Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_021bcb68-4585-4400-9dd3-1ccbb23bcfd9\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA63.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Nov 24 03:30:40 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBCB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC0B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2424 --field-trial-handle=2312,i,7568906053248851717,9207987864527755389,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5400 -s 1356
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://chrome.google.com/webstoreHS
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2lidator
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://anglebug.com/3832K
|
unknown
|
||
http://anglebug.com/3965L
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bSH
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.html(
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/8229G
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
http://anglebug.com/5371?
|
unknown
|
||
http://anglebug.com/7488(
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://issuetracker.google.com/issues/1664752733
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
http://anglebug.com/5881q
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://chrome.google.com/webstore?hl=en3
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/7406H
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyp
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/5421M
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/5881&
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://anglebug.com/7714U
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://docs.google.com/spreadsheets/0YcHS
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/6860B
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
172.217.21.36
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6D91000
|
heap
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
370400230000
|
trusted library allocation
|
page read and write
|
||
4200091C000
|
trusted library allocation
|
page read and write
|
||
7220000
|
direct allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
534800E0C000
|
trusted library allocation
|
page read and write
|
||
534801084000
|
trusted library allocation
|
page read and write
|
||
B094FFE000
|
unkown
|
page readonly
|
||
B0A1FFE000
|
unkown
|
page readonly
|
||
1250000
|
heap
|
page read and write
|
||
534800E6C000
|
trusted library allocation
|
page read and write
|
||
B09D7FB000
|
stack
|
page read and write
|
||
4200087C000
|
trusted library allocation
|
page read and write
|
||
6C22F000
|
unkown
|
page readonly
|
||
B0A67FB000
|
stack
|
page read and write
|
||
534800565000
|
trusted library allocation
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
534800FE8000
|
trusted library allocation
|
page read and write
|
||
534800CA4000
|
trusted library allocation
|
page read and write
|
||
534800F48000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
B08FFFE000
|
unkown
|
page readonly
|
||
1BA000
|
unkown
|
page readonly
|
||
3704002A0000
|
trusted library allocation
|
page read and write
|
||
5348012D8000
|
trusted library allocation
|
page read and write
|
||
534800380000
|
trusted library allocation
|
page read and write
|
||
7878000
|
heap
|
page read and write
|
||
534800144000
|
trusted library allocation
|
page read and write
|
||
534800D20000
|
trusted library allocation
|
page read and write
|
||
534801170000
|
trusted library allocation
|
page read and write
|
||
5348001D4000
|
trusted library allocation
|
page read and write
|
||
534800A28000
|
trusted library allocation
|
page read and write
|
||
79BB000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
793F000
|
heap
|
page read and write
|
||
420006AC000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
6D91000
|
heap
|
page read and write
|
||
7A48000
|
heap
|
page read and write
|
||
7BFF000
|
heap
|
page read and write
|
||
1E8DF912000
|
trusted library section
|
page read and write
|
||
787A000
|
heap
|
page read and write
|
||
534800350000
|
trusted library allocation
|
page read and write
|
||
534800228000
|
trusted library allocation
|
page read and write
|
||
1E8D9800000
|
heap
|
page read and write
|
||
534800E88000
|
trusted library allocation
|
page read and write
|
||
534800CC8000
|
trusted library allocation
|
page read and write
|
||
1100024C000
|
direct allocation
|
page read and write
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
1E8D97F3000
|
heap
|
page read and write
|
||
B0987FA000
|
stack
|
page read and write
|
||
370400235000
|
trusted library allocation
|
page read and write
|
||
B08B7FE000
|
stack
|
page read and write
|
||
5348005DC000
|
trusted library allocation
|
page read and write
|
||
534800EE4000
|
trusted library allocation
|
page read and write
|
||
53480052C000
|
trusted library allocation
|
page read and write
|
||
5348002A4000
|
trusted library allocation
|
page read and write
|
||
5348000AC000
|
trusted library allocation
|
page read and write
|
||
1E8E0487000
|
unclassified section
|
page read and write
|
||
534800B40000
|
trusted library allocation
|
page read and write
|
||
B08C7FE000
|
stack
|
page read and write
|
||
3704002C8000
|
trusted library allocation
|
page read and write
|
||
370400288000
|
trusted library allocation
|
page read and write
|
||
42000948000
|
trusted library allocation
|
page read and write
|
||
534800B00000
|
trusted library allocation
|
page read and write
|
||
1E8DFA40000
|
trusted library section
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
B0A17FA000
|
stack
|
page read and write
|
||
42000728000
|
trusted library allocation
|
page read and write
|
||
B0B5FFE000
|
unkown
|
page readonly
|
||
534800D34000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
5348004D4000
|
trusted library allocation
|
page read and write
|
||
534800A5A000
|
trusted library allocation
|
page read and write
|
||
1E8D9D81000
|
heap
|
page read and write
|
||
370400270000
|
trusted library allocation
|
page read and write
|
||
B09F7FB000
|
stack
|
page read and write
|
||
53480009F000
|
trusted library allocation
|
page read and write
|
||
B0AF7FD000
|
stack
|
page read and write
|
||
534800064000
|
trusted library allocation
|
page read and write
|
||
5348001A0000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
11000270000
|
direct allocation
|
page read and write
|
||
534800888000
|
trusted library allocation
|
page read and write
|
||
534800124000
|
trusted library allocation
|
page read and write
|
||
1E8D6235000
|
heap
|
page read and write
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
534800D58000
|
trusted library allocation
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
B0A37FE000
|
unkown
|
page readonly
|
||
42000974000
|
trusted library allocation
|
page read and write
|
||
534800F3C000
|
trusted library allocation
