Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_b531ef6b-0b59-4502-aa17-7c5ca09d99bd\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D6.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Nov 24 01:29:33 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC49C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC50A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2544 --field-trial-handle=2316,i,2533003572395420932,2322176061652296180,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 1824
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icodexed
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2me/
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
http://anglebug.com/57508
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoings
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/72794
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://www.google.com/search?q=$
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
31240020C000
|
trusted library allocation
|
page read and write
|
||
56DC0035C000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B40298D000
|
trusted library allocation
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
10FBFE000
|
stack
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
56DC006CC000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
10EBFE000
|
stack
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1203FE000
|
unkown
|
page readonly
|
||
72B400A01000
|
trusted library allocation
|
page read and write
|
||
194DCF05000
|
heap
|
page read and write
|
||
194DCEB0000
|
heap
|
page read and write
|
||
72B403094000
|
trusted library allocation
|
page read and write
|
||
72B402C2C000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
746E000
|
heap
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
72B402C48000
|
trusted library allocation
|
page read and write
|
||
3124002F0000
|
trusted library allocation
|
page read and write
|
||
72B4031A4000
|
trusted library allocation
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
1133FE000
|
unkown
|
page readonly
|
||
194DCEF6000
|
heap
|
page read and write
|
||
72B40247C000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC957000
|
heap
|
page read and write
|
||
56DC00644000
|
trusted library allocation
|
page read and write
|
||
312400274000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194E0520000
|
trusted library allocation
|
page read and write
|
||
72B4024C0000
|
trusted library allocation
|
page read and write
|
||
72B4023E0000
|
trusted library allocation
|
page read and write
|
||
71D7000
|
heap
|
page read and write
|
||
194DCECE000
|
heap
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
3124002A0000
|
trusted library allocation
|
page read and write
|
||
1273FE000
|
unkown
|
page readonly
|
||
194DC950000
|
heap
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
72B402D2C000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B400801000
|
trusted library allocation
|
page read and write
|
||
56DC00694000
|
trusted library allocation
|
page read and write
|
||
194DC941000
|
heap
|
page read and write
|
||
72B402414000
|
trusted library allocation
|
page read and write
|
||
72B40328C000
|
trusted library allocation
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
72B402C1C000
|
trusted library allocation
|
page read and write
|
||
56DC0025C000
|
trusted library allocation
|
page read and write
|
||
56DC00758000
|
trusted library allocation
|
page read and write
|
||
56DC00230000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B402D00000
|
trusted library allocation
|
page read and write
|
||
72B40313C000
|
trusted library allocation
|
page read and write
|
||
72B40249A000
|
trusted library allocation
|
page read and write
|
||
72B40251C000
|
trusted library allocation
|
page read and write
|
||
1043FE000
|
unkown
|
page readonly
|
||
194DC960000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
56DC0060C000
|
trusted library allocation
|
page read and write
|
||
56DC003EC000
|
trusted library allocation
|
page read and write
|
||
56DC00310000
|
trusted library allocation
|
page read and write
|
||
72B4023D4000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
56DC006EC000
|
trusted library allocation
|
page read and write
|
||
72B4032C8000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B403364000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B40249E000
|
trusted library allocation
|
page read and write
|
||
194DCEF0000
|
heap
|
page read and write
|
||
56DC00744000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B402590000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B40241C000
|
trusted library allocation
|
page read and write
|
||
72B402C38000
|
trusted library allocation
|
page read and write
|
||
10E3FE000
|
unkown
|
page readonly
|
||
72B4026F0000
|
trusted library allocation
|
page read and write
|
||
72B4026EC000
|
trusted library allocation
|
page read and write
|
||
72B4022D0000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
unkown
|
page readonly
|
||
6BD90000
|
unkown
|
page readonly
|
||
3124002A0000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
unkown
|
page readonly
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
102BFE000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B4024A4000
|
trusted library allocation
|
page read and write
|
||
194DCEF4000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B4024E0000
|
trusted library allocation
|
page read and write
|
||
3124002D8000
|
trusted library allocation
|
page read and write
|
||
194DC920000
|
heap
|
page read and write
|
||
56DC00760000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B400001000
|
trusted library allocation
|
page read and write
|
||
56DC0035C000
|
trusted library allocation
|
page read and write
|
||
72B40305C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72BE000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
602400274000
|
direct allocation
|
page read and write
|
||
72B4030C0000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72DD000
|
heap
|
page read and write
|
||
71DA000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DCEEC000
|
heap
|
page read and write
|
||
11C3FE000
|
unkown
|
page readonly
|
||
A10000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
12F3FE000
|
unkown
|
page readonly
|
||
56DC00238000
|
trusted library allocation
|
page read and write
|
||
501000
|
unkown
|
page readonly
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
72B402C01000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B4024B4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E3530000
|
trusted library section
|
page read and write
|
||
121BFB000
|
stack
|
page read and write
|
||
120BFD000
|
stack
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B402FF0000
|
trusted library allocation
|
page read and write
|
||
72B402A0C000
|
trusted library allocation
|
page read and write
|
||
72B403088000
|
trusted library allocation
|
page read and write
|
||
56DC002F4000
|
trusted library allocation
|
page read and write
|
||
103BFE000
|
stack
|
page read and write
|
||
194E3A5D000
|
trusted library section
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DCEF0000
|
heap
|
page read and write
|
||
7378000
