Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_579a99e6-76dd-425d-a590-a57271dff97f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB231.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 15:25:55 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB407.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB446.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2504,i,7512998509247764388,4904351507953880072,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7004 -s 1820
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bf
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icoeb
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_defaultouch
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17320193474fd4
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.68
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
217.20.59.37
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AAC000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
661800A0C000
|
trusted library allocation
|
page read and write
|
||
6000002A0000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
6A94007B4000
|
trusted library allocation
|
page read and write
|
||
24A85336000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
C5FBBFC000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A85925000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
661800A28000
|
trusted library allocation
|
page read and write
|
||
768C000
|
heap
|
page read and write
|
||
C589FFC000
|
stack
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A858A6000
|
heap
|
page read and write
|
||
661800350000
|
trusted library allocation
|
page read and write
|
||
6618001E8000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800830000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
770D000
|
heap
|
page read and write
|
||
71B0000
|
direct allocation
|
page execute and read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800401000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page write copy
|
||
66180017C000
|
trusted library allocation
|
page read and write
|
||
774D000
|
heap
|
page read and write
|
||
24A84510000
|
unkown
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
C5F1BFA000
|
stack
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800B70000
|
trusted library allocation
|
page read and write
|
||
661800BD0000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8C270000
|
trusted library section
|
page read and write
|
||
661800DF8000
|
trusted library allocation
|
page read and write
|
||
6A94006EC000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
68E400270000
|
direct allocation
|
page read and write
|
||
661800D38000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
24A8BFE0000
|
trusted library section
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A8C0CD000
|
trusted library section
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
661800630000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6C1D8000
|
unkown
|
page readonly
|
||
661800A34000
|
trusted library allocation
|
page read and write
|
||
661800134000
|
trusted library allocation
|
page read and write
|
||
66180043C000
|
trusted library allocation
|
page read and write
|
||
24A85864000
|
heap
|
page read and write
|
||
6C1DC000
|
unkown
|
page readonly
|
||
24A85300000
|
heap
|
page read and write
|
||
24A858A6000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
C5E93FE000
|
unkown
|
page readonly
|
||
66180081C000
|
trusted library allocation
|
page read and write
|
||
661800C80000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
66180049C000
|
trusted library allocation
|
page read and write
|
||
66180018C000
|
trusted library allocation
|
page read and write
|
||
661800334000
|
trusted library allocation
|
page read and write
|
||
6A9400348000
|
trusted library allocation
|
page read and write
|
||
24A858BB000
|
heap
|
page read and write
|
||
766B000
|
heap
|
page read and write
|
||
6A940035C000
|
trusted library allocation
|
page read and write
|
||
661800914000
|
trusted library allocation
|
page read and write
|
||
772B000
|
heap
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
661800DC8000
|
trusted library allocation
|
page read and write
|
||
66180014C000
|
trusted library allocation
|
page read and write
|
||
6000002C0000
|
trusted library allocation
|
page read and write
|
||
772E000
|
heap
|
page read and write
|
||
661800A70000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A940035C000
|
trusted library allocation
|
page read and write
|
||
66180022C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page write copy
|
||
24A85335000
|
heap
|
page read and write
|
||
661800740000
|
trusted library allocation
|
page read and write
|
||
661800684000
|
trusted library allocation
|
page read and write
|
||
C5E13FE000
|
unkown
|
page readonly
|
||
661800118000
|
trusted library allocation
|
page read and write
|
||
661800BAC000
|
trusted library allocation
|
page read and write
|
||
24A8588F000
|
heap
|
page read and write
|
||
600000294000
|
trusted library allocation
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
24A85354000
|
heap
|
page read and write
|
||
661800C01000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
7699000
|
heap
|
page read and write
|
||
661800D20000
|
trusted library allocation
|
page read and write
|
||
6A94006B4000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
75B8000
|
heap
|
page read and write
|
||
6A9400354000
|
trusted library allocation
|
page read and write
|
||
661800D84000
|
trusted library allocation
|
page read and write
|
||
6618006D4000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400714000
|
trusted library allocation
|
page read and write
|
||
66180035C000
|
trusted library allocation
|
page read and write
|
||
661800801000
|
trusted library allocation
|
page read and write
|
||
C5E9BFE000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A9400640000
|
trusted library allocation
|
page read and write
|
||
6000002C0000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800F2C000
|
trusted library allocation
|
page read and write
|
||
C5F23FE000
|
unkown
|
page readonly
|
||
68E4002A8000
|
direct allocation
|
page read and write
|
||
24A858B3000
|
heap
|
page read and write
|
||
68E40020C000
|
direct allocation
|
page read and write
|
||
6A9400658000
|
trusted library allocation
|
page read and write
|
||
6618005A0000
|
trusted library allocation
|
page read and write
|
||
C5FFBFD000
|
stack
|
page read and write
|
||
C5F43FE000
|
unkown
|
page readonly
|
||
C5ED3FE000
|
unkown
|
page readonly
|
||
661800F10000
|
trusted library allocation
|
