Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_ed208a90-a6a7-4a0e-b504-7f6ab3363c62\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D3D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Nov 24 10:33:42 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EF3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F33.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2144,i,17002288862588323597,13941596843949816607,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 1836
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://chrome.google.com/webstore?hl=enQw
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7488%
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347$
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://issuetracker.google.com/issues/166475273q
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
https://anglebug.com/7320e
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://issuetracker.google.com/166809097
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.68
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
46A000
|
unkown
|
page readonly
|
||
65E800230000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
730800770000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
730800330000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
2C7C00C0C000
|
trusted library allocation
|
page read and write
|
||
2C7C00844000
|
trusted library allocation
|
page read and write
|
||
6EB57FA000
|
stack
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6ECE7FE000
|
stack
|
page read and write
|
||
2C7C0016C000
|
trusted library allocation
|
page read and write
|
||
206CF6F9000
|
heap
|
page read and write
|
||
2C7C00658000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF6F2000
|
heap
|
page read and write
|
||
2C7C00AB4000
|
trusted library allocation
|
page read and write
|
||
7759000
|
heap
|
page read and write
|
||
2C7C001E8000
|
trusted library allocation
|
page read and write
|
||
206D53C7000
|
unclassified section
|
page read and write
|
||
775F000
|
heap
|
page read and write
|
||
7308006F0000
|
trusted library allocation
|
page read and write
|
||
730800620000
|
trusted library allocation
|
page read and write
|
||
2C7C00DE4000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
6EB2FFE000
|
unkown
|
page readonly
|
||
206D602E000
|
trusted library section
|
page read and write
|
||
206CF6E6000
|
heap
|
page read and write
|
||
7308002F0000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00D00000
|
trusted library allocation
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
2C7C00390000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
7A5E000
|
heap
|
page read and write
|
||
2C7C0034C000
|
trusted library allocation
|
page read and write
|
||
2C7C00D58000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
730800704000
|
trusted library allocation
|
page read and write
|
||
6EC37FE000
|
unkown
|
page readonly
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C0034C000
|
trusted library allocation
|
page read and write
|
||
6EC6FFE000
|
unkown
|
page readonly
|
||
206CF1A1000
|
heap
|
page read and write
|
||
206CF17F000
|
heap
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
730800688000
|
trusted library allocation
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
730800784000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
77FB000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF6E9000
|
heap
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
2C7C00F78000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF6F9000
|
heap
|
page read and write
|
||
730800418000
|
trusted library allocation
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
206CF71A000
|
heap
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
7A4D000
|
heap
|
page read and write
|
||
2C7C00198000
|
trusted library allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
2C7C00CF0000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
206CF173000
|
heap
|
page read and write
|
||
730800330000
|
trusted library allocation
|
page read and write
|
||
2C7C00AA4000
|
trusted library allocation
|
page read and write
|
||
2C7C00354000
|
trusted library allocation
|
page read and write
|
||
7308006B8000
|
trusted library allocation
|
page read and write
|
||
2C7C007B7000
|
trusted library allocation
|
page read and write
|
||
2C7C00D24000
|
trusted library allocation
|
page read and write
|
||
78AC000
|
heap
|
page read and write
|
||
2C7C001B4000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
65E8002C0000
|
trusted library allocation
|
page read and write
|
||
2C7C00CE8000
|
trusted library allocation
|
page read and write
|
||
46E000
|
unkown
|
page write copy
|
||
2C7C00304000
|
trusted library allocation
|
page read and write
|
||
E7C000
|
stack
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206D3462000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF6E9000
|
heap
|
page read and write
|
||
730800788000
|
trusted library allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
2C7C00B0C000
|
trusted library allocation
|
page read and write
|
||
206CF71A000
|
heap
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
1241000
|
unkown
|
page execute and write copy
|
||
2C7C000AC000
|
trusted library allocation
|
page read and write
|
||
7755000
|
heap
|
page read and write