|
heap
|
page read and write
|
||
72B402BCC000
|
trusted library allocation
|
page read and write
|
||
1143FE000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page readonly
|
||
72B402FB8000
|
trusted library allocation
|
page read and write
|
||
72B402C2C000
|
trusted library allocation
|
page read and write
|
||
194DCF15000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B4025A4000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194E2CA3000
|
heap
|
page read and write
|
||
56DC00698000
|
trusted library allocation
|
page read and write
|
||
151000
|
unkown
|
page execute and write copy
|
||
6731000
|
heap
|
page read and write
|
||
194E2B70000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B403144000
|
trusted library allocation
|
page read and write
|
||
72B402BE8000
|
trusted library allocation
|
page read and write
|
||
72B402A2C000
|
trusted library allocation
|
page read and write
|
||
56DC002D4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402E0C000
|
trusted library allocation
|
page read and write
|
||
72B402410000
|
trusted library allocation
|
page read and write
|
||
72B403238000
|
trusted library allocation
|
page read and write
|
||
194D955B000
|
heap
|
page read and write
|
||
194DC983000
|
heap
|
page read and write
|
||
72B402504000
|
trusted library allocation
|
page read and write
|
||
72B4023F0000
|
trusted library allocation
|
page read and write
|
||
72B4023D8000
|
trusted library allocation
|
page read and write
|
||
749E000
|
heap
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
194DC963000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402601000
|
trusted library allocation
|
page read and write
|
||
72B402550000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC983000
|
heap
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
56DC0027C000
|
trusted library allocation
|
page read and write
|
||
194DCF95000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC00658000
|
trusted library allocation
|
page read and write
|
||
72B40275C000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
72B4028BC000
|
trusted library allocation
|
page read and write
|
||
194E1343000
|
heap
|
page read and write
|
||
4FA000
|
unkown
|
page readonly
|
||
602400210000
|
direct allocation
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
4FA000
|
unkown
|
page readonly
|
||
726D000
|
heap
|
page read and write
|
||
11EBFD000
|
stack
|
page read and write
|
||
194E1340000
|
heap
|
page read and write
|
||
72B4030F4000
|
trusted library allocation
|
page read and write
|
||
194DCF20000
|
heap
|
page read and write
|
||
72B403168000
|
trusted library allocation
|
page read and write
|
||
72B402E90000
|
trusted library allocation
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
2B5E000
|
unkown
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1283FE000
|
unkown
|
page readonly
|
||
72B4028CC000
|
trusted library allocation
|
page read and write
|
||
194DC93D000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B403168000
|
trusted library allocation
|
page read and write
|
||
72B40349C000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B4030A0000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402868000
|
trusted library allocation
|
page read and write
|
||
71BF000
|
heap
|
page read and write
|
||
720E000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DCF22000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B402938000
|
trusted library allocation
|
page read and write
|
||
72B402ABC000
|
trusted library allocation
|
page read and write
|
||
56DC00714000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
12C3FE000
|
unkown
|
page readonly
|
||
100BEF000
|
stack
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
72B403354000
|
trusted library allocation
|
page read and write
|
||
194D93E0000
|
heap
|
page readonly
|
||
56DC00788000
|
trusted library allocation
|
page read and write
|
||
56DC00718000
|
trusted library allocation
|
page read and write
|
||
72B40225F000
|
trusted library allocation
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
194DC94C000
|
heap
|
page read and write
|
||
115BFE000
|
stack
|
page read and write
|
||
56DC00404000
|
trusted library allocation
|
page read and write
|
||
72B402328000
|
trusted library allocation
|
page read and write
|
||
56DC00630000
|
trusted library allocation
|
page read and write
|
||
72B4028C2000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B40234C000
|
trusted library allocation
|
page read and write
|
||
194E2CF2000
|
trusted library section
|
page read and write
|
||
501000
|
unkown
|
page readonly
|
||
56DC0039C000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B4023AC000
|
trusted library allocation
|
page read and write
|
||
194E3A90000
|
trusted library section
|
page read and write
|
||
11FBFC000
|
stack
|
page read and write
|
||
56DC00770000
|
trusted library allocation
|
page read and write
|
||
194DCEF4000
|
heap
|
page read and write
|
||
194E134D000
|
heap
|
page read and write
|
||
72B402F50000
|
trusted library allocation
|
page read and write
|
||
11D3FE000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
602400270000
|
direct allocation
|
page read and write
|
||
72B4031E8000
|
trusted library allocation
|
page read and write
|
||
72B402D30000
|
trusted library allocation
|
page read and write
|
||
194D9561000
|
heap
|
page read and write
|
||
56DC00374000
|
trusted library allocation
|
page read and write
|
||
56DC00801000
|
trusted library allocation
|
page read and write
|
||
194D9440000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DC93B000
|
heap
|
page read and write
|
||
3124002C0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
7344000
|
heap
|
page read and write
|
||
72B4031A4000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402801000
|
trusted library allocation
|
page read and write
|
||
72B403198000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
56DC00210000
|
trusted library allocation
|
page read and write
|
||
72F2000
|
heap
|
page read and write
|
||
194DC93E000
|
heap
|
page read and write
|
||
1053FE000
|
unkown
|
page readonly
|
||
72B4031C0000
|
trusted library allocation
|
page read and write
|
||
72B4024A8000
|
trusted library allocation
|
page read and write
|
||
194DC939000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DCEDD000
|
heap
|
page read and write
|
||
194DD1E0000
|
trusted library allocation
|
page read and write
|
||
72B402E94000
|
trusted library allocation
|
page read and write
|
||
56DC00654000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DCF55000
|
heap
|
page read and write
|
||
12A3FE000
|
unkown
|
page readonly
|
||
194D94A0000
|
heap
|
page read and write
|
||
72B4030DC000
|
trusted library allocation
|
page read and write
|
||
72B401001000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
4FE000
|
unkown
|
page write copy
|
||
72B40260C000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B403001000
|
trusted library allocation
|
page read and write
|
||
72B402BA4000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
5E0000
|
heap
|
page read and write
|
||
312400238000
|
trusted library allocation
|
page read and write
|
||
10D3FE000
|
unkown
|
page readonly
|
||
194E34E0000