page read and write
|
||
6A9400424000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
75B6000
|
heap
|
page read and write
|
||
661800A5C000
|
trusted library allocation
|
page read and write
|
||
6618009AC000
|
trusted library allocation
|
page read and write
|
||
C5857FE000
|
unkown
|
page readonly
|
||
24A85332000
|
heap
|
page read and write
|
||
66180035C000
|
trusted library allocation
|
page read and write
|
||
8230000
|
heap
|
page read and write
|
||
24A8C100000
|
trusted library section
|
page read and write
|
||
661800E84000
|
trusted library allocation
|
page read and write
|
||
6A9400330000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
24A8C47E000
|
trusted library section
|
page read and write
|
||
C5F5BFC000
|
stack
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6A94007CC000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
6618006E4000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
777F000
|
heap
|
page read and write
|
||
6A9400688000
|
trusted library allocation
|
page read and write
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
661800370000
|
trusted library allocation
|
page read and write
|
||
75B3000
|
heap
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6A9400201000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
199C000
|
unkown
|
page execute and write copy
|
||
6A9400724000
|
trusted library allocation
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
75BB000
|
heap
|
page read and write
|
||
661800850000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
661800A18000
|
trusted library allocation
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
6A9400310000
|
trusted library allocation
|
page read and write
|
||
6A9400248000
|
trusted library allocation
|
page read and write
|
||
C58A7FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400238000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400760000
|
trusted library allocation
|
page read and write
|
||
75B4000
|
heap
|
page read and write
|
||
6A9400704000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800BA4000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800228000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
66180057C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
6A9400288000
|
trusted library allocation
|
page read and write
|
||
661800B70000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A8588F000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618000B4000
|
trusted library allocation
|
page read and write
|
||
7512000
|
direct allocation
|
page read and write
|
||
77CD000
|
heap
|
page read and write
|
||
6A94007C8000
|
trusted library allocation
|
page read and write
|
||
6000002A0000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
75B4000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
6A94002E4000
|
trusted library allocation
|
page read and write
|
||
6A9400390000
|
trusted library allocation
|
page read and write
|
||
661800C0C000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
7696000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8BFF1000
|
trusted library section
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
76CE000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
6AD1000
|
heap
|
page read and write
|
||
6A94006E0000
|
trusted library allocation
|
page read and write
|
||
661800C90000
|
trusted library allocation
|
page read and write
|
||
75BC000
|
heap
|
page read and write
|
||
661800010000
|
trusted library allocation
|
page read and write
|
||
24A85336000
|
heap
|
page read and write
|
||
6A9400320000
|
trusted library allocation
|
page read and write
|
||
24A85318000
|
heap
|
page read and write
|
||
24A858B7000
|
heap
|
page read and write
|
||
6A94007D0000
|
trusted library allocation
|
page read and write
|
||
24A85323000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
C5F9BFB000
|
stack
|
page read and write
|
||
C5807FE000
|
unkown
|
page readonly
|
||
79FB000
|
heap
|
page read and write
|
||
661800300000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
24A85322000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
68E400303000
|
direct allocation
|
page read and write
|
||
661800634000
|
trusted library allocation
|
page read and write
|
||
6A9400310000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
8C1000
|
unkown
|
page execute read
|
||
24A85330000
|
heap
|
page read and write
|
||
661800D00000
|
trusted library allocation
|
page read and write
|
||
800D000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618001B4000
|
trusted library allocation
|
page read and write
|
||
C5E7BFD000
|
stack
|
page read and write
|
||
77FF000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
24A85922000
|
heap
|
page read and write
|
||
68E400215000
|
direct allocation
|
page read and write
|
||
6A9400754000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85893000
|
heap
|
page read and write
|
||
661800A34000
|
trusted library allocation
|
page read and write
|
||
6A9400610000
|
trusted library allocation
|
page read and write
|
||
6C1D9000
|
unkown
|
page read and write
|
||
75B1000
|
heap
|
page read and write
|
||
C5E53FE000
|
unkown
|
page readonly
|
||
6618002A4000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
6618002C4000
|
trusted library allocation
|
page read and write
|
||
6618001DC000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800EF8000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
764B000
|
heap
|
page read and write
|
||
6A94006C4000
|
trusted library allocation
|
page read and write
|
||
661800E9C000
|
trusted library allocation
|
page read and write
|
||
6A9400718000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A85949000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
C5F63FE000
|
unkown
|
page readonly
|
||
24A8B443000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
66180038C000
|
trusted library allocation
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A8BFD0000
|
trusted library section
|
page read and write
|
||
24A858E0000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
661800ED8000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800EC0000
|
trusted library allocation
|
page read and write
|
||
6618002C4000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A94006B0000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618009EC000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800DD8000
|
trusted library allocation
|
page read and write
|
||
6618003EC000
|
trusted library allocation
|
page read and write
|
||
6618008EC000
|
trusted library allocation
|
page read and write
|
||
24A8B440000
|
heap
|
