000
|
trusted library allocation
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400A44000
|
trusted library allocation
|
page read and write
|
||
181400690000
|
trusted library allocation
|
page read and write
|
||
4D7C0035C000
|
trusted library allocation
|
page read and write
|
||
196D5AE4000
|
heap
|
page read and write
|
||
796F000
|
heap
|
page read and write
|
||
4D7C006CC000
|
trusted library allocation
|
page read and write
|
||
6C1FC000
|
unkown
|
page readonly
|
||
18140020C000
|
trusted library allocation
|
page read and write
|
||
1814006C8000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
4D7C0035C000
|
trusted library allocation
|
page read and write
|
||
18140074C000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
8E17DFB000
|
stack
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D9012000
|
heap
|
page read and write
|
||
8E27DFC000
|
stack
|
page read and write
|
||
18140030C000
|
trusted library allocation
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D562B000
|
heap
|
page read and write
|
||
8E3F5FE000
|
unkown
|
page readonly
|
||
4D7C006B0000
|
trusted library allocation
|
page read and write
|
||
196D5B4C000
|
heap
|
page read and write
|
||
7788000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
1814002A4000
|
trusted library allocation
|
page read and write
|
||
28DF000
|
unkown
|
page read and write
|
||
8E145FE000
|
unkown
|
page readonly
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
795C000
|
heap
|
page read and write
|
||
181400074000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
3EAC002A0000
|
trusted library allocation
|
page read and write
|
||
181400910000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
196D5612000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
1814001B4000
|
trusted library allocation
|
page read and write
|
||
181400B74000
|
trusted library allocation
|
page read and write
|
||
196D55FB000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
289E000
|
unkown
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5D47000
|
unclassified section
|
page read and write
|
||
1814001DC000
|
trusted library allocation
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
4D7C00620000
|
trusted library allocation
|
page read and write
|
||
8E3FDFE000
|
stack
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
77BF000
|
heap
|
page read and write
|
||
4D7C0033C000
|
trusted library allocation
|
page read and write
|
||
196D5617000
|
heap
|
page read and write
|
||
1814006A0000
|
trusted library allocation
|
page read and write
|
||
18140079E000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400F64000
|
trusted library allocation
|
page read and write
|
||
2BF000290000
|
direct allocation
|
page read and write
|
||
181400201000
|
trusted library allocation
|
page read and write
|
||
8E405FE000
|
unkown
|
page readonly
|
||
6C61000
|
heap
|
page read and write
|
||
196D8FE0000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400DA8000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
1814007A8000
|
trusted library allocation
|
page read and write
|
||
8E3EDFE000
|
stack
|
page read and write
|
||
181400728000
|
trusted library allocation
|
page read and write
|
||
1814001EC000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
1814006B0000
|
trusted library allocation
|
page read and write
|
||
789E000
|
heap
|
page read and write
|
||
196D5607000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
780B000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400E6B000
|
trusted library allocation
|
page read and write
|
||
7649000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400340000
|
trusted library allocation
|
page read and write
|
||
3EAC00294000
|
trusted library allocation
|
page read and write
|
||
181400ABC000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
601000
|
unkown
|
page execute read
|
||
7340000
|
direct allocation
|
page execute and read and write
|
||
8E3CDFC000
|
stack
|
page read and write
|
||
7641000
|
heap
|
page read and write
|
||
D41000
|
unkown
|
page execute and write copy
|
||
196D5B27000
|
heap
|
page read and write
|
||
18140022C000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C006EC000
|
trusted library allocation
|
page read and write
|
||
181400218000
|
trusted library allocation
|
page read and write
|
||
4D7C00784000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
8E245FE000
|
unkown
|
page readonly
|
||
1B74000
|
heap
|
page read and write
|
||
611000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
1814002F0000
|
trusted library allocation
|
page read and write
|
||
2BF000260000
|
direct allocation
|
page read and write
|
||
8E125FE000
|
unkown
|
page readonly
|
||
787B000
|
heap
|