|
trusted library section
|
page read and write
|
||
72B4030CC000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
72B402950000
|
trusted library allocation
|
page read and write
|
||
72B402550000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
72B403040000
|
trusted library allocation
|
page read and write
|
||
10B3FE000
|
unkown
|
page readonly
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
194DCEE4000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DCEB9000
|
heap
|
page read and write
|
||
1263FE000
|
unkown
|
page readonly
|
||
194DCBB0000
|
heap
|
page read and write
|
||
194DCEDD000
|
heap
|
page read and write
|
||
72B402D7C000
|
trusted library allocation
|
page read and write
|
||
72B40277C000
|
trusted library allocation
|
page read and write
|
||
72B402DC8000
|
trusted library allocation
|
page read and write
|
||
56DC00678000
|
trusted library allocation
|
page read and write
|
||
72B403198000
|
trusted library allocation
|
page read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
194DC93D000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194E34C0000
|
trusted library section
|
page read and write
|
||
1083FE000
|
unkown
|
page readonly
|
||
194DC960000
|
heap
|
page read and write
|
||
72B4032A4000
|
trusted library allocation
|
page read and write
|
||
72B4027A4000
|
trusted library allocation
|
page read and write
|
||
6024002AC000
|
direct allocation
|
page read and write
|
||
72B400201000
|
trusted library allocation
|
page read and write
|
||
60240024C000
|
direct allocation
|
page read and write
|
||
72B4031C4000
|
trusted library allocation
|
page read and write
|
||
72B402B40000
|
trusted library allocation
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
72B4024F0000
|
trusted library allocation
|
page read and write
|
||
194DC957000
|
heap
|
page read and write
|
||
72B402A88000
|
trusted library allocation
|
page read and write
|
||
194E2B17000
|
unclassified section
|
page read and write
|
||
194E3A36000
|
trusted library section
|
page read and write
|
||
72B402684000
|
trusted library allocation
|
page read and write
|
||
72B40284C000
|
trusted library allocation
|
page read and write
|
||
194E2CE0000
|
trusted library section
|
page read and write
|
||
72B402CE0000
|
trusted library allocation
|
page read and write
|
||
194DC983000
|
heap
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
602400234000
|
direct allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
727D000
|
heap
|
page read and write
|
||
194DCE60000
|
trusted library section
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
72B402C2C000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B4023AC000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
56DC00430000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
7449000
|
heap
|
page read and write
|
||
72B4034B0000
|
trusted library allocation
|
page read and write
|
||
1243FE000
|
unkown
|
page readonly
|
||
1233FE000
|
unkown
|
page readonly
|
||
6731000
|
heap
|
page read and write
|
||
74DD000
|
heap
|
page read and write
|
||
72B402644000
|
trusted library allocation
|
page read and write
|
||
72B40278C000
|
trusted library allocation
|
page read and write
|
||
194DC94E000
|
heap
|
page read and write
|
||
72B402430000
|
trusted library allocation
|
page read and write
|
||
72B40306C000
|
trusted library allocation
|
page read and write
|
||
72B4023B4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B402504000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B402E54000
|
trusted library allocation
|
page read and write
|
||
72B402E20000
|
trusted library allocation
|
page read and write
|
||
312400220000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
6BEB8000
|
unkown
|
page readonly
|
||
194E3A52000
|
trusted library section
|
page read and write
|
||
312400260000
|
trusted library allocation
|
page read and write
|
||
117BFC000
|
stack
|
page read and write
|
||
194DCF75000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
12FBFE000
|
stack
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
72B402ED4000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402CA4000
|
trusted library allocation
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
56DC00750000
|
trusted library allocation
|
page read and write
|
||
110BFE000
|
stack
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B402544000
|
trusted library allocation
|
page read and write
|
||
194DC949000
|
heap
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B402878000
|
trusted library allocation
|
page read and write
|
||
72B4029E4000
|
trusted library allocation
|
page read and write
|
||
72B403401000
|
trusted library allocation
|
page read and write
|
||
725D000
|
heap
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
72B402490000
|
trusted library allocation
|
page read and write
|
||
194DCECE000
|
heap
|
page read and write
|
||
11A3FE000
|
unkown
|
page readonly
|
||
2D8E000
|
stack
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
72B40316C000
|
trusted library allocation
|
page read and write
|
||
194DBB80000
|
unkown
|
page read and write
|
||
72B403040000
|
trusted library allocation
|
page read and write
|
||
56DC007D0000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
312400250000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
BDB000
|
unkown
|
page execute and write copy
|
||
56DC006E4000
|
trusted library allocation
|
page read and write
|
||
72B40240C000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
72B402AF4000
|
trusted library allocation
|
page read and write
|
||
724E000
|
heap
|
page read and write
|
||
72B402334000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B402E84000
|
trusted library allocation
|
page read and write
|
||
72B402BB4000
|
trusted library allocation
|
page read and write
|
||
56DC00354000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402F8C000
|
trusted library allocation
|
page read and write
|
||
194E2CB7000
|
unclassified section
|
page read and write
|
||
501000
|
unkown
|
page readonly
|
||
72B4032E8000
|
trusted library allocation
|
page read and write
|
||
312400264000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B402A4C000
|
trusted library allocation
|
page read and write
|
||
312400288000
|
trusted library allocation
|
page read and write
|
||
72B402F14000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194E2CA0000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B4029C0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B403274000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
7321000
|
heap
|
page read and write
|
||
72B4028BC000
|
trusted library allocation
|
page read and write
|
||
10DBFE000
|
stack
|
page read and write
|
||
194DCF50000
|
heap
|
page read and write
|
||
721F000
|
heap
|
page read and write
|
||
1293FE000
|
unkown
|
page readonly
|
||
194D9420000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E3AD0000
|
trusted library section
|
page read and write
|
||
1113FE000
|
unkown
|
page readonly
|
||
1023FE000
|
unkown
|
page readonly
|
||
72B40334C000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
44C000
|
stack
|
page read and write
|
||
72B40317C000
|
trusted library allocation
|
page read and write
|
||