|
page read and write
|
||
3704002F4000
|
trusted library allocation
|
page read and write
|
||
1E8D9E04000
|
heap
|
page read and write
|
||
B0B0FFE000
|
unkown
|
page readonly
|
||
6D91000
|
heap
|
page read and write
|
||
534800298000
|
trusted library allocation
|
page read and write
|
||
5348001A8000
|
trusted library allocation
|
page read and write
|
||
534800380000
|
trusted library allocation
|
page read and write
|
||
5348007E0000
|
trusted library allocation
|
page read and write
|
||
5348002E0000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
534800B40000
|
trusted library allocation
|
page read and write
|
||
42000840000
|
trusted library allocation
|
page read and write
|
||
1E8D9D88000
|
heap
|
page read and write
|
||
5348005A4000
|
trusted library allocation
|
page read and write
|
||
42000801000
|
trusted library allocation
|
page read and write
|
||
6C279000
|
unkown
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
110002A8000
|
direct allocation
|
page read and write
|
||
5348001D8000
|
trusted library allocation
|
page read and write
|
||
534800328000
|
trusted library allocation
|
page read and write
|
||
42000418000
|
trusted library allocation
|
page read and write
|
||
53480029A000
|
trusted library allocation
|
page read and write
|
||
534800F5C000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
6C150000
|
unkown
|
page readonly
|
||
42000918000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
534800CEC000
|
trusted library allocation
|
page read and write
|
||
534800C2C000
|
trusted library allocation
|
page read and write
|
||
53480060C000
|
trusted library allocation
|
page read and write
|
||
534800B30000
|
trusted library allocation
|
page read and write
|
||
3704002B0000
|
trusted library allocation
|
page read and write
|
||
534801184000
|
trusted library allocation
|
page read and write
|
||
534800C48000
|
trusted library allocation
|
page read and write
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
7952000
|
heap
|
page read and write
|
||
1E8D9DBE000
|
heap
|
page read and write
|
||
534800F3C000
|
trusted library allocation
|
page read and write
|
||
11000250000
|
direct allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
1E8DFA4E000
|
trusted library section
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
534800350000
|
trusted library allocation
|
page read and write
|
||
534800601000
|
trusted library allocation
|
page read and write
|
||
534800124000
|
trusted library allocation
|
page read and write
|
||
534800070000
|
trusted library allocation
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
B0B6FFE000
|
unkown
|
page readonly
|
||
53480061C000
|
trusted library allocation
|
page read and write
|
||
534801054000
|
trusted library allocation
|
page read and write
|
||
1E8D6220000
|
trusted library allocation
|
page read and write
|
||
B095FFE000
|
unkown
|
page readonly
|
||
534800654000
|
trusted library allocation
|
page read and write
|
||
42000884000
|
trusted library allocation
|
page read and write
|
||
534800D40000
|
trusted library allocation
|
page read and write
|
||
1E8DF9B6000
|
trusted library section
|
page read and write
|
||
7B6F000
|
heap
|
page read and write
|
||
B09DFFE000
|
unkown
|
page readonly
|
||
B0A7FFE000
|
unkown
|
page readonly
|
||
534800558000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
53480074C000
|
trusted library allocation
|
page read and write
|
||
5348002B9000
|
trusted library allocation
|
page read and write
|
||
5348010E4000
|
trusted library allocation
|
page read and write
|
||
370400278000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
2C30000
|
heap
|
page read and write
|
||
1E8E0292000
|
trusted library section
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
1E8D97C0000
|
heap
|
page read and write
|
||
5348010B0000
|
trusted library allocation
|
page read and write
|
||
B0B47FE000
|
stack
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
7870000
|
heap
|
page read and write
|
||
534800DC0000
|
trusted library allocation
|
page read and write
|
||
1E8D97FC000
|
heap
|
page read and write
|
||
534800FE8000
|
trusted library allocation
|
page read and write
|
||
798C000
|
heap
|
page read and write
|
||
4200080C000
|
trusted library allocation
|
page read and write
|
||
3704002F8000
|
trusted library allocation
|
page read and write
|
||
5348009AF000
|
trusted library allocation
|
page read and write
|
||
534800570000
|
trusted library allocation
|
page read and write
|
||
534801044000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
5348009F0000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7878000
|
heap
|
page read and write
|
||
1236000
|
unkown
|
page execute and write copy
|
||
534800184000
|
trusted library allocation
|
page read and write
|
||
7906000
|
heap
|
page read and write
|
||
42000904000
|
trusted library allocation
|
page read and write
|
||
5348001B4000
|
trusted library allocation
|
page read and write
|
||
787B000
|
heap
|
page read and write
|
||
534800FAC000
|
trusted library allocation
|
page read and write
|
||
1E8D6300000
|
heap
|
page read and write
|
||
B09EFFE000
|
unkown
|
page readonly
|
||
1E8D9D60000
|
heap
|
page read and write
|
||
3704002B0000
|
trusted library allocation
|
page read and write
|
||
1E8D9E4F000
|
heap
|
page read and write
|
||
7950000
|
heap
|
page read and write
|
||
53480129C000
|
trusted library allocation
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
7ABD000
|
heap
|
page read and write
|
||
110002EC000
|
direct allocation
|
page read and write
|
||
4200081C000
|
trusted library allocation
|
page read and write
|
||
B0897FF000
|
stack
|
page read and write
|
||
B0907FE000
|
stack
|
page read and write
|
||
42000890000
|
trusted library allocation
|
page read and write
|
||
534800BD8000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
5348003B4000
|
trusted library allocation
|
page read and write
|
||
7A7A000
|
heap
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
420002F2000
|
trusted library allocation
|
page read and write
|
||
1E8D631F000
|
heap
|
page read and write
|
||
1E8D631F000
|
heap
|
page read and write
|
||
420008E4000
|
trusted library allocation
|
page read and write
|
||
B0A07FC000
|
stack
|
page read and write
|
||
110002E4000
|
direct allocation
|
page read and write
|
||
1E8D97F7000
|
heap
|
page read and write
|
||
420008C4000
|
trusted library allocation
|
page read and write
|
||
B0B07FE000
|
unkown
|
page readonly
|
||
143F000
|
stack
|
page read and write
|
||
42000878000
|
trusted library allocation
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
5348009B8000
|
trusted library allocation
|
page read and write
|
||
420002F4000
|
trusted library allocation
|
page read and write
|
||
534800A1C000
|
trusted library allocation
|
page read and write
|
||
B0957FE000
|
stack
|
page read and write
|
||
534800370000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