page read and write
|
||
181400128000
|
trusted library allocation
|
page read and write
|
||
3EAC002B0000
|
trusted library allocation
|
page read and write
|
||
196D5B65000
|
heap
|
page read and write
|
||
3EAC002C8000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
60E000
|
unkown
|
page write copy
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400E44000
|
trusted library allocation
|
page read and write
|
||
79C9000
|
heap
|
page read and write
|
||
4D7C00424000
|
trusted library allocation
|
page read and write
|
||
7649000
|
heap
|
page read and write
|
||
181400980000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
18140063C000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
764F000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
4D7C00230000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
8E36DFE000
|
stack
|
page read and write
|
||
3EAC002E4000
|
trusted library allocation
|
page read and write
|
||
18140018C000
|
trusted library allocation
|
page read and write
|
||
1814008B4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
181400838000
|
trusted library allocation
|
page read and write
|
||
196D2295000
|
heap
|
page read and write
|
||
4D7C00310000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page read and write
|
||
1814004A4000
|
trusted library allocation
|
page read and write
|
||
1814001E8000
|
trusted library allocation
|
page read and write
|
||
181400B68000
|
trusted library allocation
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
CA7000
|
heap
|
page read and write
|
||
196DC492000
|
trusted library section
|
page read and write
|
||
181400E28000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C00714000
|
trusted library allocation
|
page read and write
|
||
196D900E000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
2BF0002AC000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814006F8000
|
trusted library allocation
|
page read and write
|
||
181400770000
|
trusted library allocation
|
page read and write
|
||
4D7C00238000
|
trusted library allocation
|
page read and write
|
||
181400001000
|
trusted library allocation
|
page read and write
|
||
196D560B000
|
heap
|
page read and write
|
||
1814004DC000
|
trusted library allocation
|
page read and write
|
||
181400EAC000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E2BDFB000
|
stack
|
page read and write
|
||
7649000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
2BF000270000
|
direct allocation
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
181400A28000
|
trusted library allocation
|
page read and write
|
||
196D1FF0000
|
trusted library allocation
|
page read and write
|
||
196D5BA6000
|
heap
|
page read and write
|
||
181400AC4000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
4D7C00248000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814004A4000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400788000
|
trusted library allocation
|
page read and write
|
||
4D7C007B4000
|
trusted library allocation
|
page read and write
|
||
181400C01000
|
trusted library allocation
|
page read and write
|
||
1814002FB000
|
trusted library allocation
|
page read and write
|
||
8E1E5FE000
|
unkown
|
page readonly
|
||
6C1AF000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
780A000
|
heap
|
page read and write
|
||
7701000
|
heap
|
page read and write
|
||
196D55F8000
|
heap
|
page read and write
|
||
181400338000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400C0C000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
3EAC002F8000
|
trusted library allocation
|
page read and write
|
||
196D9AF2000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
4D7C0025C000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
77A7000
|
heap
|
page read and write
|
||
196D55FC000
|
heap
|
page read and write
|
||
181400EE0000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D3F73000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
4D7C00688000
|
trusted library allocation
|
page read and write
|
||
4D7C00354000
|
trusted library allocation
|
page read and write
|
||
181400F8C000
|
trusted library allocation
|
page read and write
|
||
1814001B4000
|
trusted library allocation
|
page read and write
|
||
18140070B000
|
trusted library allocation
|
page read and write
|
||
18140015C000
|
trusted library allocation
|
page read and write
|
||
196DC480000
|
trusted library section
|
page read and write
|
||
196D55F6000
|
heap
|
page read and write
|
||
196DC0AE000
|
trusted library section
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400E38000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
2BF0002D0000
|
direct allocation
|
page read and write
|
||
8E34DFD000
|
stack
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
