Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1019.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1059.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE34.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 17:26:37 2024, 0x1205a4 type
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2312 --field-trial-handle=2000,i,3855741216998469249,4112657617320964053,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6592 -s 932
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://docs.google.com/document/O
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
https://www.youtube.com/:
|
unknown
|
||
https://mail.google.com/mail/
|
unknown
|
||
https://mail.google.com/mail/:
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://www.google.com/tools/feedback/chrome/__submit
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
https://mail.google.com/mail/J
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://chrome.google.com/webstore206E5
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
https://mail.google.com/mail/62
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icofrom_play_api
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.html
|
unknown
|
||
https://ch.search.yahoo.com/search
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://www.youtube.com/J
|
unknown
|
||
https://docs.google.com/forms/u/0/create?usp=chrome_actions
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://www.google.com/chrome/tips/gs
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://www.youtube.com/m
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://fvtekk5pn.top/v1/upload.php
|
34.116.198.130
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoenterInsights
|
unknown
|
||
http://unisolated.invalid/6
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/2J
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://drive-daily-4.cPW
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://www.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
https://docs.google.com/document/
|
unknown
|
||
http://google.com/
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://drive.google.com/?lfhs=2/
|
unknown
|
||
https://mail.google.com/mail/installwebapp?usp=chrome_default
|
unknown
|
||
https://www.ecosia.org/search?q=
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://docs.google.com/document/installwebapp?usp=chrome_default
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://drive-daily-3.corp.googl
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_default
|
unknown
|
||
https://docs.google.com/spreadsheets/J
|
unknown
|
||
https://docs.google.com/presentation/?usp=installed_webapplt
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b
|
unknown
|
||
https://docs.google.com/spreadsheets/?usp=installed_webapp
|
unknown
|
||
https://drive-staging.corp.google.com/
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
|
unknown
|
||
https://docs.google.com/spreadsheets/:
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F9379FE000
|
unkown
|
page readonly
|
||
18002F8C000
|
trusted library allocation
|
page read and write
|
||
79F000874000
|
trusted library allocation
|
page read and write
|
||
79F0007A0000
|
trusted library allocation
|
page read and write
|
||
F93F9FE000
|
unkown
|
page readonly
|
||
18002594000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002414000
|
trusted library allocation
|
page read and write
|
||
1800242C000
|
trusted library allocation
|
page read and write
|
||
18002690000
|
trusted library allocation
|
page read and write
|
||
18002E30000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
F93D9FE000
|
unkown
|
page readonly
|
||
79F0006AC000
|
trusted library allocation
|
page read and write
|
||
18002568000
|
trusted library allocation
|
page read and write
|
||
79F00040C000
|
trusted library allocation
|
page read and write
|
||
11C4002F4000
|
trusted library allocation
|
page read and write
|
||
18002EA8000
|
trusted library allocation
|
page read and write
|
||
180025C8000
|
trusted library allocation
|
page read and write
|
||
1800306C000
|
trusted library allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
18002FE0000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
220A1BA8000
|
heap
|
page read and write
|
||
1800241C000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
unkown
|
page execute and write copy
|
||
71A5000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
F9321FE000
|
stack
|
page read and write
|
||
180022D0000
|
trusted library allocation
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
6C278000
|
unkown
|
page readonly
|
||
79F000878000
|
trusted library allocation
|
page read and write
|
||
18002DA4000
|
trusted library allocation
|
page read and write
|
||
18002612000
|
trusted library allocation
|
page read and write
|
||
18002C78000
|
trusted library allocation
|
page read and write
|
||
18003018000
|
trusted library allocation
|
page read and write
|
||
79F000230000
|
trusted library allocation
|
page read and write
|
||
18002AC4000
|
trusted library allocation
|
page read and write
|
||
18002D58000
|
trusted library allocation
|
page read and write
|
||
1800220C000
|
trusted library allocation
|
page read and write
|
||
180028D4000
|
trusted library allocation
|
page read and write
|
||
7102000
|
direct allocation
|
page read and write
|
||
18002F64000
|
trusted library allocation
|
page read and write
|
||
180023D8000
|
trusted library allocation
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1800240C000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
6C22F000
|
unkown
|
page readonly
|
||
18002924000
|
trusted library allocation
|
page read and write
|
||
71CF000
|
heap
|
page read and write
|
||
180024D0000
|
trusted library allocation
|
page read and write
|
||
180024A4000
|
trusted library allocation
|
page read and write
|
||
18002BC0000
|
trusted library allocation
|
page read and write
|
||
3E1800284000
|
direct allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
18002434000
|
trusted library allocation
|
page read and write
|
||
F9391FA000