56DC006C8000
|
trusted library allocation
|
page read and write
|
||
72B402FD4000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
direct allocation
|
page execute and read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
312400201000
|
trusted library allocation
|
page read and write
|
||
194DCEEC000
|
heap
|
page read and write
|
||
194DC94E000
|
heap
|
page read and write
|
||
72B40263C000
|
trusted library allocation
|
page read and write
|
||
712E000
|
heap
|
page read and write
|
||
194DB130000
|
heap
|
page read and write
|
||
104BFE000
|
stack
|
page read and write
|
||
194DC957000
|
heap
|
page read and write
|
||
731C000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
125BFE000
|
stack
|
page read and write
|
||
194DCEEC000
|
heap
|
page read and write
|
||
72B402401000
|
trusted library allocation
|
page read and write
|
||
3124002C8000
|
trusted library allocation
|
page read and write
|
||
72B402D20000
|
trusted library allocation
|
page read and write
|
||
11CBFD000
|
stack
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC964000
|
heap
|
page read and write
|
||
56DC00330000
|
trusted library allocation
|
page read and write
|
||
740C000
|
heap
|
page read and write
|
||
72B403378000
|
trusted library allocation
|
page read and write
|
||
126BFE000
|
stack
|
page read and write
|
||
72B402AA8000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
1313FE000
|
unkown
|
page readonly
|
||
72B40221C000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
3124002C0000
|
trusted library allocation
|
page read and write
|
||
602400217000
|
direct allocation
|
page read and write
|
||
194DC96B000
|
heap
|
page read and write
|
||
56DC006AC000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
56DC0075C000
|
trusted library allocation
|
page read and write
|
||
72E5000
|
heap
|
page read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194E3563000
|
trusted library section
|
page read and write
|
||
56DC00364000
|
trusted library allocation
|
page read and write
|
||
56DC006B0000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
unkown
|
page readonly
|
||
72B4022E0000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
unkown
|
page write copy
|
||
72B402BD4000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC941000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402E30000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DCF52000
|
heap
|
page read and write
|
||
194DCF4E000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E3551000
|
trusted library section
|
page read and write
|
||
12CBFC000
|
stack
|
page read and write
|
||
6BEB9000
|
unkown
|
page read and write
|
||
72B400401000
|
trusted library allocation
|
page read and write
|
||
602400220000
|
direct allocation
|
page read and write
|
||
72B402550000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
7127000
|
heap
|
page read and write
|
||
56DC00724000
|
trusted library allocation
|
page read and write
|
||
12B3FE000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
72B4026A8000
|
trusted library allocation
|
page read and write
|
||
194DC952000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B402ED4000
|
trusted library allocation
|
page read and write
|
||
72B402AD0000
|
trusted library allocation
|
page read and write
|
||
72B402590000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B4023C4000
|
trusted library allocation
|
page read and write
|
||
1153FE000
|
unkown
|
page readonly
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402BD4000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
1223FE000
|
unkown
|
page readonly
|
||
72B4023E8000
|
trusted library allocation
|
page read and write
|
||
194DC95C000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC93D000
|
heap
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
194E2E27000
|
unclassified section
|
page read and write
|
||
72B5000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
6BE6F000
|
unkown
|
page readonly
|
||
194DC960000
|
heap
|
page read and write
|
||
194E32C0000
|
trusted library section
|
page read and write
|
||
72B403108000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
105BFE000
|
stack
|
page read and write
|
||
194E34FE000
|
trusted library section
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC957000
|
heap
|
page read and write
|
||
194DC957000
|
heap
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B4023B4000
|
trusted library allocation
|
page read and write
|
||
119BFA000
|
stack
|
page read and write
|
||
128BFE000
|
stack
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
10ABFB000
|
stack
|
page read and write
|
||
72B40255C000
|
trusted library allocation
|
page read and write
|
||
56DC00401000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
unkown
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402A64000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
heap
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
7255000
|
heap
|
page read and write
|
||
194DC936000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DCFC0000
|
trusted library section
|
page read and write
|
||
74E5000
|
heap
|
page read and write
|
||
12E3FE000
|
unkown
|
page readonly
|
||
6BD91000
|
unkown
|
page execute read
|
||
72B402B6C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E1380000
|
heap
|
page read and write
|
||
72B402510000
|
trusted library allocation
|
page read and write
|
||
56DC00784000
|
trusted library allocation
|
page read and write
|
||
602400250000
|
direct allocation
|
page read and write
|
||
7252000
|
heap
|
page read and write
|
||
194D9300000
|
heap
|
page read and write
|
||
7232000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B40293B000
|
trusted library allocation
|
page read and write
|
||
72B40334C000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B402D90000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
602400230000
|
direct allocation
|
page read and write
|
||
72B402EE4000
|
trusted library allocation
|
page read and write
|
||
194DCEEC000
|
heap
|
page read and write
|
||
72B403168000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402D70000
|
trusted library allocation
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
72B400C01000
|
trusted library allocation
|
page read and write
|
||
71BF000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
10BBFC000
|
stack
|
page read and write
|
||
72B402280000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B4022A8000
|
trusted library allocation
|
page read and write
|
||
194DC951000
|
heap
|
page read and write
|
||
72B40225A000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194D9465000
|
heap
|
page read and write
|
||
11ABFC000
|
stack
|
page read and write
|
||
112BFE000
|
stack
|
page read and write
|
||
72B403114000
|
trusted library allocation
|
page read and write
|
||
1123FE000
|
unkown
|
page readonly
|
||
72B402E3C000
|
trusted library allocation
|
page read and write
|
||
72B402428000
|
trusted library allocation
|
page read and write
|
||
56DC002CC000
|
trusted library allocation
|
page read and write
|
||
73EF000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B403201000
|
trusted library allocation
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B4023DC000