42000920000
|
trusted library allocation
|
page read and write
|
||
79AC000
|
heap
|
page read and write
|
||
1E8E0150000
|
trusted library section
|
page read and write
|
||
53480105C000
|
trusted library allocation
|
page read and write
|
||
534800F48000
|
trusted library allocation
|
page read and write
|
||
1E8DF72E000
|
heap
|
page read and write
|
||
79E6000
|
heap
|
page read and write
|
||
1100023C000
|
direct allocation
|
page read and write
|
||
7A07000
|
heap
|
page read and write
|
||
534800D10000
|
trusted library allocation
|
page read and write
|
||
7A32000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
1E8D9DB7000
|
heap
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
42000880000
|
trusted library allocation
|
page read and write
|
||
5348004FC000
|
trusted library allocation
|
page read and write
|
||
5348000DC000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
420007E0000
|
trusted library allocation
|
page read and write
|
||
7872000
|
heap
|
page read and write
|
||
53480031C000
|
trusted library allocation
|
page read and write
|
||
1E8D6200000
|
heap
|
page read and write
|
||
5348004C4000
|
trusted library allocation
|
page read and write
|
||
420008AC000
|
trusted library allocation
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
5348009A0000
|
trusted library allocation
|
page read and write
|
||
42000201000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534800C64000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
534800908000
|
trusted library allocation
|
page read and write
|
||
4200039C000
|
trusted library allocation
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
1E8E04B0000
|
trusted library section
|
page read and write
|
||
790E000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
5348008B0000
|
trusted library allocation
|
page read and write
|
||
1E8D9D8F000
|
heap
|
page read and write
|
||
534800674000
|
trusted library allocation
|
page read and write
|
||
7877000
|
heap
|
page read and write
|
||
795D000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
420002FC000
|
trusted library allocation
|
page read and write
|
||
B0A9FFE000
|
unkown
|
page readonly
|
||
B0B17FD000
|
stack
|
page read and write
|
||
5348001C4000
|
trusted library allocation
|
page read and write
|
||
534800344000
|
trusted library allocation
|
page read and write
|
||
1E8E01B0000
|
trusted library section
|
page read and write
|
||
7B7D000
|
heap
|
page read and write
|
||
3704002F0000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
B0B37FC000
|
stack
|
page read and write
|
||
534800EC8000
|
trusted library allocation
|
page read and write
|
||
7A1D000
|
heap
|
page read and write
|
||
420006D4000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800555000
|
trusted library allocation
|
page read and write
|
||
5348002F3000
|
trusted library allocation
|
page read and write
|
||
53480031C000
|
trusted library allocation
|
page read and write
|
||
534800401000
|
trusted library allocation
|
page read and write
|
||
110002AC000
|
direct allocation
|
page read and write
|
||
B09AFFE000
|
unkown
|
page readonly
|
||
534800F14000
|
trusted library allocation
|
page read and write
|
||
534800298000
|
trusted library allocation
|
page read and write
|
||
1E8D9DCB000
|
heap
|
page read and write
|
||
534800CC8000
|
trusted library allocation
|
page read and write
|
||
534800720000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
42000898000
|
trusted library allocation
|
page read and write
|
||
53480022C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800F6C000
|
trusted library allocation
|
page read and write
|
||
420006F4000
|
trusted library allocation
|
page read and write
|
||
534800304000
|
trusted library allocation
|
page read and write
|
||
534800CD8000
|
trusted library allocation
|
page read and write
|
||
3704002A0000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
7872000
|
heap
|
page read and write
|
||
53480035C000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
6D91000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800E60000
|
trusted library allocation
|
page read and write
|
||
420006E8000
|
trusted library allocation
|
page read and write
|
||
79DB000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
534800B8C000
|
trusted library allocation
|
page read and write
|
||
370400238000
|
trusted library allocation
|
page read and write
|
||
79E8000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
1E8D6300000
|
heap
|
page read and write
|
||
370400294000
|
trusted library allocation
|
page read and write
|
||
420002C4000
|
trusted library allocation
|
page read and write
|
||
5348002A8000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1E8DE2F7000
|
unclassified section
|
page read and write
|
||
791F000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800201000
|
trusted library allocation
|
page read and write
|
||
534800E01000
|
trusted library allocation
|
page read and write
|
||
B090FFE000
|
unkown
|
page readonly
|
||
7874000
|
heap
|
page read and write
|
||
4200027C000
|
trusted library allocation
|
page read and write
|
||
5348001DC000
|
trusted library allocation
|
page read and write
|
||
5348006DD000
|
trusted library allocation
|
page read and write
|
||
5348001D0000
|
trusted library allocation
|
page read and write
|
||
370400201000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
B0A2FFB000
|
stack
|
page read and write
|
||
1E8D61B0000
|
heap
|
page read and write
|
||
534800390000
|
trusted library allocation
|
page read and write
|
||
1E8E0457000
|
unclassified section
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800DD0000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
5348003A4000
|
trusted library allocation
|
page read and write
|
||
534800DA8000
|
trusted library allocation
|
page read and write
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
5348004DC000
|
trusted library allocation
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
11000230000
|
direct allocation
|
page read and write
|
||
534800F00000
|
trusted library allocation
|
page read and write
|
||
1E8DF700000
|
heap
|
page read and write
|
||
1E8DFCE0000
|
trusted library section
|
page read and write
|
||
534800F9C000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
1E8D631C000
|
heap
|
page read and write
|
||
370400250000
|
trusted library allocation
|
page read and write
|
||
42000874000
|
trusted library allocation
|
page read and write
|
||
534800C24000
|
trusted library allocation
|
page read and write
|
||
42000844000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
42000288000
|
trusted library allocation
|
page read and write
|
||
534800EE4000
|
trusted library allocation
|
page read and write
|
||
534800EB8000
|
trusted library allocation
|
page read and write
|
||
534800A78000
|
trusted library allocation
|
page read and write
|
||