|
stack
|
page read and write
|
||
11C4002C0000
|
trusted library allocation
|
page read and write
|
||
18002870000
|
trusted library allocation
|
page read and write
|
||
18002FA8000
|
trusted library allocation
|
page read and write
|
||
F9451FC000
|
stack
|
page read and write
|
||
F95A1FE000
|
stack
|
page read and write
|
||
11C4002A0000
|
trusted library allocation
|
page read and write
|
||
220A9D9B000
|
heap
|
page read and write
|
||
18002B74000
|
trusted library allocation
|
page read and write
|
||
18002758000
|
trusted library allocation
|
page read and write
|
||
18002A90000
|
trusted library allocation
|
page read and write
|
||
220A1B7A000
|
heap
|
page read and write
|
||
7251000
|
heap
|
page read and write
|
||
F9581FC000
|
stack
|
page read and write
|
||
1800246C000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
220A1A80000
|
heap
|
page read and write
|
||
18002430000
|
trusted library allocation
|
page read and write
|
||
F9571FA000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F95B1FE000
|
stack
|
page read and write
|
||
18002D6C000
|
trusted library allocation
|
page read and write
|
||
18002A40000
|
trusted library allocation
|
page read and write
|
||
18002724000
|
trusted library allocation
|
page read and write
|
||
18000001000
|
trusted library allocation
|
page read and write
|
||
18002F00000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page write copy
|
||
11C4002A0000
|
trusted library allocation
|
page read and write
|
||
180023E0000
|
trusted library allocation
|
page read and write
|
||
220A1AD0000
|
heap
|
page read and write
|
||
79F000790000
|
trusted library allocation
|
page read and write
|
||
18002F4C000
|
trusted library allocation
|
page read and write
|
||
18002E0C000
|
trusted library allocation
|
page read and write
|
||
79F0006C8000
|
trusted library allocation
|
page read and write
|
||
F9311FF000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
728C000
|
heap
|
page read and write
|
||
6B50000
|
direct allocation
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
3E18002EC000
|
direct allocation
|
page read and write
|
||
7089000
|
heap
|
page read and write
|
||
3E18002E4000
|
direct allocation
|
page read and write
|
||
11C4002B0000
|
trusted library allocation
|
page read and write
|
||
180024A8000
|
trusted library allocation
|
page read and write
|
||
7419000
|
heap
|
page read and write
|
||
7080000
|
heap
|
page read and write
|
||
11C400230000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F000728000
|
trusted library allocation
|
page read and write
|
||
3E1800215000
|
direct allocation
|
page read and write
|
||
721F000
|
heap
|
page read and write
|
||
79F00085C000
|
trusted library allocation
|
page read and write
|
||
79F000884000
|
trusted library allocation
|
page read and write
|
||
715A000
|
heap
|
page read and write
|
||
220A9D60000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002D10000
|
trusted library allocation
|
page read and write
|
||
18002994000
|
trusted library allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
F9469FE000
|
unkown
|
page readonly
|
||
180027AC000
|
trusted library allocation
|
page read and write
|
||
11C400201000
|
trusted library allocation
|
page read and write
|
||
220A5140000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002FF0000
|
trusted library allocation
|
page read and write
|
||
1800226C000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
220A1BB9000
|
heap
|
page read and write
|
||
3E1800234000
|
direct allocation
|
page read and write
|
||
18002B7C000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
16FA000
|
heap
|
page read and write
|
||
79F000238000
|
trusted library allocation
|
page read and write
|
||
1800269C000
|
trusted library allocation
|
page read and write
|
||
F9419FE000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
18002594000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002EC8000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
3E1800230000
|
direct allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
71B9000
|
heap
|
page read and write
|
||
18002388000
|
trusted library allocation
|
page read and write
|
||
180024AE000
|
trusted library allocation
|
page read and write
|
||
3E180024C000
|
direct allocation
|
page read and write
|
||
F9539FE000
|
unkown
|
page readonly
|
||
F94D9FE000
|
unkown
|
page readonly
|
||
16E000
|
unkown
|
page write copy
|
||
180023A8000
|
trusted library allocation
|
page read and write
|
||
7181000
|
heap
|
page read and write
|
||
79F00027C000
|
trusted library allocation
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
73B5000
|
heap
|
page read and write
|
||
220A39C0000
|
heap
|
page read and write
|
||
18002E20000
|
trusted library allocation
|
page read and write
|
||
F9549FE000
|
unkown
|
page readonly
|
||
180024C4000
|
trusted library allocation
|
page read and write
|
||
180025D8000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
220AA5DE000
|
trusted library section
|
page read and write
|
||
11C40020C000
|
trusted library allocation
|
page read and write
|
||
220A578B000
|
heap
|
page read and write
|
||
11C4002B0000
|
trusted library allocation
|
page read and write
|
||
F9499FE000
|
unkown
|
page readonly
|
||
18002344000
|
trusted library allocation
|
page read and write
|
||
F95D1FE000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
18000201000
|
trusted library allocation
|
page read and write
|
||
18002F30000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
220A516E000
|
heap
|
page read and write
|
||
F94D1FE000
|
stack
|
page read and write
|
||
180028CE000
|
trusted library allocation
|
page read and write
|
||
7140000
|
heap
|
page read and write
|
||
180025D8000
|
trusted library allocation
|
page read and write
|
||
3E18002D0000
|
direct allocation
|
page read and write
|
||
220A571E000
|
heap
|
page read and write
|
||
7082000
|
heap
|
page read and write
|
||
18002618000
|
trusted library allocation
|
page read and write
|
||
18000814000
|
trusted library allocation
|
page read and write
|
||
220A39C3000
|
heap