|
trusted library allocation
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
72B402504000
|
trusted library allocation
|
page read and write
|
||
194DB133000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
312400278000
|
trusted library allocation
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
72B400E01000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
72B403284000
|
trusted library allocation
|
page read and write
|
||
12BBFA000
|
stack
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
72B402420000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
194DC94C000
|
heap
|
page read and write
|
||
194D9450000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
111BFA000
|
stack
|
page read and write
|
||
72B402969000
|
trusted library allocation
|
page read and write
|
||
107BFA000
|
stack
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
72B403188000
|
trusted library allocation
|
page read and write
|
||
194DCEDD000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B40249A000
|
trusted library allocation
|
page read and write
|
||
194E35C0000
|
trusted library section
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B40220C000
|
trusted library allocation
|
page read and write
|
||
56DC00614000
|
trusted library allocation
|
page read and write
|
||
72A7000
|
heap
|
page read and write
|
||
3124002F8000
|
trusted library allocation
|
page read and write
|
||
118BFD000
|
stack
|
page read and write
|
||
7236000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC00320000
|
trusted library allocation
|
page read and write
|
||
7302000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
72B402ECC000
|
trusted library allocation
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
56DC00354000
|
trusted library allocation
|
page read and write
|
||
194DC980000
|
heap
|
page read and write
|
||
194E3540000
|
trusted library section
|
page read and write
|
||
72A7000
|
heap
|
page read and write
|
||
56DC006B4000
|
trusted library allocation
|
page read and write
|
||
72B402958000
|
trusted library allocation
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402528000
|
trusted library allocation
|
page read and write
|
||
1213FE000
|
unkown
|
page readonly
|
||
1253FE000
|
unkown
|
page readonly
|
||
72B40276C000
|
trusted library allocation
|
page read and write
|
||
109BFE000
|
stack
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DCF62000
|
heap
|
page read and write
|
||
7286000
|
heap
|
page read and write
|
||
72C4000
|
heap
|
page read and write
|
||
72B402201000
|
trusted library allocation
|
page read and write
|
||
56DC006B8000
|
trusted library allocation
|
page read and write
|
||
194DC936000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
56DC00601000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
3124002F4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC0033C000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402B30000
|
trusted library allocation
|
page read and write
|
||
194E34F2000
|
trusted library section
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
72B402C58000
|
trusted library allocation
|
page read and write
|
||
602400215000
|
direct allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
72B402504000
|
trusted library allocation
|
page read and write
|
||
194DCED5000
|
heap
|
page read and write
|
||
194D93F0000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402ECC000
|
trusted library allocation
|
page read and write
|
||
106BFD000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B40326C000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
312400248000
|
trusted library allocation
|
page read and write
|
||
72B402ECF000
|
trusted library allocation
|
page read and write
|
||
72B402530000
|
trusted library allocation
|
page read and write
|
||
72B402F1C000
|
trusted library allocation
|
page read and write
|
||
72B4023AC000
|
trusted library allocation
|
page read and write
|
||
1093FE000
|
unkown
|
page readonly
|
||
194D9460000
|
heap
|
page read and write
|
||
56DC0080C000
|
trusted library allocation
|
page read and write
|
||
72B402C2C000
|
trusted library allocation
|
page read and write
|
||
194DC951000
|
heap
|
page read and write
|
||
72B4026BC000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
56DC007C8000
|
trusted library allocation
|
page read and write
|
||
72B4022F0000
|
trusted library allocation
|
page read and write
|
||
56DC00380000
|
trusted library allocation
|
page read and write
|
||
151000
|
unkown
|
page execute and write copy
|
||
4FE000
|
unkown
|
page read and write
|
||
56DC00390000
|
trusted library allocation
|
page read and write
|
||
7391000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72B4030AC000
|
trusted library allocation
|
page read and write
|
||
113BFE000
|
stack
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
72B403040000
|
trusted library allocation
|
page read and write
|
||
72B4024FF000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
194DC95D000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DCED5000
|
heap
|
page read and write
|
||
72B4027DC000
|
trusted library allocation
|
page read and write
|
||
72B402E01000
|
trusted library allocation
|
page read and write
|
||
72B400601000
|
trusted library allocation
|
page read and write
|
||
123BFD000
|
stack
|
page read and write
|
||
72B402C78000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402C0C000
|
trusted library allocation
|
page read and write
|
||
72B4026E0000
|
trusted library allocation
|
page read and write
|
||
56DC00610000
|
trusted library allocation
|
page read and write
|
||
56DC006F0000
|
trusted library allocation
|
page read and write
|
||
72B402E74000
|
trusted library allocation
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72B402D10000
|
trusted library allocation
|
page read and write
|
||
73DF000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B40240C000
|
trusted library allocation
|
page read and write
|
||
72B402B08000
|
trusted library allocation
|
page read and write
|
||
194DCF38000
|
heap
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
194E2DB2000
|
trusted library section
|
page read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E30C0000
|
trusted library section
|
page read and write
|
||
56DC00624000
|
trusted library allocation
|
page read and write
|
||
72B402E34000
|
trusted library allocation
|
page read and write
|
||
72B402945000
|
trusted library allocation
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
56DC00248000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
56DC00348000
|
trusted library allocation
|
page read and write
|
||
56DC00220000
|
trusted library allocation
|
page read and write
|
||
72B40237C000
|
trusted library allocation
|
page read and write
|
||
72B4031B4000
|
trusted library allocation
|
page read and write
|
||
72B402F80000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
12DBFE000
|
stack
|
page read and write
|
||
56DC007B4000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
7291000
|
heap
|
page read and write
|
||
72B402580000
|
trusted library allocation
|
page read and write
|
||
72B40289C000
|
trusted library allocation
|
page read and write
|
||
27FD000
|
stack
|
page read and write