page read and write
|
||
6618006AC000
|
trusted library allocation
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800350000
|
trusted library allocation
|
page read and write
|
||
76C9000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page write copy
|
||
C5F2BFB000
|
stack
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618002F3000
|
trusted library allocation
|
page read and write
|
||
75B4000
|
heap
|
page read and write
|
||
661800082000
|
trusted library allocation
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
75B8000
|
heap
|
page read and write
|
||
C5E33FE000
|
unkown
|
page readonly
|
||
AA3000
|
heap
|
page read and write
|
||
78F1000
|
heap
|
page read and write
|
||
6000002F0000
|
trusted library allocation
|
page read and write
|
||
661800CC0000
|
trusted library allocation
|
page read and write
|
||
24A858BB000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400730000
|
trusted library allocation
|
page read and write
|
||
66180097C000
|
trusted library allocation
|
page read and write
|
||
24A8591A000
|
heap
|
page read and write
|
||
6618003CD000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
AB8000
|
heap
|
page read and write
|
||
68E4002EC000
|
direct allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
75BB000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
661800128000
|
trusted library allocation
|
page read and write
|
||
6A9400784000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6A940075C000
|
trusted library allocation
|
page read and write
|
||
24A858C2000
|
heap
|
page read and write
|
||
600000264000
|
trusted library allocation
|
page read and write
|
||
600000270000
|
trusted library allocation
|
page read and write
|
||
6A9400401000
|
trusted library allocation
|
page read and write
|
||
68E400220000
|
direct allocation
|
page read and write
|
||
C5877FE000
|
unkown
|
page readonly
|
||
24A8531E000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
68E400280000
|
direct allocation
|
page read and write
|
||
6A940039C000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
C58B7FE000
|
unkown
|
page readonly
|
||
F00000
|
unkown
|
page readonly
|
||
661800E90000
|
trusted library allocation
|
page read and write
|
||
C5F6BFC000
|
stack
|
page read and write
|
||
77D9000
|
heap
|
page read and write
|
||
75BB000
|
heap
|
page read and write
|
||
C5EDBFE000
|
stack
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A8586F000
|
heap
|
page read and write
|
||
C586FFE000
|
stack
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
24A85879000
|
heap
|
page read and write
|
||
76E3000
|
heap
|
page read and write
|
||
68E400290000
|
direct allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800037000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
68E400294000
|
direct allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85340000
|
heap
|
page read and write
|
||
6A94002B0000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
600000201000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
76AB000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
C5F53FE000
|
unkown
|
page readonly
|
||
C5F03FE000
|
unkown
|
page readonly
|
||
661800898000
|
trusted library allocation
|
page read and write
|
||
C5FA3FE000
|
unkown
|
page readonly
|
||
C5DD3FE000
|
unkown
|
page readonly
|
||
24A85324000
|
heap
|
page read and write
|
||
6618005E4000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
75B1000
|
heap
|
page read and write
|
||
6618002A4000
|
trusted library allocation
|
page read and write
|
||
661800B2C000
|
trusted library allocation
|
page read and write
|
||
24A81EFC000
|
heap
|
page read and write
|
||
661800220000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618007BC000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
6A9400620000
|
trusted library allocation
|
page read and write
|
||
8A0D000
|
heap
|
page read and write
|
||
6A9400330000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
795C000
|
heap
|
page read and write
|
||
66180027C000
|
trusted library allocation
|
page read and write
|
||
661800328000
|
trusted library allocation
|
page read and write
|
||
66180038C000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
661800B90000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
7EE000
|
unkown
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
24A81DA0000
|
heap
|
page read and write
|
||
6A9400354000
|
trusted library allocation
|
page read and write
|
||
661800568000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
C5E43FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
6000002A0000
|
trusted library allocation
|
page read and write
|
||
6A94002ED000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A8B3F0000
|
heap
|
page read and write
|
||
C5DFBFE000
|
stack
|
page read and write
|
||
C5F83FE000
|
unkown
|
page readonly
|
||
24A85330000
|
heap
|
page read and write
|
||
600000248000
|
trusted library allocation
|
page read and write
|
||
6A94002D4000
|
trusted library allocation
|
page read and write
|
||
24A81D90000
|
heap
|
page readonly
|
||
24A8531B000
|
heap
|
page read and write
|
||
6A9400320000
|
trusted library allocation
|
page read and write
|
||
75B6000
|
heap
|
page read and write
|
||
24A81DF0000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6618002AA000
|
trusted library allocation
|
page read and write
|
||
68E4002E4000
|
direct allocation
|
page read and write
|
||
24A85896000
|
heap
|
page read and write
|
||
661800874000
|
trusted library allocation
|
page read and write
|
||
661800724000
|
trusted library allocation
|
page read and write
|
||
661800900000
|
trusted library allocation
|
page read and write
|
||
C5F93FE000
|
unkown
|
page readonly
|
||
24A81E84000
|
heap
|
page read and write
|
||
6618003B0000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
75B9000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6A94002F4000
|
trusted library allocation
|
page read and write
|
||
24A8B457000
|
unclassified section
|
page read and write
|
||
661800D74000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6618002AA000
|
trusted library allocation
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
661800B30000
|
trusted library allocation
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
75B1000
|
heap
|
page read and write
|
||
661800290000
|
trusted library allocation
|
page read and write
|
||
661800D8D000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
C5F4BFD000
|
stack
|
page read and write
|
||
6A9400404000
|
trusted library allocation
|
page read and write
|
||
68E400234000
|
direct allocation
|
page read and write
|
||
6A9400694000
|