|
page read and write
|
||
79F000848000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
79F0008C4000
|
trusted library allocation
|
page read and write
|
||
18002ED4000
|
trusted library allocation
|
page read and write
|
||
18003050000
|
trusted library allocation
|
page read and write
|
||
F95B9FE000
|
unkown
|
page readonly
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002CB4000
|
trusted library allocation
|
page read and write
|
||
79F00082C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
220A5165000
|
heap
|
page read and write
|
||
18003078000
|
trusted library allocation
|
page read and write
|
||
79F000860000
|
trusted library allocation
|
page read and write
|
||
72B7000
|
heap
|
page read and write
|
||
18002420000
|
trusted library allocation
|
page read and write
|
||
180023F0000
|
trusted library allocation
|
page read and write
|
||
220A1CD0000
|
trusted library allocation
|
page read and write
|
||
1800038E000
|
trusted library allocation
|
page read and write
|
||
F9529FE000
|
unkown
|
page readonly
|
||
7237000
|
heap
|
page read and write
|
||
18002E20000
|
trusted library allocation
|
page read and write
|
||
7082000
|
heap
|
page read and write
|
||
18000801000
|
trusted library allocation
|
page read and write
|
||
18002424000
|
trusted library allocation
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
220A1AD8000
|
heap
|
page read and write
|
||
11C400250000
|
trusted library allocation
|
page read and write
|
||
79F000830000
|
trusted library allocation
|
page read and write
|
||
18000DAA000
|
trusted library allocation
|
page read and write
|
||
72C5000
|
heap
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
F9569FE000
|
unkown
|
page readonly
|
||
F9481FC000
|
stack
|
page read and write
|
||
F93C9FE000
|
unkown
|
page readonly
|
||
18002C28000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
11C400235000
|
trusted library allocation
|
page read and write
|
||
F9399FE000
|
unkown
|
page readonly
|
||
79F0002FC000
|
trusted library allocation
|
page read and write
|
||
18002E20000
|
trusted library allocation
|
page read and write
|
||
F9351FD000
|
stack
|
page read and write
|
||
F95C9FE000
|
unkown
|
page readonly
|
||
18002568000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
220A5177000
|
heap
|
page read and write
|
||
220A9D88000
|
heap
|
page read and write
|
||
180022E0000
|
trusted library allocation
|
page read and write
|
||
180023E4000
|
trusted library allocation
|
page read and write
|
||
1800255C000
|
trusted library allocation
|
page read and write
|
||
180023B4000
|
trusted library allocation
|
page read and write
|
||
18003097000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
180024F0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
220A5185000
|
heap
|
page read and write
|
||
18002260000
|
trusted library allocation
|
page read and write
|
||
220A57AC000
|
heap
|
page read and write
|
||
220A5330000
|
heap
|
page read and write
|
||
18002680000
|
trusted library allocation
|
page read and write
|
||
1800260C000
|
trusted library allocation
|
page read and write
|
||
7085000
|
heap
|
page read and write
|
||
18002CA8000
|
trusted library allocation
|
page read and write
|
||
220A1AA0000
|
heap
|
page read and write
|
||
18002E90000
|
trusted library allocation
|
page read and write
|
||
7255000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
7082000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
18002A0C000
|
trusted library allocation
|
page read and write
|
||
79F00079C000
|
trusted library allocation
|
page read and write
|
||
79F000248000
|
trusted library allocation
|
page read and write
|
||
3E1800280000
|
direct allocation
|
page read and write
|
||
180024B4000
|
trusted library allocation
|
page read and write
|
||
18002C48000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
7377000
|
heap
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
79F000418000
|
trusted library allocation
|
page read and write
|
||
F94E9FE000
|
unkown
|
page readonly
|
||
18002908000
|
trusted library allocation
|
page read and write
|
||
180023DC000
|
trusted library allocation
|
page read and write
|
||
79F000801000
|
trusted library allocation
|
page read and write
|
||
180022F0000
|
trusted library allocation
|
page read and write
|
||
79F00039C000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
79F0007C0000
|
trusted library allocation
|
page read and write
|
||
79F0006E8000
|
trusted library allocation
|
page read and write
|
||
F9421FE000
|
stack
|
page read and write
|
||
F9339FE000
|
unkown
|
page readonly
|
||
220AA7D0000
|
trusted library section
|
page read and write
|
||
180024C4000
|
trusted library allocation
|
page read and write
|
||
220A5150000
|
heap
|
page read and write
|
||
220A1BA9000
|
heap
|
page read and write
|
||
1800240C000
|
trusted library allocation
|
page read and write
|
||
3E1800260000
|
direct allocation
|
page read and write
|
||
79F0006F4000
|
trusted library allocation
|
page read and write
|
||
220A5168000
|
heap
|
page read and write
|
||
18000C01000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F0008E4000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
708A000
|
heap
|
page read and write
|
||
71EA000
|
heap
|
page read and write
|
||
11C400278000
|
trusted library allocation
|
page read and write
|
||
F9439FE000
|
unkown
|
page readonly
|
||
180030A0000
|
trusted library allocation
|
page read and write
|
||
79F000250000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
18002D88000
|
trusted library allocation
|
page read and write
|
||
79F000818000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
18002DB0000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
7085000
|
heap
|
page read and write
|
||
708E000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
180023B4000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
F93D1FA000
|
stack
|
page read and write
|
||
79F0007E0000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
6C22D000
|
unkown
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
180028AC000
|