7647000
|
heap
|
page read and write
|
||
76E9000
|
heap
|
page read and write
|
||
4D7C0078C000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5612000
|
heap
|
page read and write
|
||
4D7C00658000
|
trusted library allocation
|
page read and write
|
||
4D7C00610000
|
trusted library allocation
|
page read and write
|
||
181400C90000
|
trusted library allocation
|
page read and write
|
||
4D7C00644000
|
trusted library allocation
|
page read and write
|
||
764A000
|
heap
|
page read and write
|
||
196D55F7000
|
heap
|
page read and write
|
||
181400DE8000
|
trusted library allocation
|
page read and write
|
||
181400D64000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
3EAC002B0000
|
trusted library allocation
|
page read and write
|
||
196DC64E000
|
trusted library section
|
page read and write
|
||
1814007B4000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
4D7C00320000
|
trusted library allocation
|
page read and write
|
||
181400134000
|
trusted library allocation
|
page read and write
|
||
8E235FE000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
8E1F5FE000
|
unkown
|
page readonly
|
||
6C61000
|
heap
|
page read and write
|
||
77FB000
|
direct allocation
|
page read and write
|
||
8E255FE000
|
unkown
|
page readonly
|
||
196D5605000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
1814003A4000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400390000
|
trusted library allocation
|
page read and write
|
||
181400B94000
|
trusted library allocation
|
page read and write
|
||
1814001D8000
|
trusted library allocation
|
page read and write
|
||
181400450000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D55F4000
|
heap
|
page read and write
|
||
764F000
|
heap
|
page read and write
|
||
181400E5C000
|
trusted library allocation
|
page read and write
|
||
181400F04000
|
trusted library allocation
|
page read and write
|
||
1814005D0000
|
trusted library allocation
|
page read and write
|
||
77D2000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196DC600000
|
trusted library section
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
1814004EC000
|
trusted library allocation
|
page read and write
|
||
6C1F8000
|
unkown
|
page readonly
|
||
181400960000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E355FE000
|
unkown
|
page readonly
|
||
DFC000
|
stack
|
page read and write
|
||
8E2CDFC000
|
stack
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
6C1F9000
|
unkown
|
page read and write
|
||
181400AAC000
|
trusted library allocation
|
page read and write
|
||
3EAC002C0000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400A01000
|
trusted library allocation
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
4D7C00390000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
181400E1C000
|
trusted library allocation
|
page read and write
|
||
181400F3C000
|
trusted library allocation
|
page read and write
|
||
65D000
|
stack
|
page read and write
|
||
2BF000220000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5607000
|
heap
|
page read and write
|
||
1814004B8000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
181400E44000
|
trusted library allocation
|
page read and write
|
||
18140041E000
|
trusted library allocation
|
page read and write
|
||
4D7C0039C000
|
trusted library allocation
|
page read and write
|
||
181400020000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
181400338000
|
trusted library allocation
|
page read and write
|
||
181400220000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C00770000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
181400224000
|
trusted library allocation
|
page read and write
|
||
3EAC00260000
|
trusted library allocation
|
page read and write
|
||
779B000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
2BF000234000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400E74000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E165FE000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
181400D30000
|
trusted library allocation
|
page read and write
|
||
18140032C000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
3EAC002C0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC002C0000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
8E225FE000
|
unkown
|
page readonly
|
||
764F000
|
heap
|
page read and write
|
||
181400ECC000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
181400CB4000
|
trusted library allocation
|
page read and write
|
||
181400D5C000
|
trusted library allocation
|
page read and write
|
||
8E24DFE000
|
stack
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
181400290000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
7939000
|
heap
|
page read and write
|
||
4D7C002E4000