trusted library allocation
|
page read and write
|
||
661800AF4000
|
trusted library allocation
|
page read and write
|
||
75B4000
|
heap
|
page read and write
|
||
661800760000
|
trusted library allocation
|
page read and write
|
||
24A852F0000
|
heap
|
page read and write
|
||
6A940025C000
|
trusted library allocation
|
page read and write
|
||
6618004EC000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C5FEBFE000
|
stack
|
page read and write
|
||
76C2000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800F5C000
|
trusted library allocation
|
page read and write
|
||
661800230000
|
trusted library allocation
|
page read and write
|
||
24A8BF71000
|
trusted library section
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
78AC000
|
heap
|
page read and write
|
||
6A940069C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6A9400770000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
C5867FE000
|
unkown
|
page readonly
|
||
C5DEBFE000
|
stack
|
page read and write
|
||
C5E63FE000
|
unkown
|
page readonly
|
||
C5E5BFB000
|
stack
|
page read and write
|
||
C5E03FE000
|
unkown
|
page readonly
|
||
661800944000
|
trusted library allocation
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800CE8000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page execute and write copy
|
||
C5EE3FE000
|
unkown
|
page readonly
|
||
24A858B5000
|
heap
|
page read and write
|
||
6618001B4000
|
trusted library allocation
|
page read and write
|
||
24A85896000
|
heap
|
page read and write
|
||
661800DF0000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
6A94006D0000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
6618004BC000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
6618002D0000
|
trusted library allocation
|
page read and write
|
||
C5EF3FE000
|
unkown
|
page readonly
|
||
76BA000
|
heap
|
page read and write
|
||
76B6000
|
heap
|
page read and write
|
||
6618003B0000
|
trusted library allocation
|
page read and write
|
||
1C2F000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85319000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6618006B2000
|
trusted library allocation
|
page read and write
|
||
76A5000
|
heap
|
page read and write
|
||
661800490000
|
trusted library allocation
|
page read and write
|
||
661800048000
|
trusted library allocation
|
page read and write
|
||
661800BB4000
|
trusted library allocation
|
page read and write
|
||
6618005B4000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
24A81E00000
|
heap
|
page read and write
|
||
661800DAC000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
75B9000
|
heap
|
page read and write
|
||
24A85323000
|
heap
|
page read and write
|
||
661800DF0000
|
trusted library allocation
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
75B6000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
75BE000
|
heap
|
page read and write
|
||
6618009D0000
|
trusted library allocation
|
page read and write
|
||
C5F13FE000
|
unkown
|
page readonly
|
||
6A9400374000
|
trusted library allocation
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
66180071A000
|
trusted library allocation
|
page read and write
|
||
C5DF3FE000
|
unkown
|
page readonly
|
||
6A940033C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
1B58000
|
unkown
|
page execute and write copy
|
||
75B5000
|
heap
|
page read and write
|
||
600000250000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
6A9400668000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
6A940078C000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A89950000
|
trusted library section
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
C5EBBFE000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800768000
|
trusted library allocation
|
page read and write
|
||
781A000
|
heap
|
page read and write
|
||
6A94002CC000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C5E1BFD000
|
stack
|
page read and write
|
||
661800664000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
68E40024C000
|
direct allocation
|
page read and write
|
||
661800E30000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
7644000
|
heap
|
page read and write
|
||
6618001F8000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
24A858DC000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800C8C000
|
trusted library allocation
|
page read and write
|
||
24A85913000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
24A858C2000
|
heap
|
page read and write
|
||
6618003A0000
|
trusted library allocation
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618000EC000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800348000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
66180033C000
|
trusted library allocation
|
page read and write
|
||
C581FFD000
|
stack
|
page read and write
|
||
24A8C0C2000
|
trusted library section
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
68E4002D0000
|
direct allocation
|
page read and write
|
||
661800D54000
|
trusted library allocation
|
page read and write
|
||
6A9400624000
|
trusted library allocation
|
page read and write
|
||
661800A40000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
8C1000
|
unkown
|
page execute read
|
||
6AD1000
|
heap
|
page read and write
|
||
6A94006FC000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800A01000
|
trusted library allocation
|
page read and write
|
||
24A85344000
|
heap
|
page read and write
|
||
24A8591C000
|
heap
|
page read and write
|
||
24A81FE0000
|
heap
|
page read and write
|
||
661800658000
|
trusted library allocation
|
page read and write
|
||
600000260000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
77E8000
|
heap
|
page read and write
|
||
6618001D8000
|
trusted library allocation
|
page read and write
|
||
24A858CC000
|
heap
|
page read and write
|
||
24A85323000
|
heap
|
page read and write
|
||
24A8533B000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C5FCBFE000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A8AE40000
|
heap
|
page read and write
|
||
661800348000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A9400654000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A85338000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
6A9400320000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800201000
|
trusted library allocation
|
page read and write
|
||
66180080D000
|
trusted library allocation
|
page read and write
|
||
66180016C000
|
trusted library allocation
|
page read and write
|
||
661800C50000
|
trusted library allocation
|
page read and write
|
||
7701000
|
heap
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A879B0000
|
trusted library allocation
|