trusted library allocation
|
page read and write
|
||
F93B9FE000
|
unkown
|
page readonly
|
||
1800291C000
|
trusted library allocation
|
page read and write
|
||
220A9D80000
|
heap
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
F93E1FE000
|
stack
|
page read and write
|
||
3E180023C000
|
direct allocation
|
page read and write
|
||
720E000
|
heap
|
page read and write
|
||
18002E1C000
|
trusted library allocation
|
page read and write
|
||
18002C1C000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
18002F70000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002318000
|
trusted library allocation
|
page read and write
|
||
3E1800294000
|
direct allocation
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
220A1B7E000
|
heap
|
page read and write
|
||
F9349FE000
|
unkown
|
page readonly
|
||
F93A9FE000
|
unkown
|
page readonly
|
||
220A7767000
|
unclassified section
|
page read and write
|
||
79F0007D0000
|
trusted library allocation
|
page read and write
|
||
3E1800303000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002A38000
|
trusted library allocation
|
page read and write
|
||
11C4002A0000
|
trusted library allocation
|
page read and write
|
||
1800290C000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
F9579FE000
|
unkown
|
page readonly
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
79F000864000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9519FE000
|
unkown
|
page readonly
|
||
18002EB8000
|
trusted library allocation
|
page read and write
|
||
73F9000
|
heap
|
page read and write
|
||
18002B68000
|
trusted library allocation
|
page read and write
|
||
18002F98000
|
trusted library allocation
|
page read and write
|
||
18002F24000
|
trusted library allocation
|
page read and write
|
||
7087000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
F93A1FB000
|
stack
|
page read and write
|
||
F9491FB000
|
stack
|
page read and write
|
||
18002674000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F0006E0000
|
trusted library allocation
|
page read and write
|
||
18002318000
|
trusted library allocation
|
page read and write
|
||
18002320000
|
trusted library allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
7236000
|
heap
|
page read and write
|
||
71D8000
|
heap
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002690000
|
trusted library allocation
|
page read and write
|
||
220A5719000
|
heap
|
page read and write
|
||
11C4002C8000
|
trusted library allocation
|
page read and write
|
||
71BF000
|
heap
|
page read and write
|
||
180023F8000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002EF0000
|
trusted library allocation
|
page read and write
|
||
18003038000
|
trusted library allocation
|
page read and write
|
||
1800232C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F0009C4000
|
trusted library allocation
|
page read and write
|
||
220A5178000
|
heap
|
page read and write
|
||
18000AE2000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1800259C000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002201000
|
trusted library allocation
|
page read and write
|
||
742A000
|
heap
|
page read and write
|
||
18002C7C000
|
trusted library allocation
|
page read and write
|
||
6C150000
|
unkown
|
page readonly
|
||
18002A2C000
|
trusted library allocation
|
page read and write
|
||
79F000894000
|
trusted library allocation
|
page read and write
|
||
F9329FE000
|
unkown
|
page readonly
|
||
79F000974000
|
trusted library allocation
|
page read and write
|
||
18002C0C000
|
trusted library allocation
|
page read and write
|
||
F94C9FE000
|
unkown
|
page readonly
|
||
7267000
|
heap
|
page read and write
|
||
F9591FE000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
180023C4000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
1349000
|
heap
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
F9599FE000
|
unkown
|
page readonly
|
||
220A1BB2000
|
heap
|
page read and write
|
||
3E1800220000
|
direct allocation
|
page read and write
|
||
180024C9000
|
trusted library allocation
|
page read and write
|
||
220A5173000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
71FD000
|
heap
|
page read and write
|
||
180024AA000
|
trusted library allocation
|
page read and write
|
||
180023B4000
|
trusted library allocation
|
page read and write
|
||
18002601000
|
trusted library allocation
|
page read and write
|
||
79F0002ED000
|
trusted library allocation
|
page read and write
|
||
18002428000
|
trusted library allocation
|
page read and write
|
||
220A5792000
|
heap
|
page read and write
|
||
220A1CA0000
|
heap
|
page read and write
|
||
732F000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
11C4002B0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002FC3000
|
trusted library allocation
|
page read and write
|
||
708C000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
F95D9FE000
|
unkown
|
page readonly
|
||
F93C1FD000
|
stack
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1800254C000
|
trusted library allocation
|
page read and write
|
||
F95F1FD000
|
stack
|
page read and write
|
||
11C400248000
|
trusted library allocation
|
page read and write
|
||
7164000
|
heap
|
page read and write
|
||
11C400264000
|
trusted library allocation
|
page read and write
|
||
220A1DB0000
|
trusted library section
|
page readonly
|
||
220A57B2000
|
heap
|
page read and write
|
||
220AA170000
|
trusted library section
|
page read and write
|
||
18002EDC000
|
trusted library allocation
|
page read and write
|
||
18002410000
|
trusted library allocation
|
page read and write
|
||
18002E01000
|
trusted library allocation
|
page read and write
|
||
18003094000
|
trusted library allocation
|
page read and write
|
||
220A1AEE000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002FC0000
|
trusted library allocation
|
page read and write
|
||
79F0008EC000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002C01000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
79F00025C000
|
trusted library allocation
|
page read and write
|
||
3E1800201000
|
direct allocation
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