|
||
7308007C8000
|
trusted library allocation
|
page read and write
|
||
2C7C00093000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
65E8002C0000
|
trusted library allocation
|
page read and write
|
||
2C7C001AC000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
2C7C003ED000
|
trusted library allocation
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
2C7C0021C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
730800408000
|
trusted library allocation
|
page read and write
|
||
2C7C002E0000
|
trusted library allocation
|
page read and write
|
||
2C7C00F68000
|
trusted library allocation
|
page read and write
|
||
2C7C0074C000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
471000
|
unkown
|
page readonly
|
||
2C7C00934000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
2C7C00294000
|
trusted library allocation
|
page read and write
|
||
2C7C00B40000
|
trusted library allocation
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
2C7C002A4000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00782000
|
trusted library allocation
|
page read and write
|
||
2C7C00CBC000
|
trusted library allocation
|
page read and write
|
||
206CBBDC000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF182000
|
heap
|
page read and write
|
||
783B000
|
heap
|
page read and write
|
||
2C7C00988000
|
trusted library allocation
|
page read and write
|
||
6EC2FFE000
|
unkown
|
page readonly
|
||
6ECB7FE000
|
stack
|
page read and write
|
||
7757000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00D1C000
|
trusted library allocation
|
page read and write
|
||
2C7C00E1C000
|
trusted library allocation
|
page read and write
|
||
206CF71A000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
65E8002A0000
|
trusted library allocation
|
page read and write
|
||
206CF182000
|
heap
|
page read and write
|
||
2C7C000EC000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00E4C000
|
trusted library allocation
|
page read and write
|
||
2C7C00E98000
|
trusted library allocation
|
page read and write
|
||
2C7C00F5C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00340000
|
trusted library allocation
|
page read and write
|
||
7752000
|
heap
|
page read and write
|
||
206D5CE0000
|
trusted library section
|
page read and write
|
||
6EBCFFE000
|
unkown
|
page readonly
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00268000
|
trusted library allocation
|
page read and write
|
||
2C7C00201000
|
trusted library allocation
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
2C7C00300000
|
trusted library allocation
|
page read and write
|
||
7308006B0000
|
trusted library allocation
|
page read and write
|
||
18E6000
|
heap
|
page read and write
|
||
206CF5F0000
|
trusted library section
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
6EC9FFE000
|
unkown
|
page readonly
|
||
206D3A30000
|
heap
|
page read and write
|
||
2C7C00134000
|
trusted library allocation
|
page read and write
|
||
2C7C00AE0000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C000B4000
|
trusted library allocation
|
page read and write
|
||
206CF665000
|
heap
|
page read and write
|
||
2C7C00CA4000
|
trusted library allocation
|
page read and write
|
||
2C7C006AC000
|
trusted library allocation
|
page read and write
|
||
46E000
|
unkown
|
page read and write
|
||
65E800238000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF185000
|
heap
|
page read and write
|
||
2C7C00CA4000
|
trusted library allocation
|
page read and write
|
||
6EBFFFE000
|
unkown
|
page readonly
|
||
730800368000
|
trusted library allocation
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
2C7C00C54000
|
trusted library allocation
|
page read and write
|
||
2C7C00742000
|
trusted library allocation
|
page read and write
|
||
6EB6FFE000
|
unkown
|
page readonly
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C00124000
|
trusted library allocation
|
page read and write
|
||
730800624000
|
trusted library allocation
|
page read and write
|
||
206CF6C4000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
781D000
|
heap
|
page read and write
|
||
2C7C002F0000
|
trusted library allocation
|
page read and write
|
||
7829000
|
direct allocation
|
page read and write
|
||
2C7C00190000
|
trusted library allocation
|
page read and write
|
||
2C7C00C98000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C00354000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
6ECBFFE000
|
unkown
|
page readonly
|
||
206CF16A000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
7923000
|
heap
|
page read and write
|
||
2C7C00EA4000
|
trusted library allocation
|
page read and write
|
||
2C7C00E8C000
|
trusted library allocation
|
page read and write
|
||
2C7C00C7C000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00794000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6EBA7FE000
|
stack
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF6F7000
|
heap
|
page read and write
|
||
73080035C000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
2C7C001F8000
|
trusted library allocation
|
page read and write
|
||
79A0000
|
heap
|
page read and write
|
||
65E800250000
|
trusted library allocation
|
page read and write
|
||
2C7C0077D000
|
trusted library allocation
|
page read and write
|
||
2C7C004AC000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C0036C000
|