page read and write
|
||
24A858AC000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
75B1000
|
heap
|
page read and write
|
||
6A9400630000
|
trusted library allocation
|
page read and write
|
||
24A81DD0000
|
heap
|
page read and write
|
||
C5F0BFE000
|
stack
|
page read and write
|
||
661800C10000
|
trusted library allocation
|
page read and write
|
||
24A899E7000
|
unclassified section
|
page read and write
|
||
6A9400364000
|
trusted library allocation
|
page read and write
|
||
24A8BF92000
|
trusted library section
|
page read and write
|
||
661800C60000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A81FA0000
|
trusted library section
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
75B7000
|
heap
|
page read and write
|
||
6A9400408000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A81CB0000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
75B8000
|
heap
|
page read and write
|
||
6A9400220000
|
trusted library allocation
|
page read and write
|
||
661800CF0000
|
trusted library allocation
|
page read and write
|
||
C5FC3FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
76B6000
|
heap
|
page read and write
|
||
C588FFE000
|
stack
|
page read and write
|
||
661800494000
|
trusted library allocation
|
page read and write
|
||
24A893C4000
|
trusted library allocation
|
page read and write
|
||
6618002A8000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
66180021C000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
6A94002B8000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
68E400201000
|
direct allocation
|
page read and write
|
||
24A858D4000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
18AF000
|
stack
|
page read and write
|
||
6A9400684000
|
trusted library allocation
|
page read and write
|
||
6A9400664000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
76F2000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A8C470000
|
trusted library section
|
page read and write
|
||
6618002B8000
|
trusted library allocation
|
page read and write
|
||
24A893E2000
|
trusted library allocation
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
24A858B9000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
600000220000
|
trusted library allocation
|
page read and write
|
||
661800348000
|
trusted library allocation
|
page read and write
|
||
66180088C000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
direct allocation
|
page execute and read and write
|
||
C5817FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
661800C38000
|
trusted library allocation
|
page read and write
|
||
6A9400380000
|
trusted library allocation
|
page read and write
|
||
24A81E18000
|
heap
|
page read and write
|
||
24A81FE5000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
661800E6C000
|
trusted library allocation
|
page read and write
|
||
661800484000
|
trusted library allocation
|
page read and write
|
||
661800C10000
|
trusted library allocation
|
page read and write
|
||
6000002E4000
|
trusted library allocation
|
page read and write
|
||
6A9400614000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
68E4002AC000
|
direct allocation
|
page read and write
|
||
24A85925000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
78CE000
|
heap
|
page read and write
|
||
C5EB3FE000
|
unkown
|
page readonly
|
||
24A85332000
|
heap
|
page read and write
|
||
661800218000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85336000
|
heap
|
page read and write
|
||
661800001000
|
trusted library allocation
|
page read and write
|
||
661800D18000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C5E4BFE000
|
stack
|
page read and write
|
||
661800CE8000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
75BA000
|
heap
|
page read and write
|
||
66180083C000
|
trusted library allocation
|
page read and write
|
||
661800210000
|
trusted library allocation
|
page read and write
|
||
76F6000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A94003EC000
|
trusted library allocation
|
page read and write
|
||
C5F33FE000
|
unkown
|
page readonly
|
||
EEA000
|
heap
|
page read and write
|
||
6A94006E4000
|
trusted library allocation
|
page read and write
|
||
661800E78000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
C5E23FE000
|
unkown
|
page readonly
|
||
24A85330000
|
heap
|
page read and write
|
||
661800CB0000
|
trusted library allocation
|
page read and write
|
||
C58AFFE000
|
stack
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
661800C2C000
|
trusted library allocation
|
page read and write
|
||
6A9400700000
|
trusted library allocation
|
page read and write
|
||
24A8BEF7000
|
unclassified section
|
page read and write
|
||
24A858B9000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
661800D40000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800E1C000
|
trusted library allocation
|
page read and write
|
||
661800CD8000
|
trusted library allocation
|
page read and write
|
||
75B2000
|
heap
|
page read and write
|
||
C5E73FE000
|
unkown
|
page readonly
|
||
C584FFD000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
6618003C0000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
661800B88000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618002F0000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85943000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
C5F3BFC000
|
stack
|
page read and write
|
||
6C0B1000
|
unkown
|
page execute read
|
||
24A85332000
|
heap
|
page read and write
|
||
24A858FC000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
661800970000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
C5E3BFA000
|
stack
|
page read and write
|
||
6A9400734000
|
trusted library allocation
|
page read and write
|
||
C5DCBFD000
|
unkown
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6A9400418000
|
trusted library allocation
|
page read and write
|
||
24A81E08000
|
heap
|
page read and write
|
||
C5E6BFB000
|
stack
|
page read and write
|
||
6618002A4000
|
trusted library allocation
|
page read and write
|
||
C5FB3FE000
|
unkown
|
page readonly
|
||
8C0000
|
unkown
|
page readonly
|
||
18EF000
|
stack
|
page read and write
|
||
C5FD3FE000
|
unkown
|
page readonly
|
||
24A85330000
|
heap
|
page read and write
|
||
6A94002F0000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800D5C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
24A85322000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
6618002CA000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C58C7FE000
|
unkown
|
page readonly
|
||
661800DC0000
|
trusted library allocation
|
page read and write
|
||
C5E0BFE000
|
stack
|
page read and write
|
||
661800194000
|