53480076A000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
534800E28000
|
trusted library allocation
|
page read and write
|
||
420007C0000
|
trusted library allocation
|
page read and write
|
||
B0AC7FE000
|
stack
|
page read and write
|
||
534800234000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
B08DFFE000
|
unkown
|
page readonly
|
||
5348007C4000
|
trusted library allocation
|
page read and write
|
||
534800A64000
|
trusted library allocation
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
6D91000
|
heap
|
page read and write
|
||
B08AFFE000
|
unkown
|
page readonly
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534800E40000
|
trusted library allocation
|
page read and write
|
||
534800350000
|
trusted library allocation
|
page read and write
|
||
5348002F0000
|
trusted library allocation
|
page read and write
|
||
B09CFFE000
|
unkown
|
page readonly
|
||
1E8D9D75000
|
heap
|
page read and write
|
||
534800350000
|
trusted library allocation
|
page read and write
|
||
1E8E01D3000
|
trusted library section
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
53480040C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
7A00000
|
heap
|
page read and write
|
||
1E8D9E37000
|
heap
|
page read and write
|
||
534800560000
|
trusted library allocation
|
page read and write
|
||
5348006F4000
|
trusted library allocation
|
page read and write
|
||
534801158000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
5348012C4000
|
trusted library allocation
|
page read and write
|
||
534800054000
|
trusted library allocation
|
page read and write
|
||
7771000
|
heap
|
page read and write
|
||
1E8E01A0000
|
trusted library section
|
page read and write
|
||
370400274000
|
trusted library allocation
|
page read and write
|
||
7220000
|
direct allocation
|
page read and write
|
||
534800E34000
|
trusted library allocation
|
page read and write
|
||
534800F14000
|
trusted library allocation
|
page read and write
|
||
534800124000
|
trusted library allocation
|
page read and write
|
||
42000248000
|
trusted library allocation
|
page read and write
|
||
11000284000
|
direct allocation
|
page read and write
|
||
3704002D8000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
79AC000
|
heap
|
page read and write
|
||
42000848000
|
trusted library allocation
|
page read and write
|
||
B0AEFFE000
|
unkown
|
page readonly
|
||
6D91000
|
heap
|
page read and write
|
||
534800D08000
|
trusted library allocation
|
page read and write
|
||
11000215000
|
direct allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800FD4000
|
trusted library allocation
|
page read and write
|
||
5348001F4000
|
trusted library allocation
|
page read and write
|
||
534800214000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
42000220000
|
trusted library allocation
|
page read and write
|
||
1E8DA070000
|
trusted library section
|
page read and write
|
||
534801100000
|
trusted library allocation
|
page read and write
|
||
B0B4FFE000
|
unkown
|
page readonly
|
||
7876000
|
heap
|
page read and write
|
||
1E8D8B50000
|
unkown
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
1E8D8100000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
1E8D9DD9000
|
heap
|
page read and write
|
||
370400220000
|
trusted library allocation
|
page read and write
|
||
B0A8FFE000
|
unkown
|
page readonly
|
||
534800001000
|
trusted library allocation
|
page read and write
|
||
1E8D61D0000
|
heap
|
page read and write
|
||
534800344000
|
trusted library allocation
|
page read and write
|
||
534800304000
|
trusted library allocation
|
page read and write
|
||
7480000
|
direct allocation
|
page execute and read and write
|
||
7B45000
|
heap
|
page read and write
|
||
1E8D62FC000
|
heap
|
page read and write
|
||
3704002C0000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
2DAF000
|
unkown
|
page read and write
|
||
B0A77FC000
|
stack
|
page read and write
|
||
5348000B4000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
534800801000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800330000
|
trusted library allocation
|
page read and write
|
||
534800F3C000
|
trusted library allocation
|
page read and write
|
||
534800AA4000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
42000237000
|
trusted library allocation
|
page read and write
|
||
B096FFE000
|
unkown
|
page readonly
|
||
7871000
|
heap
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
B09E7FD000
|
stack
|
page read and write
|
||
42000230000
|
trusted library allocation
|
page read and write
|
||
B09BFFE000
|
unkown
|
page readonly
|
||
42000408000
|
trusted library allocation
|
page read and write
|
||
1E8D9E04000
|
heap
|
page read and write
|
||
534801194000
|
trusted library allocation
|
page read and write
|
||
534800194000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
1E8E01C1000
|
trusted library section
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800EA0000
|
trusted library allocation
|
page read and write
|
||
787B000
|
heap
|
page read and write
|
||
B0AAFFE000
|
unkown
|
page readonly
|
||
B0AB7FE000
|
stack
|
page read and write
|
||
5348006C4000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1E8D9DFF000
|
heap
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
534801001000
|
trusted library allocation
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
7AEE000
|
heap
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
5348012B4000
|
trusted library allocation
|
page read and write
|
||
1E8D9DD7000
|
heap
|
page read and write
|
||
4200085C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
420007E4000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
5348003CC000
|
trusted library allocation
|
page read and write
|
||
534800D6C000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
1E8DDE12000
|
trusted library allocation
|
page read and write
|
||
1E8D9DDB000
|
heap
|
page read and write
|
||
5348006D8000
|
trusted library allocation
|
page read and write
|
||
534801158000
|
trusted library allocation
|
page read and write
|
||
96C000
|
stack
|
page read and write
|
||
11000290000
|
direct allocation
|
page read and write
|
||
1E8D9DE5000
|
heap
|
page read and write
|
||
534800CF8000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
534800B3C000
|
trusted library allocation
|
page read and write
|
||
3704002B0000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
7874000
|
heap
|
page read and write
|
||
534800224000
|
trusted library allocation
|
page read and write
|
||
1E8DF9D2000
|
trusted library section
|
page read and write
|
||
534800A5F000
|
trusted library allocation
|
page read and write
|
||
7A1B000
|
heap
|
page read and write
|
||
420008D8000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
534800AF4000
|
trusted library allocation
|
page read and write
|
||
B0A3FFC000
|
stack
|
page read and write
|
||
1E8E016E000
|
trusted library section
|
page read and write
|
||
1E8D97EF000
|
heap
|
page read and write
|
||