79F000850000
|
trusted library allocation
|
page read and write
|
||
18002EA8000
|
trusted library allocation
|
page read and write
|
||
220A56F0000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
11C400260000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
F95E1FE000
|
stack
|
page read and write
|
||
180027BC000
|
trusted library allocation
|
page read and write
|
||
18002594000
|
trusted library allocation
|
page read and write
|
||
79F0002CC000
|
trusted library allocation
|
page read and write
|
||
18000752000
|
trusted library allocation
|
page read and write
|
||
180024B8000
|
trusted library allocation
|
page read and write
|
||
79F0008AC000
|
trusted library allocation
|
page read and write
|
||
7084000
|
heap
|
page read and write
|
||
220A5173000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F000948000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
220A1DE5000
|
heap
|
page read and write
|
||
7161000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
3E18002A8000
|
direct allocation
|
page read and write
|
||
11C4002F0000
|
trusted library allocation
|
page read and write
|
||
220A58F7000
|
unclassified section
|
page read and write
|
||
220A56F4000
|
heap
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
180024FF000
|
trusted library allocation
|
page read and write
|
||
18002970000
|
trusted library allocation
|
page read and write
|
||
18002F58000
|
trusted library allocation
|
page read and write
|
||
220A517F000
|
heap
|
page read and write
|
||
1800015A000
|
trusted library allocation
|
page read and write
|
||
18002F08000
|
trusted library allocation
|
page read and write
|
||
18002964000
|
trusted library allocation
|
page read and write
|
||
79F000404000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
220A9D8C000
|
heap
|
page read and write
|
||
18002CC8000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
7275000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
18002E44000
|
trusted library allocation
|
page read and write
|
||
F95C1FD000
|
stack
|
page read and write
|
||
180027E0000
|
trusted library allocation
|
page read and write
|
||
79F0007AC000
|
trusted library allocation
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
18002D64000
|
trusted library allocation
|
page read and write
|
||
18002AE0000
|
trusted library allocation
|
page read and write
|
||
18000E01000
|
trusted library allocation
|
page read and write
|
||
79F000778000
|
trusted library allocation
|
page read and write
|
||
79F00020C000
|
trusted library allocation
|
page read and write
|
||
F9309FE000
|
unkown
|
page readonly
|
||
79F000964000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
220A572E000
|
heap
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1800221C000
|
trusted library allocation
|
page read and write
|
||
18002364000
|
trusted library allocation
|
page read and write
|
||
18002778000
|
trusted library allocation
|
page read and write
|
||
18002F1C000
|
trusted library allocation
|
page read and write
|
||
220A1DE0000
|
heap
|
page read and write
|
||
180027CC000
|
trusted library allocation
|
page read and write
|
||
71CB000
|
heap
|
page read and write
|
||
18002D58000
|
trusted library allocation
|
page read and write
|
||
79F0002F4000
|
trusted library allocation
|
page read and write
|
||
220A1A90000
|
heap
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
220A9DCB000
|
heap
|
page read and write
|
||
1800254C000
|
trusted library allocation
|
page read and write
|
||
180025BC000
|
trusted library allocation
|
page read and write
|
||
F9409FE000
|
unkown
|
page readonly
|
||
71CC000
|
heap
|
page read and write
|
||
11C4002C0000
|
trusted library allocation
|
page read and write
|
||
79F00080C000
|
trusted library allocation
|
page read and write
|
||
180024A4000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1800302E000
|
trusted library allocation
|
page read and write
|
||
F94A1FC000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
12A4000
|
heap
|
page read and write
|
||
7089000
|
heap
|
page read and write
|
||
220A9D93000
|
heap
|
page read and write
|
||
F94F1FE000
|
stack
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
299F000
|
unkown
|
page read and write
|
||
11C4002D8000
|
trusted library allocation
|
page read and write
|
||
79F000828000
|
trusted library allocation
|
page read and write
|
||
18002D00000
|
trusted library allocation
|
page read and write
|
||
180028F8000
|
trusted library allocation
|
page read and write
|
||
F9429FE000
|
unkown
|
page readonly
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
7185000
|
heap
|
page read and write
|
||
18002A80000
|
trusted library allocation
|
page read and write
|
||
79F0008F0000
|
trusted library allocation
|
page read and write
|
||
11C4002E4000
|
trusted library allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
F94C1FD000
|
stack
|
page read and write
|
||
730D000
|
heap
|
page read and write
|
||
11C400288000
|
trusted library allocation
|
page read and write
|
||
7088000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9449FE000
|
unkown
|
page readonly
|
||
171000
|
unkown
|
page readonly
|
||
79F0008D8000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9511FE000
|
stack
|
page read and write
|
||
180023B4000
|
trusted library allocation
|
page read and write
|
||
18002BE8000
|
trusted library allocation
|
page read and write
|
||
18002B0C000
|
trusted library allocation
|
page read and write
|
||
71FC000
|
heap
|
page read and write
|
||
79F0006C8000
|
trusted library allocation
|
page read and write
|
||
F95E9FE000
|
unkown
|
page readonly
|
||
F9369FE000
|
unkown
|
page readonly
|
||
79F0007E4000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
11C400220000
|
trusted library allocation
|
page read and write
|
||
18000601000
|
trusted library allocation
|
page read and write
|
||
79F00060C000
|
trusted library allocation
|
page read and write
|
||
711E000
|
heap
|
page read and write
|
||
18002588000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7259000
|
direct allocation
|
page read and write
|