trusted library allocation
|
page read and write
|
||
24A858D7000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
661800E54000
|
trusted library allocation
|
page read and write
|
||
24A8BF9E000
|
trusted library section
|
page read and write
|
||
6618002FB000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
7669000
|
direct allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
75B7000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800E3C000
|
trusted library allocation
|
page read and write
|
||
6618001F0000
|
trusted library allocation
|
page read and write
|
||
C5E2BFB000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
C5F7BFC000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
66180033C000
|
trusted library allocation
|
page read and write
|
||
75B3000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
6618001D0000
|
trusted library allocation
|
page read and write
|
||
24A81EBD000
|
heap
|
page read and write
|
||
76A2000
|
heap
|
page read and write
|
||
C580FFE000
|
stack
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
24A8AE48000
|
heap
|
page read and write
|
||
661800074000
|
trusted library allocation
|
page read and write
|
||
C582FFE000
|
stack
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
75B6000
|
heap
|
page read and write
|
||
600000235000
|
trusted library allocation
|
page read and write
|
||
661800F20000
|
trusted library allocation
|
page read and write
|
||
796C000
|
heap
|
page read and write
|
||
6618001B4000
|
trusted library allocation
|
page read and write
|
||
6618001A0000
|
trusted library allocation
|
page read and write
|
||
661800EB4000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
661800AB4000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
785A000
|
heap
|
page read and write
|
||
661800E01000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
24A858B3000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
769E000
|
heap
|
page read and write
|
||
24A85339000
|
heap
|
page read and write
|
||
24A8C0A6000
|
trusted library section
|
page read and write
|
||
66180038C000
|
trusted library allocation
|
page read and write
|
||
6A94006E8000
|
trusted library allocation
|
page read and write
|
||
66180061C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
661800B04000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800950000
|
trusted library allocation
|
page read and write
|
||
24A8B3C7000
|
unclassified section
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
766C000
|
heap
|
page read and write
|
||
75B2000
|
heap
|
page read and write
|
||
774F000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6C0B0000
|
unkown
|
page readonly
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6618002AA000
|
trusted library allocation
|
page read and write
|
||
661800E0C000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
661800778000
|
trusted library allocation
|
page read and write
|
||
661800CE8000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
66180015C000
|
trusted library allocation
|
page read and write
|
||
6618001F4000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
heap
|
page read and write
|
||
661800F04000
|
trusted library allocation
|
page read and write
|
||
661800AC4000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
75B3000
|
heap
|
page read and write
|
||
6A9400210000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
stack
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800CA0000
|
trusted library allocation
|
page read and write
|
||
661800E24000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
6A9400601000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
76AD000
|
heap
|
page read and write
|
||
600000238000
|
trusted library allocation
|
page read and write
|
||
75B3000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
24A81F00000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800D0C000
|
trusted library allocation
|
page read and write
|
||
6618006F4000
|
trusted library allocation
|
page read and write
|
||
75B5000
|
heap
|
page read and write
|
||
6618001AC000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
66180008C000
|
trusted library allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
661800629000
|
trusted library allocation
|
page read and write
|
||
6A940033C000
|
trusted library allocation
|
page read and write
|
||
661800601000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
C5DDBFE000
|
stack
|
page read and write
|
||
66180009C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
661800C10000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
661800EC8000
|
trusted library allocation
|
page read and write
|
||
24A8532B000
|
heap
|
page read and write
|
||
6000002C0000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A9400250000
|
trusted library allocation
|
page read and write
|
||
600000230000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6618008B4000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
24A85330000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A8C27E000
|
trusted library section
|
page read and write
|
||
661800A80000
|
trusted library allocation
|
page read and write
|
||
661800788000
|
trusted library allocation
|
page read and write
|
||
24A858B7000
|
heap
|
page read and write
|
||
788A000
|
heap
|
page read and write
|
||
24A81E88000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
6000002F8000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
776F000
|
heap
|
page read and write
|
||
783D000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
C5897FE000
|
unkown
|
page readonly
|
||
AA7000
|
heap
|
page read and write
|
||
24A858FC000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
68E400250000
|
direct allocation
|
page read and write
|
||
C5827FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
75BA000
|
heap
|
page read and write
|
||
6A940040C000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
77AB000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85810000
|
trusted library section
|
page read and write
|
||
75B6000
|
heap
|
page read and write
|
||
6618001EC000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
661800484000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
75BC000
|
heap
|
page read and write
|
||
6A9400248000
|
trusted library allocation
|
page read and write
|
||
6A94002FC000
|
trusted library allocation
|
page read and write
|
||
661800EE8000
|
trusted library allocation
|
page read and write
|
||
C5F8BFD000
|
stack
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6C18D000
|
unkown
|
page read and write
|
||
661800554000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6A940020C000