534800EF4000
|
trusted library allocation
|
page read and write
|
||
420006AC000
|
trusted library allocation
|
page read and write
|
||
B0977FD000
|
stack
|
page read and write
|
||
4200082C000
|
trusted library allocation
|
page read and write
|
||
B0B57FE000
|
stack
|
page read and write
|
||
5348001F8000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
534800C0C000
|
trusted library allocation
|
page read and write
|
||
42000830000
|
trusted library allocation
|
page read and write
|
||
11000303000
|
direct allocation
|
page read and write
|
||
534800E18000
|
trusted library allocation
|
page read and write
|
||
420002B0000
|
trusted library allocation
|
page read and write
|
||
5348002B4000
|
trusted library allocation
|
page read and write
|
||
534800AC8000
|
trusted library allocation
|
page read and write
|
||
534801074000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534801018000
|
trusted library allocation
|
page read and write
|
||
42000850000
|
trusted library allocation
|
page read and write
|
||
420007A0000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
B097FFE000
|
unkown
|
page readonly
|
||
7A5A000
|
heap
|
page read and write
|
||
B0927FB000
|
stack
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
5348007A4000
|
trusted library allocation
|
page read and write
|
||
420006C8000
|
trusted library allocation
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1E8D9DAF000
|
heap
|
page read and write
|
||
79BA000
|
heap
|
page read and write
|
||
3704002C0000
|
trusted library allocation
|
page read and write
|
||
534800C3C000
|
trusted library allocation
|
page read and write
|
||
420002B8000
|
trusted library allocation
|
page read and write
|
||
53480074C000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
3704002E4000
|
trusted library allocation
|
page read and write
|
||
B0A57FE000
|
unkown
|
page readonly
|
||
534800330000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800F90000
|
trusted library allocation
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
7875000
|
heap
|
page read and write
|
||
534800C80000
|
trusted library allocation
|
page read and write
|
||
1E8E0141000
|
trusted library section
|
page read and write
|
||
1E8D9D97000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
534800F08000
|
trusted library allocation
|
page read and write
|
||
1E8D6268000
|
heap
|
page read and write
|
||
4200079C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
534800CC0000
|
trusted library allocation
|
page read and write
|
||
53480007C000
|
trusted library allocation
|
page read and write
|
||
5348006E8000
|
trusted library allocation
|
page read and write
|
||
77D2000
|
direct allocation
|
page read and write
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
534800738000
|
trusted library allocation
|
page read and write
|
||
7924000
|
heap
|
page read and write
|
||
534801030000
|
trusted library allocation
|
page read and write
|
||
420006F0000
|
trusted library allocation
|
page read and write
|
||
4200084C000
|
trusted library allocation
|
page read and write
|
||
42000250000
|
trusted library allocation
|
page read and write
|
||
B08A7FE000
|
stack
|
page read and write
|
||
53480033C000
|
trusted library allocation
|
page read and write
|
||
1E8D80F0000
|
trusted library section
|
page readonly
|
||
53480040C000
|
trusted library allocation
|
page read and write
|
||
7874000
|
heap
|
page read and write
|
||
1E8D631A000
|
heap
|
page read and write
|
||
5348006E0000
|
trusted library allocation
|
page read and write
|
||
B0A5FFE000
|
unkown
|
page readonly
|
||
7490000
|
direct allocation
|
page execute and read and write
|
||
B08CFFE000
|
unkown
|
page readonly
|
||
1E8D9D97000
|
heap
|
page read and write
|
||
787A000
|
heap
|
page read and write
|
||
B0997FE000
|
stack
|
page read and write
|
||
2E68000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1E8D627E000
|
heap
|
page read and write
|
||
42000210000
|
trusted library allocation
|
page read and write
|
||
1E8E0162000
|
trusted library section
|
page read and write
|
||
534800748000
|
trusted library allocation
|
page read and write
|
||
1E8D9DFF000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
B088FFE000
|
unkown
|
page readonly
|
||
534800304000
|
trusted library allocation
|
page read and write
|
||
B09B7FE000
|
stack
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
B0B27FE000
|
stack
|
page read and write
|
||
534800DCC000
|
trusted library allocation
|
page read and write
|
||
1E8D9D10000
|
trusted library section
|
page read and write
|
||
5348003C1000
|
trusted library allocation
|
page read and write
|
||
B0967FE000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
534800390000
|
trusted library allocation
|
page read and write
|
||
534800BDF000
|
trusted library allocation
|
page read and write
|
||
420007BC000
|
trusted library allocation
|
page read and write
|
||
B09C7FE000
|
stack
|
page read and write
|
||
7A55000
|
heap
|
page read and write
|
||
7B0C000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800770000
|
trusted library allocation
|
page read and write
|
||
79D4000
|
heap
|
page read and write
|
||
B08E7FB000
|
stack
|
page read and write
|
||
7AAB000
|
heap
|
page read and write
|
||
534800F68000
|
trusted library allocation
|
page read and write
|
||
42000778000
|
trusted library allocation
|
page read and write
|
||
3704002C0000
|
trusted library allocation
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
534800B84000
|
trusted library allocation
|
page read and write
|
||
5348002B7000
|
trusted library allocation
|
page read and write
|
||
534800C88000
|
trusted library allocation
|
page read and write
|
||
7220000
|
direct allocation
|
page read and write
|
||
7A46000
|
heap
|
page read and write
|
||
53480081C000
|
trusted library allocation
|
page read and write
|
||
53480078C000
|
trusted library allocation
|
page read and write
|
||
B0B67FE000
|
stack
|
page read and write
|
||
5348000FC000
|
trusted library allocation
|
page read and write
|
||
1E8D9DD5000
|
heap
|
page read and write
|
||
B099FFE000
|
unkown
|
page readonly
|
||
6D91000
|
heap
|
page read and write
|
||
11000220000
|
direct allocation
|
page read and write
|
||
7C4B000
|
heap
|
page read and write
|
||
37040020C000
|
trusted library allocation
|
page read and write
|
||
1E8D9A60000
|
heap
|
page read and write
|
||
5348011AC000
|
trusted library allocation
|
page read and write
|
||
420002DC000
|
trusted library allocation
|
page read and write
|
||
534800344000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
5348008F4000
|
trusted library allocation
|
page read and write
|
||
1E8D97EF000
|
heap
|
page read and write
|
||
5348012C0000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
53480129C000
|
trusted library allocation
|
page read and write
|
||
5348011B8000
|
trusted library allocation
|
page read and write
|
||
7A1000
|
unkown
|