||
79F000601000
|
trusted library allocation
|
page read and write
|
||
180023D4000
|
trusted library allocation
|
page read and write
|
||
3250000
|
direct allocation
|
page read and write
|
||
220A516E000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
18000401000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
direct allocation
|
page execute and read and write
|
||
180028BC000
|
trusted library allocation
|
page read and write
|
||
18002AAC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
3E1800250000
|
direct allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
220A57B4000
|
heap
|
page read and write
|
||
71DE000
|
heap
|
page read and write
|
||
3260000
|
direct allocation
|
page execute and read and write
|
||
724B000
|
heap
|
page read and write
|
||
7080000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
18002E58000
|
trusted library allocation
|
page read and write
|
||
18000D98000
|
trusted library allocation
|
page read and write
|
||
18002EA0000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
18002930000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002BD0000
|
trusted library allocation
|
page read and write
|
||
18003074000
|
trusted library allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
6C27C000
|
unkown
|
page readonly
|
||
220A78B0000
|
heap
|
page read and write
|
||
79F0007D4000
|
trusted library allocation
|
page read and write
|
||
180026F7000
|
trusted library allocation
|
page read and write
|
||
725B000
|
direct allocation
|
page read and write
|
||
7353000
|
heap
|
page read and write
|
||
6C279000
|
unkown
|
page read and write
|
||
18001001000
|
trusted library allocation
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
7086000
|
heap
|
page read and write
|
||
F94B1FC000
|
stack
|
page read and write
|
||
79F0006E8000
|
trusted library allocation
|
page read and write
|
||
79F0006D4000
|
trusted library allocation
|
page read and write
|
||
713C000
|
heap
|
page read and write
|
||
79F000890000
|
trusted library allocation
|
page read and write
|
||
F92F1F5000
|
stack
|
page read and write
|
||
1800274D000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
F9371FB000
|
stack
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
57A000
|
stack
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002D90000
|
trusted library allocation
|
page read and write
|
||
18002EE8000
|
trusted library allocation
|
page read and write
|
||
79F000844000
|
trusted library allocation
|
page read and write
|
||
79F00081C000
|
trusted library allocation
|
page read and write
|
||
79F00071C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
3E1800290000
|
direct allocation
|
page read and write
|
||
79F0006AC000
|
trusted library allocation
|
page read and write
|
||
220A5179000
|
heap
|
page read and write
|
||
79F000210000
|
trusted library allocation
|
page read and write
|
||
18002574000
|
trusted library allocation
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
708E000
|
heap
|
page read and write
|
||
18002F84000
|
trusted library allocation
|
page read and write
|
||
18002CBC000
|
trusted library allocation
|
page read and write
|
||
79F0008A8000
|
trusted library allocation
|
page read and write
|
||
79F00078C000
|
trusted library allocation
|
page read and write
|
||
714E000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
F9509FE000
|
unkown
|
page readonly
|
||
220A5860000
|
trusted library section
|
page read and write
|
||
79F000700000
|
trusted library allocation
|
page read and write
|
||
3E180020C000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
79F000220000
|
trusted library allocation
|
page read and write
|
||
F9551FC000
|
stack
|
page read and write
|
||
7085000
|
heap
|
page read and write
|
||
F9589FE000
|
unkown
|
page readonly
|
||
18002718000
|
trusted library allocation
|
page read and write
|
||
79F00091C000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
11C4002C0000
|
trusted library allocation
|
page read and write
|
||
18002318000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
F9431FE000
|
stack
|
page read and write
|
||
220A5660000
|
trusted library section
|
page read and write
|
||
180025B4000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
18002374000
|
trusted library allocation
|
page read and write
|
||
18002CB8000
|
trusted library allocation
|
page read and write
|
||
F93E9FE000
|
unkown
|
page readonly
|
||
18002E84000
|
trusted library allocation
|
page read and write
|
||
73BC000
|
heap
|
page read and write
|
||
79F0008F4000
|
trusted library allocation
|
page read and write
|
||
79F00095C000
|
trusted library allocation
|
page read and write
|
||
18002700000
|
trusted library allocation
|
page read and write
|
||
1800305C000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
180023E8000
|
trusted library allocation
|
page read and write
|
||
180029B0000
|
trusted library allocation
|
page read and write
|
||
F9411FD000
|
stack
|
page read and write
|
||
18002CDC000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
79F000248000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
79F000788000
|
trusted library allocation
|
page read and write
|
||
220A9DCF000
|
heap
|
page read and write
|
||
79F000904000
|
trusted library allocation
|
page read and write
|
||
18002B2C000
|
trusted library allocation
|
page read and write
|
||
180024C7000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
744A000
|
heap
|
page read and write
|
||
180026B8000
|
trusted library allocation
|
page read and write
|
||
79F000840000
|
trusted library allocation
|
page read and write
|
||
F94A9FE000
|
unkown
|
page readonly
|
||
3250000
|
direct allocation
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
220A5177000
|
heap
|
page read and write
|
||
F95F9FE000
|
unkown
|
page readonly
|
||
79F000430000
|
trusted library allocation
|
page read and write
|
||
18002354000
|
trusted library allocation
|
page read and write
|
||
18003088000
|
trusted library allocation
|
page read and write
|
||
220A5185000
|
heap
|
page read and write
|
||
7268000
|
heap
|