|
trusted library allocation
|
page read and write
|
||
24A81F93000
|
heap
|
page read and write
|
||
24A8C003000
|
trusted library section
|
page read and write
|
||
600000274000
|
trusted library allocation
|
page read and write
|
||
C583FFD000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
66180060C000
|
trusted library allocation
|
page read and write
|
||
68E40023C000
|
direct allocation
|
page read and write
|
||
661800310000
|
trusted library allocation
|
page read and write
|
||
6618002AA000
|
trusted library allocation
|
page read and write
|
||
661800368000
|
trusted library allocation
|
page read and write
|
||
7B2A000
|
heap
|
page read and write
|
||
661800700000
|
trusted library allocation
|
page read and write
|
||
6618002B8000
|
trusted library allocation
|
page read and write
|
||
24A85335000
|
heap
|
page read and write
|
||
24A85937000
|
heap
|
page read and write
|
||
661800864000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
7650000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
6618006BC000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6000002C0000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6A94006B8000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
68E4002DC000
|
direct allocation
|
page read and write
|
||
661800D30000
|
trusted library allocation
|
page read and write
|
||
C5FABFB000
|
stack
|
page read and write
|
||
6618008F4000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
6618001D4000
|
trusted library allocation
|
page read and write
|
||
661800C48000
|
trusted library allocation
|
page read and write
|
||
6618006B7000
|
trusted library allocation
|
page read and write
|
||
C5887FE000
|
unkown
|
page readonly
|
||
24A8533F000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6618003E5000
|
trusted library allocation
|
page read and write
|
||
6A9400320000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
766D000
|
heap
|
page read and write
|
||
767C000
|
heap
|
page read and write
|
||
661800C0C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A940027C000
|
trusted library allocation
|
page read and write
|
||
24A8531B000
|
heap
|
page read and write
|
||
66180031C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
C5EC3FE000
|
unkown
|
page readonly
|
||
24A85334000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85336000
|
heap
|
page read and write
|
||
68E400230000
|
direct allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
75BB000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
6618001B4000
|
trusted library allocation
|
page read and write
|
||
6618002C4000
|
trusted library allocation
|
page read and write
|
||
C5EA3FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
661800C74000
|
trusted library allocation
|
page read and write
|
||
6A9400678000
|
trusted library allocation
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
66180040C000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
66180020C000
|
trusted library allocation
|
page read and write
|
||
600000288000
|
trusted library allocation
|
page read and write
|
||
24A8594C000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
600000278000
|
trusted library allocation
|
page read and write
|
||
24A85340000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
24A85917000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
7B20000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
7685000
|
heap
|
page read and write
|
||
68E400274000
|
direct allocation
|
page read and write
|
||
66180000C000
|
trusted library allocation
|
page read and write
|
||
6000002F4000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
24A81EB7000
|
heap
|
page read and write
|
||
24A8589F000
|
heap
|
page read and write
|
||
C5ECBFE000
|
stack
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400698000
|
trusted library allocation
|
page read and write
|
||
6A9400744000
|
trusted library allocation
|
page read and write
|
||
68E400210000
|
direct allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
6618002A8000
|
trusted library allocation
|
page read and write
|
||
767D000
|
heap
|
page read and write
|
||
6618008CC000
|
trusted library allocation
|
page read and write
|
||
C58BFFE000
|
stack
|
page read and write
|
||
76D3000
|
heap
|
page read and write
|
||
661800E4D000
|
trusted library allocation
|
page read and write
|
||
6000002C0000
|
trusted library allocation
|
page read and write
|
||
78CC000
|
heap
|
page read and write
|
||
24A858B5000
|
heap
|
page read and write
|
||
6C18F000
|
unkown
|
page readonly
|
||
66180061C000
|
trusted library allocation
|
page read and write
|
||
661800D94000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6618001AC000
|
trusted library allocation
|
page read and write
|
||
661800214000
|
trusted library allocation
|
page read and write
|
||
6618006AC000
|
trusted library allocation
|
page read and write
|
||
661800B10000
|
trusted library allocation
|
page read and write
|
||
6A940080C000
|
trusted library allocation
|
page read and write
|
||
6618001E0000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
76FB000
|
heap
|
page read and write
|
||
C5DBBEF000
|
stack
|
page read and write
|
||
661800CD8000
|
trusted library allocation
|
page read and write
|
||
6000002B0000
|
trusted library allocation
|
page read and write
|
||
15B7000
|
heap
|
page read and write
|
||
6618001E4000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6618000FC000
|
trusted library allocation
|
page read and write
|
||
C5FF3FE000
|
unkown
|
page readonly
|
||
661800310000
|
trusted library allocation
|
page read and write
|
||
6618002A4000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
24A85560000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page write copy
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6618006E9000
|
trusted library allocation
|
page read and write
|
||
6A94006CC000
|
trusted library allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6618003E1000
|
trusted library allocation
|
page read and write
|
||
661800B1C000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
6A9400430000
|
trusted library allocation
|
page read and write
|
||
770C000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6000002B0000
|
trusted library allocation
|
page read and write
|
||
661800EA0000
|
trusted library allocation
|
page read and write
|
||
6618004E0000
|
trusted library allocation
|
page read and write
|
||
75B4000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
6000002B0000
|
trusted library allocation
|
page read and write
|
||
24A85860000
|
heap
|
page read and write
|
||