|
||
72B402FD9000
|
trusted library allocation
|
page read and write
|
||
108BFC000
|
stack
|
page read and write
|
||
11BBFC000
|
stack
|
page read and write
|
||
10C3FE000
|
unkown
|
page readonly
|
||
72B403388000
|
trusted library allocation
|
page read and write
|
||
72B402A7C000
|
trusted library allocation
|
page read and write
|
||
194E3847000
|
unclassified section
|
page read and write
|
||
11DBFC000
|
stack
|
page read and write
|
||
194DC962000
|
heap
|
page read and write
|
||
72B402F00000
|
trusted library allocation
|
page read and write
|
||
56DC00754000
|
trusted library allocation
|
page read and write
|
||
501000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
72B402974000
|
trusted library allocation
|
page read and write
|
||
72CB000
|
direct allocation
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
72B402ECC000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194E0D34000
|
trusted library allocation
|
page read and write
|
||
72B402900000
|
trusted library allocation
|
page read and write
|
||
72B402BD4000
|
trusted library allocation
|
page read and write
|
||
72B4025B0000
|
trusted library allocation
|
page read and write
|
||
3124002C0000
|
trusted library allocation
|
page read and write
|
||
72B402DB0000
|
trusted library allocation
|
page read and write
|
||
56DC0078C000
|
trusted library allocation
|
page read and write
|
||
56DC00664000
|
trusted library allocation
|
page read and write
|
||
72B402570000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B4028BC000
|
trusted library allocation
|
page read and write
|
||
194DCECE000
|
heap
|
page read and write
|
||
194DCF10000
|
heap
|
page read and write
|
||
122BFE000
|
stack
|
page read and write
|
||
194DCF09000
|
heap
|
page read and write
|
||
72B4023F4000
|
trusted library allocation
|
page read and write
|
||
501000
|
unkown
|
page readonly
|
||
194DC962000
|
heap
|
page read and write
|
||
72DD000
|
heap
|
page read and write
|
||
72B402CB4000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B4032D4000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
56DC00730000
|
trusted library allocation
|
page read and write
|
||
72B4024B4000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B402910000
|
trusted library allocation
|
page read and write
|
||
194DCEBC000
|
heap
|
page read and write
|
||
72B402564000
|
trusted library allocation
|
page read and write
|
||
72B402A01000
|
trusted library allocation
|
page read and write
|
||
194DCEE2000
|
heap
|
page read and write
|
||
72B402274000
|
trusted library allocation
|
page read and write
|
||
56DC00330000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402DF0000
|
trusted library allocation
|
page read and write
|
||
56DC00288000
|
trusted library allocation
|
page read and write
|
||
72B402E34000
|
trusted library allocation
|
page read and write
|
||
194D94A8000
|
heap
|
page read and write
|
||
11F3FE000
|
unkown
|
page readonly
|
||
2B80000
|
heap
|
page read and write
|
||
56DC00668000
|
trusted library allocation
|
page read and write
|
||
72B402FA0000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402EA4000
|
trusted library allocation
|
page read and write
|
||
71CC000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DCF27000
|
heap
|
page read and write
|
||
7172000
|
direct allocation
|
page read and write
|
||
72B402CC4000
|
trusted library allocation
|
page read and write
|
||
114BFE000
|
stack
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
6024002EC000
|
direct allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
1073FE000
|
unkown
|
page readonly
|
||
72B402A24000
|
trusted library allocation
|
page read and write
|
||
56DC00424000
|
trusted library allocation
|
page read and write
|
||
72B402E30000
|
trusted library allocation
|
page read and write
|
||
72B4031A4000
|
trusted library allocation
|
page read and write
|
||
56DC002ED000
|
trusted library allocation
|
page read and write
|
||
1193FE000
|
unkown
|
page readonly
|
||
6731000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4FE000
|
unkown
|
page write copy
|
||
10F3FE000
|
unkown
|
page readonly
|
||
72B402F94000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
10A3FE000
|
unkown
|
page readonly
|
||
194DC950000
|
heap
|
page read and write
|
||
194DCEE4000
|
heap
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
72B4023E4000
|
trusted library allocation
|
page read and write
|
||
72B4031E8000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
7294000
|
heap
|
page read and write
|
||
6E30000
|
direct allocation
|
page execute and read and write
|
||
11B3FE000
|
unkown
|
page readonly
|
||
72B40229E000
|
trusted library allocation
|
page read and write
|
||
3124002E4000
|
trusted library allocation
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
194E2DBD000
|
trusted library section
|
page read and write
|
||
312400270000
|
trusted library allocation
|
page read and write
|
||
72B402504000
|
trusted library allocation
|
page read and write
|
||
194DCEF4000
|
heap
|
page read and write
|
||
72B4032EC000
|
trusted library allocation
|
page read and write
|
||
56DC007CC000
|
trusted library allocation
|
page read and write
|
||
56DC006FC000
|
trusted library allocation
|
page read and write
|
||
72B4030BF000
|
trusted library allocation
|
page read and write
|
||
3124002B0000
|
trusted library allocation
|
page read and write
|
||
602400260000
|
direct allocation
|
page read and write
|
||
194DD140000
|
trusted library section
|
page read and write
|
||
194DCF13000
|
heap
|
page read and write
|
||
7284000
|
heap
|
page read and write
|
||
602400294000
|
direct allocation
|
page read and write
|
||
194DC980000
|
heap
|
page read and write
|
||
56DC00320000
|
trusted library allocation
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
72B403050000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194E3ADE000
|
trusted library section
|
page read and write
|
||
194D9490000
|
trusted library section
|
page readonly
|
||
194DC960000
|
heap
|
page read and write
|
||
71E4000
|
heap
|
page read and write
|
||
72B403114000
|
trusted library allocation
|
page read and write
|
||
72B402F78000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DC93B000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
12D3FE000
|
unkown
|
page readonly
|
||
194DC97C000
|
heap
|
page read and write
|
||
56DC00201000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
3124002C0000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B402928000
|
trusted library allocation
|
page read and write
|
||
1303FE000
|
unkown
|
page readonly
|
||
501000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B40340C000
|
trusted library allocation
|
page read and write
|
||
72B403074000
|
trusted library allocation
|
page read and write
|
||
194DC939000
|
heap
|
page read and write
|
||
124BFE000
|
stack
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DC94C000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
712B000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402B60000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72B40261C000
|
trusted library allocation
|
page read and write
|
||
194DC941000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
71E8000
|