|
trusted library allocation
|
page read and write
|
||
196D55F8000
|
heap
|
page read and write
|
||
196D5B7D000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E39DFE000
|
stack
|
page read and write
|
||
181400CC8000
|
trusted library allocation
|
page read and write
|
||
181400C68000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC002C0000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
7643000
|
heap
|
page read and write
|
||
196D5B17000
|
heap
|
page read and write
|
||
196D20EA000
|
heap
|
page read and write
|
||
196D5BB6000
|
heap
|
page read and write
|
||
196D55F8000
|
heap
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
196D2102000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
181400C2C000
|
trusted library allocation
|
page read and write
|
||
77E9000
|
heap
|
page read and write
|
||
196D20C1000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196DB6E7000
|
unclassified section
|
page read and write
|
||
1814005E4000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D1FA0000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
780D000
|
heap
|
page read and write
|
||
4D7C00640000
|
trusted library allocation
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
1814001C4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400648000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E275FE000
|
unkown
|
page readonly
|
||
181400798000
|
trusted library allocation
|
page read and write
|
||
4D7C00734000
|
trusted library allocation
|
page read and write
|
||
4D7C00354000
|
trusted library allocation
|
page read and write
|
||
181400D9C000
|
trusted library allocation
|
page read and write
|
||
1814001A0000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
4D7C00678000
|
trusted library allocation
|
page read and write
|
||
8E35DFE000
|
stack
|
page read and write
|
||
4D7C00330000
|
trusted library allocation
|
page read and write
|
||
181400BF4000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
18140034C000
|
trusted library allocation
|
page read and write
|
||
611000
|
unkown
|
page readonly
|
||
18140036C000
|
trusted library allocation
|
page read and write
|
||
771F000
|
heap
|
page read and write
|
||
601000
|
unkown
|
page execute read
|
||
6C61000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
106E000
|
stack
|
page read and write
|
||
196D563A000
|
heap
|
page read and write
|
||
1A1F000
|
stack
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5B0F000
|
heap
|
page read and write
|
||
18140001C000
|
trusted library allocation
|
page read and write
|
||
4D7C002F4000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
8E1ADFA000
|
stack
|
page read and write
|
||
196D5B5E000
|
heap
|
page read and write
|
||
4D7C00330000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C00654000
|
trusted library allocation
|
page read and write
|
||
1814005A0000
|
trusted library allocation
|
page read and write
|
||
8E1FDFE000
|
stack
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
7777000
|
heap
|
page read and write
|
||
3EAC002A0000
|
trusted library allocation
|
page read and write
|
||
3EAC0020C000
|
trusted library allocation
|
page read and write
|
||
1814002F0000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
heap
|
page read and write
|
||
18140020C000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
4D7C00684000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E3C5FE000
|
unkown
|
page readonly
|
||
4D7C00288000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
18140084C000
|
trusted library allocation
|
page read and write
|
||
4D7C00408000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C002B0000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400A50000
|
trusted library allocation
|
page read and write
|
||
1814006E8000
|
trusted library allocation
|
page read and write
|
||
3EAC00230000
|
trusted library allocation
|
page read and write
|
||
18140016C000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
1814000F0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D561A000
|
heap
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
196D561B000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
8E25DFE000
|
stack
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C00754000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814004A4000
|
trusted library allocation
|
page read and write
|
||
181400B28000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
77DC000
|
heap
|
page read and write
|
||
181400DB0000
|
trusted library allocation
|
page read and write
|
||
60E000
|
unkown
|
page write copy
|
||
18140017C000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
181400709000
|
trusted library allocation
|
page read and write
|
||
8E2ADFA000
|
stack
|