page read and write
|
||
180024A4000
|
trusted library allocation
|
page read and write
|
||
18002D80000
|
trusted library allocation
|
page read and write
|
||
220A5180000
|
heap
|
page read and write
|
||
18002820000
|
trusted library allocation
|
page read and write
|
||
708A000
|
heap
|
page read and write
|
||
18002E90000
|
trusted library allocation
|
page read and write
|
||
F94F9FE000
|
unkown
|
page readonly
|
||
18002D18000
|
trusted library allocation
|
page read and write
|
||
F94B9FE000
|
unkown
|
page readonly
|
||
A5F000
|
stack
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
7084000
|
heap
|
page read and write
|
||
11C4002F8000
|
trusted library allocation
|
page read and write
|
||
220A9F70000
|
trusted library section
|
page read and write
|
||
18002EA0000
|
trusted library allocation
|
page read and write
|
||
18002764000
|
trusted library allocation
|
page read and write
|
||
F9341FE000
|
stack
|
page read and write
|
||
7112000
|
heap
|
page read and write
|
||
79F000880000
|
trusted library allocation
|
page read and write
|
||
3E1800270000
|
direct allocation
|
page read and write
|
||
737D000
|
heap
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
18002E64000
|
trusted library allocation
|
page read and write
|
||
79F00039C000
|
trusted library allocation
|
page read and write
|
||
220A5700000
|
heap
|
page read and write
|
||
F9301FE000
|
unkown
|
page read and write
|
||
180026CC000
|
trusted library allocation
|
page read and write
|
||
220AA7DE000
|
trusted library section
|
page read and write
|
||
220A7860000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
180028A0000
|
trusted library allocation
|
page read and write
|
||
220AAA02000
|
trusted library allocation
|
page read and write
|
||
7084000
|
heap
|
page read and write
|
||
180022A8000
|
trusted library allocation
|
page read and write
|
||
180026F0000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002490000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
220A5763000
|
heap
|
page read and write
|
||
F93B1FC000
|
stack
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
79F000201000
|
trusted library allocation
|
page read and write
|
||
11C4002BC000
|
trusted library allocation
|
page read and write
|
||
18002CE8000
|
trusted library allocation
|
page read and write
|
||
180027F8000
|
trusted library allocation
|
page read and write
|
||
79F000918000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
18002C34000
|
trusted library allocation
|
page read and write
|
||
220AA597000
|
unclassified section
|
page read and write
|
||
F9541FD000
|
stack
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
7211000
|
heap
|
page read and write
|
||
1800300C000
|
trusted library allocation
|
page read and write
|
||
F9471FB000
|
stack
|
page read and write
|
||
F9561FE000
|
stack
|
page read and write
|
||
7244000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
F9479FE000
|
unkown
|
page readonly
|
||
18002594000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
79F000920000
|
trusted library allocation
|
page read and write
|
||
18002418000
|
trusted library allocation
|
page read and write
|
||
53D000
|
stack
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
66D1000
|
heap
|
page read and write
|
||
1800297C000
|
trusted library allocation
|
page read and write
|
||
79F0006F0000
|
trusted library allocation
|
page read and write
|
||
220A579B000
|
heap
|
page read and write
|
||
3E1800210000
|
direct allocation
|
page read and write
|
||
79F0008C8000
|
trusted library allocation
|
page read and write
|
||
1800280C000
|
trusted library allocation
|
page read and write
|
||
1800227C000
|
trusted library allocation
|
page read and write
|
||
F9559FE000
|
unkown
|
page readonly
|
||
18002E1C000
|
trusted library allocation
|
page read and write
|
||
18002AFC000
|
trusted library allocation
|
page read and write
|
||
7124000
|
heap
|
page read and write
|
||
180000DA000
|
trusted library allocation
|
page read and write
|
||
220A78B3000
|
heap
|
page read and write
|
||
18002F3C000
|
trusted library allocation
|
page read and write
|
||
18003048000
|
trusted library allocation
|
page read and write
|
||
11C4002A0000
|
trusted library allocation
|
page read and write
|
||
220A57D3000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18002398000
|
trusted library allocation
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9521FE000
|
stack
|
page read and write
|
||
F9381FE000
|
stack
|
page read and write
|
||
180025A8000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
18002DE4000
|
trusted library allocation
|
page read and write
|
||
F9489FE000
|
unkown
|
page readonly
|
||
79F0006BC000
|
trusted library allocation
|
page read and write
|
||
3E1800274000
|
direct allocation
|
page read and write
|
||
3E1800217000
|
direct allocation
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
3E18002AC000
|
direct allocation
|
page read and write
|
||
71AC000
|
heap
|
page read and write
|
||
71F5000
|
heap
|
page read and write
|
||
11C400274000
|
trusted library allocation
|
page read and write
|
||
220A9D70000
|
heap
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
79F00087C000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9C000
|
stack
|
page read and write
|
||
79F000898000
|
trusted library allocation
|
page read and write
|
||
18000E40000
|
trusted library allocation
|
page read and write
|
||
220AA5D0000
|
trusted library section
|
page read and write
|
||
F93F1FE000
|
stack
|
page read and write
|
||
18002E38000
|
trusted library allocation
|
page read and write
|
||
18003060000
|
trusted library allocation
|
page read and write
|
||
18002580000
|
trusted library allocation
|
page read and write
|
||
18002758000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9461FB000
|
stack
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
7081000
|
heap
|
page read and write
|
||
79F000868000
|
trusted library allocation
|
page read and write
|
||
72FA000
|
heap
|
page read and write
|
||
11C400238000
|
trusted library allocation
|
page read and write
|
||