page execute and write copy
|
||
A3C000
|
stack
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
1E8E04BE000
|
trusted library section
|
page read and write
|
||
1E8D9E0B000
|
heap
|
page read and write
|
||
1E8E0130000
|
trusted library section
|
page read and write
|
||
79FC000
|
heap
|
page read and write
|
||
11000274000
|
direct allocation
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
1E8DF900000
|
trusted library section
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
7872000
|
heap
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
534800DCC000
|
trusted library allocation
|
page read and write
|
||
7A9D000
|
heap
|
page read and write
|
||
1E8D635C000
|
heap
|
page read and write
|
||
42000248000
|
trusted library allocation
|
page read and write
|
||
1E8D9DC1000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
11000201000
|
direct allocation
|
page read and write
|
||
5348002B4000
|
trusted library allocation
|
page read and write
|
||
53480012C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
370400264000
|
trusted library allocation
|
page read and write
|
||
110002DC000
|
direct allocation
|
page read and write
|
||
5348002D0000
|
trusted library allocation
|
page read and write
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
1E8D9D88000
|
heap
|
page read and write
|
||
B0A87FE000
|
stack
|
page read and write
|
||
11000234000
|
direct allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
534800C9C000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
534800D60000
|
trusted library allocation
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
B08F7FC000
|
stack
|
page read and write
|
||
4200060C000
|
trusted library allocation
|
page read and write
|
||
1E8D9DBA000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
53480020C000
|
trusted library allocation
|
page read and write
|
||
5348001E0000
|
trusted library allocation
|
page read and write
|
||
B0B87FE000
|
stack
|
page read and write
|
||
1E8E0276000
|
trusted library section
|
page read and write
|
||
534800AE8000
|
trusted library allocation
|
page read and write
|
||
42000964000
|
trusted library allocation
|
page read and write
|
||
1E8D9DE6000
|
heap
|
page read and write
|
||
5348008CC000
|
trusted library allocation
|
page read and write
|
||
534800EA0000
|
trusted library allocation
|
page read and write
|
||
534800F3C000
|
trusted library allocation
|
page read and write
|
||
4200095C000
|
trusted library allocation
|
page read and write
|
||
B0AD7FD000
|
stack
|
page read and write
|
||
4200039C000
|
trusted library allocation
|
page read and write
|
||
420002CC000
|
trusted library allocation
|
page read and write
|
||
534800E54000
|
trusted library allocation
|
page read and write
|
||
534800F5C000
|
trusted library allocation
|
page read and write
|
||
534800210000
|
trusted library allocation
|
page read and write
|
||
B0AA7FD000
|
stack
|
page read and write
|
||
787F000
|
heap
|
page read and write
|
||
53480040C000
|
trusted library allocation
|
page read and write
|
||
370400260000
|
trusted library allocation
|
page read and write
|
||
2E5B000
|
heap
|
page read and write
|
||
1E8D9DF6000
|
heap
|
page read and write
|
||
79DA000
|
heap
|
page read and write
|
||
534800E98000
|
trusted library allocation
|
page read and write
|
||
420008C8000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
7929000
|
direct allocation
|
page read and write
|
||
7876000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
42000894000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
534800A80000
|
trusted library allocation
|
page read and write
|
||
534800F3C000
|
trusted library allocation
|
page read and write
|
||
110002D0000
|
direct allocation
|
page read and write
|
||
1E8E0477000
|
unclassified section
|
page read and write
|
||
534800B70000
|
trusted library allocation
|
page read and write
|
||
787F000
|
heap
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
29CA000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1E8D6230000
|
heap
|
page read and write
|
||
42000404000
|
trusted library allocation
|
page read and write
|
||
B0887FD000
|
unkown
|
page read and write
|
||
7C19000
|
heap
|
page read and write
|
||
53480056B000
|
trusted library allocation
|
page read and write
|
||
5348002F0000
|
trusted library allocation
|
page read and write
|
||
1E8D97F6000
|
heap
|
page read and write
|
||
534801190000
|
trusted library allocation
|
page read and write
|
||
B08BFFE000
|
unkown
|
page readonly
|
||
3704002A0000
|
trusted library allocation
|
page read and write
|
||
534800290000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
53480074C000
|
trusted library allocation
|
page read and write
|
||
420007D0000
|
trusted library allocation
|
page read and write
|
||
53480077C000
|
trusted library allocation
|
page read and write
|
||
5348005CC000
|
trusted library allocation
|
page read and write
|
||
1E8DE337000
|
unclassified section
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
F0E000
|
stack
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
1E8DF9DD000
|
trusted library section
|
page read and write
|
||
7A4B000
|
heap
|
page read and write
|
||
534800C80000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
7875000
|
heap
|
page read and write
|
||
42000430000
|
trusted library allocation
|
page read and write
|
||
534800310000
|
trusted library allocation
|
page read and write
|
||
1E8DF973000
|
trusted library section
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
534800894000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
4200071C000
|
trusted library allocation
|
page read and write
|
||
534800954000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800368000
|
trusted library allocation
|
page read and write
|
||
420006C8000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
534801094000
|
trusted library allocation
|
page read and write
|
||
420007D4000
|
trusted library allocation
|
page read and write
|
||
420008A8000
|
trusted library allocation
|
page read and write
|
||
534800164000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
298D000
|
stack
|
page read and write
|
||
1E8D9D99000
|
heap
|
page read and write
|
||
7965000
|
heap
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
42000864000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800B40000
|
trusted library allocation
|
page read and write
|
||
420006BC000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800230000
|
trusted library allocation
|
page read and write
|
||
420008EC000
|
trusted library allocation
|
page read and write
|
||
B0ADFFE000
|
unkown
|
page readonly
|
||
53480079C000
|
trusted library allocation
|
page read and write
|
||
5348012CC000
|
trusted library allocation
|
page read and write
|
||
53480000C000
|
trusted library allocation
|
page read and write
|
||
4200040C000
|
trusted library allocation
|
page read and write
|
||
42000818000
|