heap
|
page read and write
|
||
72B402544000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
direct allocation
|
page read and write
|
||
72B402EB0000
|
trusted library allocation
|
page read and write
|
||
194DC97C000
|
heap
|
page read and write
|
||
72B403168000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
72B402498000
|
trusted library allocation
|
page read and write
|
||
602400201000
|
direct allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
72B402FA6000
|
trusted library allocation
|
page read and write
|
||
56DC006E0000
|
trusted library allocation
|
page read and write
|
||
72C4000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
1063FE000
|
unkown
|
page readonly
|
||
194DC983000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
56DC00368000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B4024F7000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC980000
|
heap
|
page read and write
|
||
72B402510000
|
trusted library allocation
|
page read and write
|
||
72B402AE4000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC980000
|
heap
|
page read and write
|
||
72B403294000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
56DC006D0000
|
trusted library allocation
|
page read and write
|
||
72B4025B0000
|
trusted library allocation
|
page read and write
|
||
56DC0040C000
|
trusted library allocation
|
page read and write
|
||
1173FE000
|
unkown
|
page readonly
|
||
312400230000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402264000
|
trusted library allocation
|
page read and write
|
||
56DC002B8000
|
trusted library allocation
|
page read and write
|
||
6024002A8000
|
direct allocation
|
page read and write
|
||
56DC00320000
|
trusted library allocation
|
page read and write
|
||
74AA000
|
heap
|
page read and write
|
||
194DC96B000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B4024B4000
|
trusted library allocation
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
72B402F80000
|
trusted library allocation
|
page read and write
|
||
72E5000
|
heap
|
page read and write
|
||
72B402394000
|
trusted library allocation
|
page read and write
|
||
72B402D70000
|
trusted library allocation
|
page read and write
|
||
72B40228C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B402244000
|
trusted library allocation
|
page read and write
|
||
743A000
|
heap
|
page read and write
|
||
72B4023F8000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
56DC002B0000
|
trusted library allocation
|
page read and write
|
||
1103FE000
|
unkown
|
page readonly
|
||
56DC006D4000
|
trusted library allocation
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
56DC00310000
|
trusted library allocation
|
page read and write
|
||
72B402EF0000
|
trusted library allocation
|
page read and write
|
||
72B402424000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC00620000
|
trusted library allocation
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
3124002C0000
|
trusted library allocation
|
page read and write
|
||
72B402F68000
|
trusted library allocation
|
page read and write
|
||
6024002E4000
|
direct allocation
|
page read and write
|
||
72B402FAC000
|
trusted library allocation
|
page read and write
|
||
72B40303C000
|
trusted library allocation
|
page read and write
|
||
712F000
|
heap
|
page read and write
|
||
72B40249E000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72C9000
|
direct allocation
|
page read and write
|
||
56DC002E4000
|
trusted library allocation
|
page read and write
|
||
194E2D53000
|
trusted library section
|
page read and write
|
||
72B40235C000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B4027EC000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
127BFE000
|
stack
|
page read and write
|
||
2AEE000
|
unkown
|
page read and write
|
||
72B4023A0000
|
trusted library allocation
|
page read and write
|
||
72B402F60000
|
trusted library allocation
|
page read and write
|
||
56DC00640000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72B40313C000
|
trusted library allocation
|
page read and write
|
||
72B402550000
|
trusted library allocation
|
page read and write
|
||
56DC0069C000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
56DC00320000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6E10000
|
direct allocation
|
page execute and read and write
|
||
72B402F48000
|
trusted library allocation
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
194DC966000
|
heap
|
page read and write
|
||
72B40316C000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
heap
|
page read and write
|
||
194DC96B000
|
heap
|
page read and write
|
||
72B402894000
|
trusted library allocation
|
page read and write
|
||
72B40281C000
|
trusted library allocation
|
page read and write
|
||
602400280000
|
direct allocation
|
page read and write
|
||
194E2D96000
|
trusted library section
|
page read and write
|
||
194DC937000
|
heap
|
page read and write
|
||
72B402E5C000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B40242C000
|
trusted library allocation
|
page read and write
|
||
194E0D52000
|
trusted library allocation
|
page read and write
|
||
72B402B9B000
|
trusted library allocation
|
page read and write
|
||
3124002B0000
|
trusted library allocation
|
page read and write
|
||
7215000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
7306000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402590000
|
trusted library allocation
|
page read and write
|
||
7279000
|
heap
|
page read and write
|
||
194DCF46000
|
heap
|
page read and write
|
||
129BFE000
|
stack
|
page read and write
|
||
194DC943000
|
heap
|
page read and write
|
||
56DC002FC000
|
trusted library allocation
|
page read and write
|
||
56DC00330000
|
trusted library allocation
|
page read and write
|
||
72B40320C000
|
trusted library allocation
|
page read and write
|
||
56DC006E8000
|
trusted library allocation
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
56DC0020C000
|
trusted library allocation
|
page read and write
|
||
194E34D1000
|
trusted library section
|
page read and write
|
||
10CBFD000
|
stack
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B402E30000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC941000
|
heap
|
page read and write
|
||
72B402DA8000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B4029A8000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
72B40321C000
|
trusted library allocation
|
page read and write
|
||
72B402550000
|
trusted library allocation
|
page read and write
|
||
742F000
|
heap
|
page read and write
|
||
194DC96B000
|
heap
|
page read and write
|
||
72B403198000
|
trusted library allocation
|
page read and write
|
||
72B40313C000
|
trusted library allocation
|
page read and write
|
||
72B4024F4000
|
trusted library allocation
|
page read and write
|
||
602400303000
|
direct allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
72FE000
|
heap
|
page read and write
|
||
56DC00700000
|
trusted library allocation
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
72B402318000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
56DC0033C000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
312400294000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402E68000
|
trusted library allocation