trusted library allocation
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
130400280000
|
direct allocation
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
2C7C001A0000
|
trusted library allocation
|
page read and write
|
||
206CF190000
|
heap
|
page read and write
|
||
27EF000
|
unkown
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
206D3A74000
|
heap
|
page read and write
|
||
65E8002B0000
|
trusted library allocation
|
page read and write
|
||
2C7C00AC4000
|
trusted library allocation
|
page read and write
|
||
206CF6C4000
|
heap
|
page read and write
|
||
206D3A55000
|
heap
|
page read and write
|
||
784A000
|
heap
|
page read and write
|
||
2C7C00C28000
|
trusted library allocation
|
page read and write
|
||
785C000
|
heap
|
page read and write
|
||
2C7C0080C000
|
trusted library allocation
|
page read and write
|
||
130400270000
|
direct allocation
|
page read and write
|
||
206CF17A000
|
heap
|
page read and write
|
||
78C0000
|
heap
|
page read and write
|
||
730800698000
|
trusted library allocation
|
page read and write
|
||
2C7C00380000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
2C7C0081C000
|
trusted library allocation
|
page read and write
|
||
206CBD30000
|
heap
|
page read and write
|
||
130400290000
|
direct allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
73080080C000
|
trusted library allocation
|
page read and write
|
||
2C7C003ED000
|
trusted library allocation
|
page read and write
|
||
6EAEFFE000
|
unkown
|
page readonly
|
||
130400303000
|
direct allocation
|
page read and write
|
||
7756000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
5F0000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2C7C008A4000
|
trusted library allocation
|
page read and write
|
||
206D59F0000
|
trusted library section
|
page read and write
|
||
2C7C00C34000
|
trusted library allocation
|
page read and write
|
||
2C7C00390000
|
trusted library allocation
|
page read and write
|
||
206CF1A1000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CBBEE000
|
heap
|
page read and write
|
||
7750000
|
heap
|
page read and write
|
||
7380000
|
direct allocation
|
page execute and read and write
|
||
206CF6BC000
|
heap
|
page read and write
|
||
206CF6FF000
|
heap
|
page read and write
|
||
6EB47FE000
|
stack
|
page read and write
|
||
730800320000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
6EAC7FD000
|
unkown
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206D61E0000
|
trusted library section
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
206CF140000
|
heap
|
page read and write
|
||
18DF000
|
heap
|
page read and write
|
||
730800238000
|
trusted library allocation
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
2C7C00218000
|
trusted library allocation
|
page read and write
|
||
2C7C001EC000
|
trusted library allocation
|
page read and write
|
||
2C7C0020C000
|
trusted library allocation
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CBE20000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C007D8000
|
trusted library allocation
|
page read and write
|
||
206CF6F2000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
73080039C000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C001AC000
|
trusted library allocation
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
73080035C000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7308002B0000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
7308006C8000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00DF0000
|
trusted library allocation
|
page read and write
|
||
2C7C002C0000
|
trusted library allocation
|
page read and write
|
||
206CF190000
|
heap
|
page read and write
|
||
2C7C00E65000
|
trusted library allocation
|
page read and write
|
||
77E5000
|
heap
|
page read and write
|
||
6EB97FE000
|
stack
|
page read and write
|
||
65E8002B0000
|
trusted library allocation
|
page read and write
|
||
206CF646000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
7308006E0000
|
trusted library allocation
|
page read and write
|
||
2C7C00A70000
|
trusted library allocation
|
page read and write
|
||
1727000
|
heap
|
page read and write
|
||
6EC3FFE000
|
unkown
|
page readonly
|
||
206D57F0000
|
trusted library section
|
page read and write
|
||
2C7C0029A000
|
trusted library allocation
|
page read and write
|
||
6EC07FB000
|
stack
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
2C7C004BC000
|
trusted library allocation
|
page read and write
|
||
6EB27FB000
|
stack
|
page read and write
|
||
206CE410000
|
unkown
|
page read and write
|
||
2C7C002A8000
|
trusted library allocation
|
page read and write
|
||
206CF1AF000
|
heap
|
page read and write
|
||
206CF189000
|
heap
|
page read and write
|
||
278E000
|
unkown
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
2C7C007A8000
|
trusted library allocation
|
page read and write
|
||
2C7C00C01000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00C28000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
1304002A8000
|
direct allocation
|
page read and write
|
||
6EAD7FF000
|
stack
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
206CF6C4000
|
heap
|
page read and write
|
||
206CF3C0000
|
heap
|
page read and write
|
||
2C7C00860000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
2C7C00E0C000
|
trusted library allocation
|
page read and write
|
||