page read and write
|
||
4D7C00760000
|
trusted library allocation
|
page read and write
|
||
3EAC00250000
|
trusted library allocation
|
page read and write
|
||
181400924000
|
trusted library allocation
|
page read and write
|
||
181400080000
|
trusted library allocation
|
page read and write
|
||
8E305FE000
|
unkown
|
page readonly
|
||
8E285FE000
|
unkown
|
page readonly
|
||
8E385FE000
|
unkown
|
page readonly
|
||
196D561E000
|
heap
|
page read and write
|
||
60E000
|
unkown
|
page read and write
|
||
8E20DFD000
|
stack
|
page read and write
|
||
8E18DFB000
|
stack
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
8E185FE000
|
unkown
|
page readonly
|
||
196D5610000
|
heap
|
page read and write
|
||
8E3D5FE000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
1814008CC000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5B50000
|
heap
|
page read and write
|
||
181400801000
|
trusted library allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
7649000
|
heap
|
page read and write
|
||
196D561B000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
77C5000
|
heap
|
page read and write
|
||
6C0D1000
|
unkown
|
page execute read
|
||
1814004A4000
|
trusted library allocation
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
7643000
|
heap
|
page read and write
|
||
181400EEC000
|
trusted library allocation
|
page read and write
|
||
181400324000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C00364000
|
trusted library allocation
|
page read and write
|
||
196D5613000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
4D7C007C8000
|
trusted library allocation
|
page read and write
|
||
1814004A4000
|
trusted library allocation
|
page read and write
|
||
1814000D0000
|
trusted library allocation
|
page read and write
|
||
1814009C4000
|
trusted library allocation
|
page read and write
|
||
181400CE0000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400EF8000
|
trusted library allocation
|
page read and write
|
||
17CD000
|
unkown
|
page execute and write copy
|
||
196D5605000
|
heap
|
page read and write
|
||
181400B9C000
|
trusted library allocation
|
page read and write
|
||
4D7C00601000
|
trusted library allocation
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
181400B08000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
7644000
|
heap
|
page read and write
|
||
7786000
|
heap
|
page read and write
|
||
8E1A5FE000
|
unkown
|
page readonly
|
||
8E155FE000
|
unkown
|
page readonly
|
||
196D5608000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
181400AE8000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
7759000
|
heap
|
page read and write
|
||
181400E28000
|
trusted library allocation
|
page read and write
|
||
196D1EB0000
|
heap
|
page read and write
|
||
8E1CDFD000
|
stack
|
page read and write
|
||
70F0000
|
direct allocation
|
page read and write
|
||
1814006C5000
|
trusted library allocation
|
page read and write
|
||
1814002B4000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D2038000
|
heap
|
page read and write
|
||
196DC5CD000
|
trusted library section
|
page read and write
|
||
4D7C00624000
|
trusted library allocation
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
181400564000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
196D55FC000
|
heap
|
page read and write
|
||
7993000
|
heap
|
page read and write
|
||
181400B24000
|
trusted library allocation
|
page read and write
|
||
18140040C000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
3EAC00288000
|
trusted library allocation
|
page read and write
|
||
1814001AC000
|
trusted library allocation
|
page read and write
|
||
2BF000250000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814009F0000
|
trusted library allocation
|
page read and write
|
||
181400CF8000
|
trusted library allocation
|
page read and write
|
||
1814001F0000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
4D7C0080C000
|
trusted library allocation
|
page read and write
|
||
196DC4F1000
|
trusted library section
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
2BF0002A8000
|
direct allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
2BF0002DC000
|
direct allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
8E23DFE000
|
stack
|
page read and write
|
||
181400424000
|
trusted library allocation
|
page read and write
|
||
181400710000
|
trusted library allocation
|
page read and write
|
||
7642000
|
heap
|
page read and write
|
||
4D7C00320000
|
trusted library allocation
|
page read and write
|
||
7743000
|
heap
|
page read and write
|
||
181400574000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400CF0000
|
trusted library allocation
|
page read and write
|
||
181400CF0000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