1800260E000
|
trusted library allocation
|
page read and write
|
||
1800254C000
|
trusted library allocation
|
page read and write
|
||
18002B98000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
F9459FE000
|
unkown
|
page readonly
|
||
79F00084C000
|
trusted library allocation
|
page read and write
|
||
F9441FC000
|
stack
|
page read and write
|
||
11C400294000
|
trusted library allocation
|
page read and write
|
||
79F00070C000
|
trusted library allocation
|
page read and write
|
||
F9331FE000
|
stack
|
page read and write
|
||
1800070E000
|
trusted library allocation
|
page read and write
|
||
C5F000
|
stack
|
page read and write
|
||
79F0002B8000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
18002B48000
|
trusted library allocation
|
page read and write
|
||
79F000408000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
18000A01000
|
trusted library allocation
|
page read and write
|
||
220A57B0000
|
heap
|
page read and write
|
||
180024A8000
|
trusted library allocation
|
page read and write
|
||
F94E1FE000
|
stack
|
page read and write
|
||
79F000401000
|
trusted library allocation
|
page read and write
|
||
F9389FE000
|
unkown
|
page readonly
|
||
FC000
|
stack
|
page read and write
|
||
180029F0000
|
trusted library allocation
|
page read and write
|
||
220A9D98000
|
heap
|
page read and write
|
||
18002801000
|
trusted library allocation
|
page read and write
|
||
180024F7000
|
trusted library allocation
|
page read and write
|
||
220A57C0000
|
heap
|
page read and write
|
||
3E18002DC000
|
direct allocation
|
page read and write
|
||
220A77F7000
|
unclassified section
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
18002FB8000
|
trusted library allocation
|
page read and write
|
||
180024F4000
|
trusted library allocation
|
page read and write
|
||
180023A0000
|
trusted library allocation
|
page read and write
|
||
18002E90000
|
trusted library allocation
|
page read and write
|
||
18003084000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
18002AF0000
|
trusted library allocation
|
page read and write
|
||
7210000
|
heap
|
page read and write
|
||
18002244000
|
trusted library allocation
|
page read and write
|
||
18002588000
|
trusted library allocation
|
page read and write
|
||
180023EC000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
1800228F000
|
trusted library allocation
|
page read and write
|
||
708C000
|
heap
|
page read and write
|
||
18002FD0000
|
trusted library allocation
|
page read and write
|
||
220A578F000
|
heap
|
page read and write
|
||
220A5184000
|
heap
|
page read and write
|
||
180029CC000
|
trusted library allocation
|
page read and write
|
||
220A5173000
|
heap
|
page read and write
|
||
18002401000
|
trusted library allocation
|
page read and write
|
||
171000
|
unkown
|
page readonly
|
||
66D1000
|
heap
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
79F0002E4000
|
trusted library allocation
|
page read and write
|
||
180023F4000
|
trusted library allocation
|
page read and write
|
||
71E9000
|
heap
|
page read and write
|
||
79F0007BC000
|
trusted library allocation
|
page read and write
|
||
220A1CC0000
|
trusted library allocation
|
page read and write
|
||
18002A01000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page execute and read and write
|
||
739F000
|
heap
|
page read and write
|
||
708B000
|
heap
|
page read and write
|
||
18002860000
|
trusted library allocation
|
page read and write
|
||
220A4410000
|
unkown
|
page read and write
|
||
18002F4C000
|
trusted library allocation
|
page read and write
|
||
220A5177000
|
heap
|
page read and write
|
||
220A57B8000
|
heap
|
page read and write
|
||
F9359FE000
|
unkown
|
page readonly
|
||
F95A9FE000
|
unkown
|
page readonly
|
||
1800255C000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
1800255C000
|
trusted library allocation
|
page read and write
|
||
79F0008B8000
|
trusted library allocation
|
page read and write
|
||
180023C8000
|
trusted library allocation
|
page read and write
|
||
180026B4000
|
trusted library allocation
|
page read and write
|
||
6C151000
|
unkown
|
page execute read
|
||
79F0008E8000
|
trusted library allocation
|
page read and write
|
||
18000B00000
|
trusted library allocation
|
page read and write
|
||
220A1B9E000
|
heap
|
page read and write
|
||
180028C9000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
11C4002C0000
|
trusted library allocation
|
page read and write
|
||
1800287C000
|
trusted library allocation
|
page read and write
|
||
18002C28000
|
trusted library allocation
|
page read and write
|
||
18002272000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
3270000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
79F000424000
|
trusted library allocation
|
page read and write
|
||
F9531FE000
|
stack
|
page read and write
|
||
11C4002C0000
|
trusted library allocation
|
page read and write
|
||
F9501FD000
|
stack
|
page read and write
|
||
79F000288000
|
trusted library allocation
|
page read and write
|
||
16A000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page readonly
|
||
7334000
|
heap
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
18003001000
|
trusted library allocation
|
page read and write
|
||
220A5722000
|
heap
|
page read and write
|
||
11C400270000
|
trusted library allocation
|
page read and write
|
||
1800283C000
|
trusted library allocation
|
page read and write
|
||
F9401FE000
|
stack
|
page read and write
|
||
220A57B6000
|
heap
|
page read and write
|
||
79F0002D4000
|
trusted library allocation
|
page read and write
|
||
18002574000
|
trusted library allocation
|
page read and write
|
||
18002E54000
|
trusted library allocation
|
page read and write
|
||
79F0002B0000
|
trusted library allocation
|
page read and write
|
||
18002E3C000
|
trusted library allocation
|
page read and write
|
||
79F000960000
|
trusted library allocation
|
page read and write
|
||
F9361FB000
|
stack
|
page read and write
|
||
16FE000
|
heap
|
page read and write
|
||
79F0006AC000
|
trusted library allocation
|
page read and write
|
There are 927 hidden memdumps, click here to show them.