661800310000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
661800494000
|
trusted library allocation
|
page read and write
|
||
661800224000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page write copy
|
||
6AD1000
|
heap
|
page read and write
|
||
24A858CC000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800E60000
|
trusted library allocation
|
page read and write
|
||
6A9400330000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
24A81F90000
|
heap
|
page read and write
|
||
6000002D8000
|
trusted library allocation
|
page read and write
|
||
24A8589F000
|
heap
|
page read and write
|
||
6A9400230000
|
trusted library allocation
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
74B1000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
C5EFBFE000
|
stack
|
page read and write
|
||
24A85893000
|
heap
|
page read and write
|
||
24A858E3000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6618007DC000
|
trusted library allocation
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
24A8BF60000
|
trusted library section
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
661800484000
|
trusted library allocation
|
page read and write
|
||
C5E83FE000
|
unkown
|
page readonly
|
||
96C000
|
stack
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
795C000
|
heap
|
page read and write
|
||
6618006EE000
|
trusted library allocation
|
page read and write
|
||
766B000
|
direct allocation
|
page read and write
|
||
66180037C000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
6618001AC000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6A94006D4000
|
trusted library allocation
|
page read and write
|
||
6A94006C8000
|
trusted library allocation
|
page read and write
|
||
661800F80000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
661800E48000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
7C0C000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
24A85324000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
24A8532A000
|
heap
|
page read and write
|
||
68E400284000
|
direct allocation
|
page read and write
|
||
24A8532B000
|
heap
|
page read and write
|
||
6618002B4000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
6618002A4000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
6000002A0000
|
trusted library allocation
|
page read and write
|
||
6618004F8000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85927000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
24A858A4000
|
heap
|
page read and write
|
||
24A858D7000
|
heap
|
page read and write
|
||
24A858A4000
|
heap
|
page read and write
|
||
C5837FE000
|
unkown
|
page readonly
|
||
C5E8BFA000
|
stack
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85322000
|
heap
|
page read and write
|
||
661800F8C000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6A9400758000
|
trusted library allocation
|
page read and write
|
||
661800CAC000
|
trusted library allocation
|
page read and write
|
||
C5EABFE000
|
stack
|
page read and write
|
||
24A8B900000
|
trusted library section
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6618001CC000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
unkown
|
page readonly
|
||
C5EEBFE000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6000002C8000
|
trusted library allocation
|
page read and write
|
||
6618005D4000
|
trusted library allocation
|
page read and write
|
||
6A9400368000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
6618002F0000
|
trusted library allocation
|
page read and write
|
||
58C000
|
stack
|
page read and write
|
||
24A85350000
|
heap
|
page read and write
|
||
66180020C000
|
trusted library allocation
|
page read and write
|
||
C5FDBFE000
|
stack
|
page read and write
|
||
82F000
|
unkown
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
ADC000
|
stack
|
page read and write
|
||
661800CCC000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
661800AD4000
|
trusted library allocation
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
68E400217000
|
direct allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
661800D6C000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
661800DEC000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
661800CD8000
|
trusted library allocation
|
page read and write
|
||
6618001C4000
|
trusted library allocation
|
page read and write
|
||
C5F73FE000
|
unkown
|
page readonly
|
||
75B0000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
661800B7C000
|
trusted library allocation
|
page read and write
|
||
661800C48000
|
trusted library allocation
|
page read and write
|
||
24A85330000
|
heap
|
page read and write
|
||
66180074C000
|
trusted library allocation
|
page read and write
|
||
C5FE3FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8BF80000
|
trusted library section
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400750000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A94006F0000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
C585FFD000
|
stack
|
page read and write
|
||
24A85351000
|
heap
|
page read and write
|
||
24A8BB50000
|
trusted library section
|
page read and write
|
||
C5847FE000
|
unkown
|
page readonly
|
||
6AD1000
|
heap
|
page read and write
|
||
24A858AC000
|
heap
|
page read and write
|
||
C587FFA000
|
stack
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
75B1000
|
heap
|
page read and write
|
||
789B000
|
heap
|
page read and write
|
||
24A8532F000
|
heap
|
page read and write
|
||
7671000
|
heap
|
page read and write
|
||
6A94006AC000
|
trusted library allocation
|
page read and write
|
||
24A8532A000
|
heap
|
page read and write
|
||
68E400260000
|
direct allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
24A85332000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
7716000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A8533F000
|
heap
|
page read and write
|
||
6000002BC000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
60000020D000
|
trusted library allocation
|
page read and write
|
||
66180058C000
|
trusted library allocation
|
page read and write
|
||
6A9400644000
|
trusted library allocation
|
page read and write
|
||
24A8531E000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
24A897C0000
|
trusted library section
|
page read and write
|
||
6618000DC000
|
trusted library allocation
|
page read and write
|
||
6A940060C000
|
trusted library allocation
|
page read and write
|
||
6AD1000
|
heap
|
page read and write
|
||
6A9400788000
|
trusted library allocation
|
page read and write
|
||
661800DDF000
|
trusted library allocation
|
page read and write
|
There are 1361 hidden memdumps, click here to show them.