18140045C000
|
trusted library allocation
|
page read and write
|
||
196D563A000
|
heap
|
page read and write
|
||
776A000
|
heap
|
page read and write
|
||
77CE000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
783E000
|
heap
|
page read and write
|
||
69A000
|
stack
|
page read and write
|
||
18140037C000
|
trusted library allocation
|
page read and write
|
||
196D5607000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4D7C0020C000
|
trusted library allocation
|
page read and write
|
||
78AD000
|
heap
|
page read and write
|
||
181400D08000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D2030000
|
heap
|
page read and write
|
||
1814002C4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400C55000
|
trusted library allocation
|
page read and write
|
||
181400318000
|
trusted library allocation
|
page read and write
|
||
2BF000303000
|
direct allocation
|
page read and write
|
||
70C000
|
stack
|
page read and write
|
||
181400C7C000
|
trusted library allocation
|
page read and write
|
||
196D5612000
|
heap
|
page read and write
|
||
2BF00023C000
|
direct allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400F20000
|
trusted library allocation
|
page read and write
|
||
196DB683000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5612000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400358000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400CE0000
|
trusted library allocation
|
page read and write
|
||
8E28DFD000
|
stack
|
page read and write
|
||
7738000
|
heap
|
page read and write
|
||
8E3E5FE000
|
unkown
|
page readonly
|
||
196DC307000
|
unclassified section
|
page read and write
|
||
1814006D1000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196DBE50000
|
trusted library section
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
7644000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
4D7C00704000
|
trusted library allocation
|
page read and write
|
||
7772000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
181400B18000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
8E38DFE000
|
stack
|
page read and write
|
||
4D7C00220000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
196DC5C2000
|
trusted library section
|
page read and write
|
||
1814003B4000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
4D7C00320000
|
trusted library allocation
|
page read and write
|
||
764D000
|
heap
|
page read and write
|
||
786A000
|
heap
|
page read and write
|
||
196D2290000
|
heap
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
196DC0A0000
|
trusted library section
|
page read and write
|
||
196D5620000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
7350000
|
direct allocation
|
page execute and read and write
|
||
1814002A8000
|
trusted library allocation
|
page read and write
|
||
181400C84000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
8E215FE000
|
unkown
|
page readonly
|
||
6C61000
|
heap
|
page read and write
|
||
77A4000
|
heap
|
page read and write
|
||
8E1BDFB000
|
stack
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
196D5613000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400D40000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400CF8000
|
trusted library allocation
|
page read and write
|
||
196D5600000
|
heap
|
page read and write
|
||
8E295FE000
|
unkown
|
page readonly
|
||
196D5608000
|
heap
|
page read and write
|
||
772D000
|
heap
|
page read and write
|
||
8E365FE000
|
unkown
|
page readonly
|
||
181400898000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400DF8000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
3EAC002F4000
|
trusted library allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
181400C4C000
|
trusted library allocation
|
page read and write
|
||
196DB710000
|
heap
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D8FF9000
|
heap
|
page read and write
|
||
1814001D0000
|
trusted library allocation
|
page read and write
|
||
776C000
|
heap
|
page read and write
|
||
4D7C006B4000
|
trusted library allocation
|
page read and write
|
||
181400F30000
|
trusted library allocation
|
page read and write
|
||
4D7C006FC000
|
trusted library allocation
|
page read and write
|
||
1814002A4000
|
trusted library allocation
|
page read and write
|
||
181400E68000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C00750000
|
trusted library allocation
|
page read and write
|
||
196D561A000
|
heap
|
page read and write
|
||
181400A84000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400EC0000
|
trusted library allocation
|
page read and write
|
||
1814005B4000
|
trusted library allocation
|
page read and write
|
||
4D7C00788000
|
trusted library allocation
|
page read and write
|
||
4D7C00250000
|
trusted library allocation
|