trusted library allocation
|
page read and write
|
||
B0937FC000
|
stack
|
page read and write
|
||
534800868000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
1E8E02D0000
|
trusted library section
|
page read and write
|
||
7A26000
|
heap
|
page read and write
|
||
7871000
|
heap
|
page read and write
|
||
7942000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1E8D9FF0000
|
trusted library section
|
page read and write
|
||
B08D7FD000
|
stack
|
page read and write
|
||
5348004B4000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1E8D6260000
|
heap
|
page read and write
|
||
420008F0000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800D48000
|
trusted library allocation
|
page read and write
|
||
5348008C4000
|
trusted library allocation
|
page read and write
|
||
1E8D9DF9000
|
heap
|
page read and write
|
||
11000210000
|
direct allocation
|
page read and write
|
||
7879000
|
heap
|
page read and write
|
||
534800DD4000
|
trusted library allocation
|
page read and write
|
||
B092FFE000
|
unkown
|
page readonly
|
||
6D91000
|
heap
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
53480080C000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
B0B8FFE000
|
unkown
|
page readonly
|
||
7A09000
|
heap
|
page read and write
|
||
534800EAC000
|
trusted library allocation
|
page read and write
|
||
370400248000
|
trusted library allocation
|
page read and write
|
||
53480120C000
|
trusted library allocation
|
page read and write
|
||
5348001B4000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
B093FFE000
|
unkown
|
page readonly
|
||
1E8D62BF000
|
heap
|
page read and write
|
||
7BC3000
|
heap
|
page read and write
|
||
1E8DFEE0000
|
trusted library section
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534800930000
|
trusted library allocation
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
B0AE7FD000
|
stack
|
page read and write
|
||
42000424000
|
trusted library allocation
|
page read and write
|
||
534801048000
|
trusted library allocation
|
page read and write
|
||
534800220000
|
trusted library allocation
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
1B1000
|
unkown
|
page execute read
|
||
B0A47FE000
|
unkown
|
page readonly
|
||
42000828000
|
trusted library allocation
|
page read and write
|
||
1E8D9800000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
7470000
|
direct allocation
|
page execute and read and write
|
||
7ADA000
|
heap
|
page read and write
|
||
B0B1FFE000
|
unkown
|
page readonly
|
||
6C22D000
|
unkown
|
page read and write
|
||
5348002FB000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
1E8DE3E0000
|
heap
|
page read and write
|
||
42000860000
|
trusted library allocation
|
page read and write
|
||
42000601000
|
trusted library allocation
|
page read and write
|
||
787E000
|
heap
|
page read and write
|
||
B09A7FE000
|
stack
|
page read and write
|
||
B08EFFE000
|
unkown
|
page readonly
|
||
1B1000
|
unkown
|
page execute read
|
||
420008F4000
|
trusted library allocation
|
page read and write
|
||
3704002C0000
|
trusted library allocation
|
page read and write
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
42000401000
|
trusted library allocation
|
page read and write
|
||
534800E7C000
|
trusted library allocation
|
page read and write
|
||
79AD000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800C24000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
420002EC000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
5348001E4000
|
trusted library allocation
|
page read and write
|
||
534800728000
|
trusted library allocation
|
page read and write
|
||
534800634000
|
trusted library allocation
|
page read and write
|
||
534800EA0000
|
trusted library allocation
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
7870000
|
heap
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
420006E8000
|
trusted library allocation
|
page read and write
|
||
534800AB8000
|
trusted library allocation
|
page read and write
|
||
534800758000
|
trusted library allocation
|
page read and write
|
||
534800FD8000
|
trusted library allocation
|
page read and write
|
||
7993000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
53480100C000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
B0A4FFD000
|
stack
|
page read and write
|
||
7BAE000
|
heap
|
page read and write
|
||
7874000
|
heap
|
page read and write
|
||
B0A27FD000
|
stack
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
3704002A0000
|
trusted library allocation
|
page read and write
|
||
534800CC8000
|
trusted library allocation
|
page read and write
|
||
1E8D8103000
|
heap
|
page read and write
|
||
79CA000
|
heap
|
page read and write
|
||
420006E0000
|
trusted library allocation
|
page read and write
|
||
534800F58000
|
trusted library allocation
|
page read and write
|
||
11000217000
|
direct allocation
|
page read and write
|
||
420007AC000
|
trusted library allocation
|
page read and write
|
||
534800DC5000
|
trusted library allocation
|
page read and write
|
||
53480026C000
|
trusted library allocation
|
page read and write
|
||
7A22000
|
heap
|
page read and write
|
||
420008B8000
|
trusted library allocation
|
page read and write
|
||
534800520000
|
trusted library allocation
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
6C27C000
|
unkown
|
page readonly
|
||
42000790000
|
trusted library allocation
|
page read and write
|
||
1E8D9E60000
|
trusted library section
|
page read and write
|
||
792B000
|
direct allocation
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
5348004D0000
|
trusted library allocation
|
page read and write
|
||
1E8D9E0B000
|
heap
|
page read and write
|
||
B0A0FFE000
|
unkown
|
page readonly
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
||
5348000EC000
|
trusted library allocation
|
page read and write
|
||
1E8D9E02000
|
heap
|
page read and write
|
||
1100020C000
|
direct allocation
|
page read and write
|
||
534800C1C000
|
trusted library allocation
|
page read and write
|
||
534801174000
|
trusted library allocation
|
page read and write
|
||
42000788000
|
trusted library allocation
|
page read and write
|
||
534800154000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
534800093000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
534800CC8000
|
trusted library allocation
|
page read and write
|
||
B0917FB000
|
stack
|
page read and write
|
||
53480021C000
|
trusted library allocation
|
page read and write
|
||
B0ACFFE000
|
unkown
|
page readonly
|
||
42000700000
|
trusted library allocation
|
page read and write
|
||
5348001B4000
|
trusted library allocation
|
page read and write
|
||
53480020C000
|
trusted library allocation
|
page read and write
|
||
B098FFE000
|
unkown
|
page readonly
|
||
5348002C0000
|
trusted library allocation
|
page read and write
|
||
53480057C000
|
trusted library allocation
|
page read and write
|
||
534800EA0000
|
trusted library allocation
|
page read and write
|
||
42000868000