|
page read and write
|
||
60240020C000
|
direct allocation
|
page read and write
|
||
194DC93D000
|
heap
|
page read and write
|
||
72B402CF0000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
6024002DC000
|
direct allocation
|
page read and write
|
||
2A3A000
|
stack
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194DC962000
|
heap
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
72B403030000
|
trusted library allocation
|
page read and write
|
||
712B000
|
heap
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
72B402F0C000
|
trusted library allocation
|
page read and write
|
||
194DCF38000
|
heap
|
page read and write
|
||
72B4024A8000
|
trusted library allocation
|
page read and write
|
||
712C000
|
heap
|
page read and write
|
||
12ABFE000
|
stack
|
page read and write
|
||
3124002B0000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
72B402494000
|
trusted library allocation
|
page read and write
|
||
6BEBC000
|
unkown
|
page readonly
|
||
194DC958000
|
heap
|
page read and write
|
||
72FA000
|
heap
|
page read and write
|
||
194DC949000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194D952B000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
1183FE000
|
unkown
|
page readonly
|
||
72B4023B4000
|
trusted library allocation
|
page read and write
|
||
12EBFE000
|
stack
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DCF6B000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402418000
|
trusted library allocation
|
page read and write
|
||
72B4031D0000
|
trusted library allocation
|
page read and write
|
||
72B40236C000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B4023D0000
|
trusted library allocation
|
page read and write
|
||
72B402590000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
56DC00688000
|
trusted library allocation
|
page read and write
|
||
72B402858000
|
trusted library allocation
|
page read and write
|
||
72B402C2C000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
3124002A0000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
6731000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
72B4028AC000
|
trusted library allocation
|
page read and write
|
||
194DCEF0000
|
heap
|
page read and write
|
||
730C000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
194DC95B000
|
heap
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
312400235000
|
trusted library allocation
|
page read and write
|
||
56DC00250000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
11E3FE000
|
unkown
|
page readonly
|
||
4AC000
|
stack
|
page read and write
|
||
56DC00734000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC00704000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
56DC00248000
|
trusted library allocation
|
page read and write
|
||
3124002A0000
|
trusted library allocation
|
page read and write
|
||
712E000
|
heap
|
page read and write
|
||
72B402708000
|
trusted library allocation
|
page read and write
|
||
194DC960000
|
heap
|
page read and write
|
||
194D9527000
|
heap
|
page read and write
|
||
194DC962000
|
heap
|
page read and write
|
||
72B4023EC000
|
trusted library allocation
|
page read and write
|
||
6731000
|
heap
|
page read and write
|
||
72B403144000
|
trusted library allocation
|
page read and write
|
||
56DC00684000
|
trusted library allocation
|
page read and write
|
||
116BFB000
|
stack
|
page read and write
|
||
72B40253C000
|
trusted library allocation
|
page read and write
|
||
56DC00418000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
72B403294000
|
trusted library allocation
|
page read and write
|
||
72B402E34000
|
trusted library allocation
|
page read and write
|
||
72B4034A0000
|
trusted library allocation
|
page read and write
|
||
194DCEE4000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
7125000
|
heap
|
page read and write
|
||
72B40269C000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
7121000
|
heap
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
72B403168000
|
trusted library allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B402F24000
|
trusted library allocation
|
page read and write
|
||
72B40251C000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
56DC00408000
|
trusted library allocation
|
page read and write
|
||
72B402FE4000
|
trusted library allocation
|
page read and write
|
||
72B402544000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
3124002BC000
|
trusted library allocation
|
page read and write
|
||
72B402F38000
|
trusted library allocation
|
page read and write
|
||
602400284000
|
direct allocation
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
194DC94C000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
72B4023B4000
|
trusted library allocation
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
130BFE000
|
stack
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
56DC006C4000
|
trusted library allocation
|
page read and write
|
||
72B40280C000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC94C000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
101BFE000
|
unkown
|
page read and write
|
||
194DCF1C000
|
heap
|
page read and write
|
||
72B40300C000
|
trusted library allocation
|
page read and write
|
||
72B402998000
|
trusted library allocation
|
page read and write
|
||
194DC950000
|
heap
|
page read and write
|
||
7296000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
7257000
|
heap
|
page read and write
|
||
71D5000
|
heap
|
page read and write
|
||
60240023C000
|
direct allocation
|
page read and write
|
||
72B403040000
|
trusted library allocation
|
page read and write
|
||
602400290000
|
direct allocation
|
page read and write
|
||
194DC952000
|
heap
|
page read and write
|
||
6BE6D000
|
unkown
|
page read and write
|
||
194DD1D7000
|
unclassified section
|
page read and write
|
||
194DC959000
|
heap
|
page read and write
|
||
194DC941000
|
heap
|
page read and write
|
||
72B402EBC000
|
trusted library allocation
|
page read and write
|
||
72B402530000
|
trusted library allocation
|
page read and write
|
||
72B40283C000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
6024002D0000
|
direct allocation
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
72B4032F4000
|
trusted library allocation
|
page read and write
|
||
72B402498000
|
trusted library allocation
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
7205000
|
heap
|
page read and write
|
||
72B4027C4000
|
trusted library allocation
|
page read and write
|
||
194DC910000
|
heap
|
page read and write
|
||
72B4026A0000
|
trusted library allocation
|
page read and write
|
||
194DC948000
|
heap
|
page read and write
|
||
194DC95B000
|
heap
|
page read and write
|
||
194DC958000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page execute and read and write
|
||
1163FE000
|
unkown
|
page readonly
|
||
4FA000
|
unkown
|
page readonly
|
||
4FE000
|
unkown
|
page read and write
|
||
194E35CE000
|
trusted library section
|
page read and write
|
||
72B402D88000
|
trusted library allocation
|
page read and write
|
||
72B4028E0000
|
trusted library allocation
|
page read and write
|
||
72B40238C000
|
trusted library allocation
|
page read and write
|
||
194DC962000
|
heap
|
page read and write
|
There are 1317 hidden memdumps, click here to show them.