page read and write
|
||
2BF00024C000
|
direct allocation
|
page read and write
|
||
8E2A5FE000
|
unkown
|
page readonly
|
||
196D20E4000
|
heap
|
page read and write
|
||
181400778000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C00380000
|
trusted library allocation
|
page read and write
|
||
181400044000
|
trusted library allocation
|
page read and write
|
||
196D5607000
|
heap
|
page read and write
|
||
196D5B88000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D49C0000
|
unkown
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
196D55FA000
|
heap
|
page read and write
|
||
181400360000
|
trusted library allocation
|
page read and write
|
||
4D7C002ED000
|
trusted library allocation
|
page read and write
|
||
1814002F3000
|
trusted library allocation
|
page read and write
|
||
1814002A8000
|
trusted library allocation
|
page read and write
|
||
181400D24000
|
trusted library allocation
|
page read and write
|
||
76F5000
|
heap
|
page read and write
|
||
181400C70000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
196D561E000
|
heap
|
page read and write
|
||
8E175FE000
|
unkown
|
page readonly
|
||
18140008C000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196DB680000
|
heap
|
page read and write
|
||
77A5000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
8E16DFD000
|
stack
|
page read and write
|
||
181400228000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
181400300000
|
trusted library allocation
|
page read and write
|
||
1814001C8000
|
trusted library allocation
|
page read and write
|
||
4D7C0060C000
|
trusted library allocation
|
page read and write
|
||
60A000
|
unkown
|
page readonly
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
764C000
|
heap
|
page read and write
|
||
8E13DFE000
|
stack
|
page read and write
|
||
4D7C006D4000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
1814000A8000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
4D7C00744000
|
trusted library allocation
|
page read and write
|
||
3EAC00278000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400584000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400D80000
|
trusted library allocation
|
page read and write
|
||
4D7C006C4000
|
trusted library allocation
|
page read and write
|
||
196D5B19000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
4D7C006E8000
|
trusted library allocation
|
page read and write
|
||
181400401000
|
trusted library allocation
|
page read and write
|
||
196D55FD000
|
heap
|
page read and write
|
||
196D9004000
|
heap
|
page read and write
|
||
764E000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400601000
|
trusted library allocation
|
page read and write
|
||
1814001E0000
|
trusted library allocation
|
page read and write
|
||
4D7C00730000
|
trusted library allocation
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1814002A4000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC002D8000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
8E415FE000
|
unkown
|
page readonly
|
||
196D5B91000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
181400D98000
|
trusted library allocation
|
page read and write
|
||
1814006A8000
|
trusted library allocation
|
page read and write
|
||
8E2B5FE000
|
unkown
|
page readonly
|
||
8E2E5FE000
|
unkown
|
page readonly
|
||
77BA000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC00201000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
181400998000
|
trusted library allocation
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
4D7C00401000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
7917000
|
heap
|
page read and write
|
||
4D7C002B8000
|
trusted library allocation
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
2BF000274000
|
direct allocation
|
page read and write
|
||
4D7C007D0000
|
trusted library allocation
|
page read and write
|
||
4D7C00374000
|
trusted library allocation
|
page read and write
|
||
8E32DFD000
|
stack
|
page read and write
|
||
1814009A0000
|
trusted library allocation
|
page read and write
|
||
4D7C00430000
|
trusted library allocation
|
page read and write
|
||
18140037C000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
7643000
|
heap
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
196D5605000
|
heap
|
page read and write
|
||
4D7C00330000
|
trusted library allocation
|
page read and write
|
||
4D7C00404000
|
trusted library allocation
|
page read and write
|
||
181400340000
|
trusted library allocation
|
page read and write
|
||
181400A44000
|
trusted library allocation
|
page read and write
|
||
196D5611000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
8E11DFE000
|
unkown
|
page read and write
|
||
3EAC002BC000
|
trusted library allocation
|
page read and write
|
||
1814007D0000