206CF6FF000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF166000
|
heap
|
page read and write
|
||
206CF9E7000
|
unclassified section
|
page read and write
|
||
18DE000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
18CD000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
7308002CC000
|
trusted library allocation
|
page read and write
|
||
2C7C00535000
|
trusted library allocation
|
page read and write
|
||
6ED1FFE000
|
unkown
|
page readonly
|
||
D70000
|
heap
|
page read and write
|
||
2C7C00978000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C002B4000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
7902000
|
heap
|
page read and write
|
||
206CBB97000
|
heap
|
page read and write
|
||
13040024C000
|
direct allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
789D000
|
heap
|
page read and write
|
||
775A000
|
heap
|
page read and write
|
||
2C7C004E0000
|
trusted library allocation
|
page read and write
|
||
2C7C00234000
|
trusted library allocation
|
page read and write
|
||
730800220000
|
trusted library allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
1440000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CBE25000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C0017C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF194000
|
heap
|
page read and write
|
||
206CF715000
|
heap
|
page read and write
|
||
730800678000
|
trusted library allocation
|
page read and write
|
||
26DA000
|
stack
|
page read and write
|
||
7837000
|
heap
|
page read and write
|
||
2C7C00CF4000
|
trusted library allocation
|
page read and write
|
||
6EB07FE000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
775B000
|
heap
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
7758000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
6ED2FFE000
|
unkown
|
page readonly
|
||
2C7C00360000
|
trusted library allocation
|
page read and write
|
||
2C7C00EB8000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF186000
|
heap
|
page read and write
|
||
206D6022000
|
trusted library section
|
page read and write
|
||
65E800294000
|
trusted library allocation
|
page read and write
|
||
206CBBEE000
|
heap
|
page read and write
|
||
6EBF7FE000
|
stack
|
page read and write
|
||
730800424000
|
trusted library allocation
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
78BC000
|
heap
|
page read and write
|
||
206CBBDC000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
6EAF7FE000
|
stack
|
page read and write
|
||
78E9000
|
heap
|
page read and write
|
||
7757000
|
heap
|
page read and write
|
||
2C7C001D0000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
6EB3FFE000
|
unkown
|
page readonly
|
||
206CF72A000
|
heap
|
page read and write
|
||
206CF16E000
|
heap
|
page read and write
|
||
2C7C002F0000
|
trusted library allocation
|
page read and write
|
||
2C7C007C0000
|
trusted library allocation
|
page read and write
|
||
2C7C00A34000
|
trusted library allocation
|
page read and write
|
||
2C7C0060C000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00E01000
|
trusted library allocation
|
page read and write
|
||
2C7C0029A000
|
trusted library allocation
|
page read and write
|
||
206CF6E6000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF72A000
|
heap
|
page read and write
|
||
206CBB9E000
|
heap
|
page read and write
|
||
2C7C00AF0000
|
trusted library allocation
|
page read and write
|
||
206CF17D000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
2C7C00A01000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
6ED17FE000
|
stack
|
page read and write
|
||
730800404000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
7758000
|
heap
|
page read and write
|
||
2C7C00EC4000
|
trusted library allocation
|
page read and write
|
||
206D2C00000
|
trusted library allocation
|
page read and write
|
||
73080020C000
|
trusted library allocation
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
7907000
|
heap
|
page read and write
|
||
6ECF7FE000
|
stack
|
page read and write
|
||
206CD9C0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2C7C0095C000
|
trusted library allocation
|
page read and write
|
||
2C7C001F4000
|
trusted library allocation
|
page read and write
|
||
2C7C00220000
|
trusted library allocation
|
page read and write
|
||
2C7C00B6C000
|
trusted library allocation
|
page read and write
|
||
206CF167000
|
heap
|
page read and write
|
||
730800744000
|
trusted library allocation
|
page read and write
|
||
206D6152000
|
trusted library section
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00A4C000
|
trusted library allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
1864000
|
heap
|
page read and write
|
||
7883000
|
heap
|
page read and write
|
||
73080027C000
|
trusted library allocation
|
page read and write
|
||
2C7C0084C000
|
trusted library allocation
|
page read and write
|
||
206D3A7E000
|
heap
|
page read and write
|
||
6ECEFFE000
|
unkown
|
page readonly
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C000A0000
|
trusted library allocation
|
page read and write
|
||
7A7F000
|
heap
|
page read and write
|
||
206D6060000
|
trusted library section
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
730800390000
|
trusted library allocation
|
page read and write
|
||
6EB37FC000
|
stack
|
page read and write
|
||
206CF19A000
|
heap
|
page read and write
|
||
6C0D1000