|
trusted library allocation
|
page read and write
|
||
534800300000
|
trusted library allocation
|
page read and write
|
||
5348001B4000
|
trusted library allocation
|
page read and write
|
||
797E000
|
heap
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
534800DEC000
|
trusted library allocation
|
page read and write
|
||
534800AD8000
|
trusted library allocation
|
page read and write
|
||
1E8D97F3000
|
heap
|
page read and write
|
||
534800FC4000
|
trusted library allocation
|
page read and write
|
||
7971000
|
heap
|
page read and write
|
||
534800F90000
|
trusted library allocation
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
B091FFE000
|
unkown
|
page readonly
|
||
534800DB8000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
534800174000
|
trusted library allocation
|
page read and write
|
||
534800941000
|
trusted library allocation
|
page read and write
|
||
7876000
|
heap
|
page read and write
|
||
534800B78000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
5348001F0000
|
trusted library allocation
|
page read and write
|
||
534800D88000
|
trusted library allocation
|
page read and write
|
||
5348010EC000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
1B0000
|
unkown
|
page readonly
|
||
11000260000
|
direct allocation
|
page read and write
|
||
4200020C000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
534800FBA000
|
trusted library allocation
|
page read and write
|
||
534800F6C000
|
trusted library allocation
|
page read and write
|
||
7872000
|
heap
|
page read and write
|
||
5348002A8000
|
trusted library allocation
|
page read and write
|
||
534800FB8000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
6C278000
|
unkown
|
page readonly
|
||
1B1000
|
unkown
|
page execute read
|
||
6D91000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
B09FFFE000
|
unkown
|
page readonly
|
||
534800294000
|
trusted library allocation
|
page read and write
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
B0B2FFE000
|
unkown
|
page readonly
|
||
534800310000
|
trusted library allocation
|
page read and write
|
||
7879000
|
heap
|
page read and write
|
||
B0947FE000
|
stack
|
page read and write
|
||
7877000
|
heap
|
page read and write
|
||
4200025C000
|
trusted library allocation
|
page read and write
|
||
534800F90000
|
trusted library allocation
|
page read and write
|
||
79DC000
|
heap
|
page read and write
|
||
7BBD000
|
heap
|
page read and write
|
||
534800350000
|
trusted library allocation
|
page read and write
|
||
7981000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
1E8D9DF9000
|
heap
|
page read and write
|
||
534800C01000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800304000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
unkown
|
page readonly
|
||
6D80000
|
direct allocation
|
page read and write
|
||
1E8D9D99000
|
heap
|
page read and write
|
||
11000280000
|
direct allocation
|
page read and write
|
||
7873000
|
heap
|
page read and write
|
||
534800694000
|
trusted library allocation
|
page read and write
|
||
B0B3FFE000
|
unkown
|
page readonly
|
||
F90000
|
heap
|
page read and write
|
||
7934000
|
heap
|
page read and write
|
||
534800B54000
|
trusted library allocation
|
page read and write
|
||
1E8D97EA000
|
heap
|
page read and write
|
||
534800900000
|
trusted library allocation
|
page read and write
|
||
5348002B4000
|
trusted library allocation
|
page read and write
|
||
534800544000
|
trusted library allocation
|
page read and write
|
||
1E8D61C0000
|
heap
|
page readonly
|
||
534800B5C000
|
trusted library allocation
|
page read and write
|
||
5348006E2000
|
trusted library allocation
|
page read and write
|
||
534800A0C000
|
trusted library allocation
|
page read and write
|
||
534800390000
|
trusted library allocation
|
page read and write
|
||
534800344000
|
trusted library allocation
|
page read and write
|
||
B0A6FFE000
|
unkown
|
page readonly
|
||
534800A01000
|
trusted library allocation
|
page read and write
|
||
534800984000
|
trusted library allocation
|
page read and write
|
||
6C151000
|
unkown
|
page execute read
|
||
1BA000
|
unkown
|
page readonly
|
||
534800454000
|
trusted library allocation
|
page read and write
|
||
1E8DDBC0000
|
trusted library allocation
|
page read and write
|
||
11000294000
|
direct allocation
|
page read and write
|
||
5348004B4000
|
trusted library allocation
|
page read and write
|
||
7879000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
7A19000
|
heap
|
page read and write
|
||
5348012A8000
|
trusted library allocation
|
page read and write
|
||
534800840000
|
trusted library allocation
|
page read and write
|
||
534800960000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page execute and read and write
|
||
5348009D0000
|
trusted library allocation
|
page read and write
|
||
4200078C000
|
trusted library allocation
|
page read and write
|
||
420008E8000
|
trusted library allocation
|
page read and write
|
||
B0ABFFE000
|
unkown
|
page readonly
|
||
534800D00000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534801201000
|
trusted library allocation
|
page read and write
|
||
534800BEC000
|
trusted library allocation
|
page read and write
|
||
1E8D9D77000
|
heap
|
page read and write
|
||
5348001E8000
|
trusted library allocation
|
page read and write
|
||
1E8D9E02000
|
heap
|
page read and write
|
||
534800C70000
|
trusted library allocation
|
page read and write
|
||
534800218000
|
trusted library allocation
|
page read and write
|
||
7877000
|
heap
|
page read and write
|
||
42000960000
|
trusted library allocation
|
page read and write
|
||
534800390000
|
trusted library allocation
|
page read and write
|
||
B0877EF000
|
stack
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
1E8DE493000
|
heap
|
page read and write
|
||
1E8D6240000
|
trusted library allocation
|
page read and write
|
||
5348005EC000
|
trusted library allocation
|
page read and write
|
||
1E8DE490000
|
heap
|
page read and write
|
||
B0AFFFA000
|
stack
|
page read and write
|
||
53480001C000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
534800CDC000
|
trusted library allocation
|
page read and write
|
||
B0A97FD000
|
stack
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
5348001EC000
|
trusted library allocation
|
page read and write
|
||
5348006A0000
|
trusted library allocation
|
page read and write
|
||
3EC000
|
stack
|
page read and write
|
||
1C1000
|
unkown
|
page readonly
|
||
420006AC000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
3704002C0000
|
trusted library allocation
|
page read and write
|
||
1E8DF91E000
|
trusted library section
|
page read and write
|
||
4200070C000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
1E8D97D0000
|
heap
|
page read and write
|
||
1E8E029D000
|
trusted library section
|
page read and write
|
||
3704002BC000
|
trusted library allocation
|
page read and write
|
There are 1069 hidden memdumps, click here to show them.