|
trusted library allocation
|
page read and write
|
||
3EAC002A0000
|
trusted library allocation
|
page read and write
|
||
18140000C000
|
trusted library allocation
|
page read and write
|
||
1814002A4000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
1814001AC000
|
trusted library allocation
|
page read and write
|
||
1814001B4000
|
trusted library allocation
|
page read and write
|
||
2BF000217000
|
direct allocation
|
page read and write
|
||
4D7C00348000
|
trusted library allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
4D7C006F0000
|
trusted library allocation
|
page read and write
|
||
196D5605000
|
heap
|
page read and write
|
||
764C000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
1B74000
|
heap
|
page read and write
|
||
196D5608000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
18140005A000
|
trusted library allocation
|
page read and write
|
||
181400E30000
|
trusted library allocation
|
page read and write
|
||
196DB677000
|
unclassified section
|
page read and write
|
||
196DC460000
|
trusted library section
|
page read and write
|
||
4D7C002FC000
|
trusted library allocation
|
page read and write
|
||
4D7C002F0000
|
trusted library allocation
|
page read and write
|
||
8E265FE000
|
unkown
|
page readonly
|
||
181400DD8000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
4D7C002CC000
|
trusted library allocation
|
page read and write
|
||
4D7C0033C000
|
trusted library allocation
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
77F9000
|
direct allocation
|
page read and write
|
||
181400CF0000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
196D560D000
|
heap
|
page read and write
|
||
196D20BD000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
18140065C000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400E9A000
|
trusted library allocation
|
page read and write
|
||
3EAC00248000
|
trusted library allocation
|
page read and write
|
||
4D7C002D4000
|
trusted library allocation
|
page read and write
|
||
1814000E0000
|
trusted library allocation
|
page read and write
|
||
8E3DDFE000
|
stack
|
page read and write
|
||
181400A44000
|
trusted library allocation
|
page read and write
|
||
4D7C00310000
|
trusted library allocation
|
page read and write
|
||
601000
|
unkown
|
page execute read
|
||
181400ACC000
|
trusted library allocation
|
page read and write
|
||
7649000
|
heap
|
page read and write
|
||
196D5618000
|
heap
|
page read and write
|
||
77D9000
|
heap
|
page read and write
|
||
181400A18000
|
trusted library allocation
|
page read and write
|
||
181400854000
|
trusted library allocation
|
page read and write
|
||
4D7C006AC000
|
trusted library allocation
|
page read and write
|
||
196D55D0000
|
heap
|
page read and write
|
||
4D7C00758000
|
trusted library allocation
|
page read and write
|
||
181400E9C000
|
trusted library allocation
|
page read and write
|
||
4D7C00201000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
8E205FE000
|
unkown
|
page readonly
|
||
196D5610000
|
heap
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC00220000
|
trusted library allocation
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
181400210000
|
trusted library allocation
|
page read and write
|
||
4D7C0040C000
|
trusted library allocation
|
page read and write
|
||
196DC640000
|
trusted library section
|
page read and write
|
||
8E14DFE000
|
stack
|
page read and write
|
||
18140060C000
|
trusted library allocation
|
page read and write
|
||
181400118000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
60A000
|
unkown
|
page readonly
|
||
196D5616000
|
heap
|
page read and write
|
||
3EAC00238000
|
trusted library allocation
|
page read and write
|
||
181400D38000
|
trusted library allocation
|
page read and write
|
||
1814001AC000
|
trusted library allocation
|
page read and write
|
||
8E195FE000
|
unkown
|
page readonly
|
||
4D7C00368000
|
trusted library allocation
|
page read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
196D5601000
|
heap
|
page read and write
|
||
196D5610000
|
heap
|
page read and write
|
||
78DF000
|
heap
|
page read and write
|
||
181400C94000
|
trusted library allocation
|
page read and write
|
||
18140014C000
|
trusted library allocation
|
page read and write
|
||
196D5DB0000
|
trusted library allocation
|
page read and write
|
||
8E2DDFC000
|
stack
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5616000
|
heap
|
page read and write
|
||
181400F30000
|
trusted library allocation
|
page read and write
|
||
611000
|
unkown
|
page readonly
|
||
196D5612000
|
heap
|
page read and write
|
||
196D3F70000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
196D5616000
|
heap
|
page read and write
|
There are 1286 hidden memdumps, click here to show them.