|
unkown
|
page execute read
|
||
2C7C001E4000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C001D4000
|
trusted library allocation
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
2C7C00EE0000
|
trusted library allocation
|
page read and write
|
||
730800320000
|
trusted library allocation
|
page read and write
|
||
73080025C000
|
trusted library allocation
|
page read and write
|
||
2C7C001E0000
|
trusted library allocation
|
page read and write
|
||
2C7C00060000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
2C7C008C4000
|
trusted library allocation
|
page read and write
|
||
2C7C00B1C000
|
trusted library allocation
|
page read and write
|
||
79EF000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206D6000000
|
trusted library section
|
page read and write
|
||
7758000
|
heap
|
page read and write
|
||
730800248000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
730800658000
|
trusted library allocation
|
page read and write
|
||
1C1F000
|
stack
|
page read and write
|
||
2C7C00A1C000
|
trusted library allocation
|
page read and write
|
||
2C7C001C4000
|
trusted library allocation
|
page read and write
|
||
2C7C00304000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
206CF6E2000
|
heap
|
page read and write
|
||
2C7C00C68000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
730800610000
|
trusted library allocation
|
page read and write
|
||
6EC1FFC000
|
stack
|
page read and write
|
||
206CF183000
|
heap
|
page read and write
|
||
6ED7FFE000
|
unkown
|
page readonly
|
||
2C7C009B8000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
6EC57FC000
|
stack
|
page read and write
|
||
46E000
|
unkown
|
page read and write
|
||
730800310000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
1304002EC000
|
direct allocation
|
page read and write
|
||
206CF17A000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
730800320000
|
trusted library allocation
|
page read and write
|
||
65E8002A0000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
2C7C00CB4000
|
trusted library allocation
|
page read and write
|
||
2C7C003A4000
|
trusted library allocation
|
page read and write
|
||
6C1F8000
|
unkown
|
page readonly
|
||
46E000
|
unkown
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF6F2000
|
heap
|
page read and write
|
||
6ECFFFE000
|
unkown
|
page readonly
|
||
130400215000
|
direct allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
6ED6FFE000
|
unkown
|
page readonly
|
||
130400230000
|
direct allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C005DC000
|
trusted library allocation
|
page read and write
|
||
206CBDF0000
|
trusted library section
|
page readonly
|
||
206CF16A000
|
heap
|
page read and write
|
||
2C7C003F2000
|
trusted library allocation
|
page read and write
|
||
206D6081000
|
trusted library section
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
7A2C000
|
heap
|
page read and write
|
||
206D5247000
|
unclassified section
|
page read and write
|
||
6EC77FC000
|
stack
|
page read and write
|
||
2C7C003F2000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
2C7C00298000
|
trusted library allocation
|
page read and write
|
||
6EC7FFE000
|
unkown
|
page readonly
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00A34000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF1A3000
|
heap
|
page read and write
|
||
206CF17A000
|
heap
|
page read and write
|
||
6ED77FC000
|
stack
|
page read and write
|
||
730800700000
|
trusted library allocation
|
page read and write
|
||
775D000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF711000
|
heap
|
page read and write
|
||
206CF171000
|
heap
|
page read and write
|
||
7308006FC000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF6E9000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
730800758000
|
trusted library allocation
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00B18000
|
trusted library allocation
|
page read and write
|
||
730800668000
|
trusted library allocation
|
page read and write
|
||
6EDA7FE000
|
stack
|
page read and write
|
||
7842000
|
heap
|
page read and write
|
||
206CBCF0000
|
heap
|
page readonly
|
||
2C7C00880000
|
trusted library allocation
|
page read and write
|
||
206D6093000
|
trusted library section
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
2C7C009A4000
|
trusted library allocation
|
page read and write
|
||
2C7C00E40000
|
trusted library allocation
|
page read and write
|
||
2C7C0076C000
|
trusted library allocation
|
page read and write
|
||
206CBBE5000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF6B2000
|
heap
|
page read and write
|
||
206D615D000
|
trusted library section
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
6C1F9000
|
unkown
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
130400234000
|
direct allocation
|
page read and write
|
||
730800374000
|
trusted library allocation
|
page read and write
|
||
2C7C00230000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
730800640000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
206CF190000
|
heap
|
page read and write
|
||
787C000
|
heap
|
page read and write
|
||
2C7C00488000
|
trusted library allocation
|
page read and write
|
||
206CF664000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF190000
|
heap
|
page read and write
|
||
6EB0FFE000
|
unkown
|
page readonly
|
||
775F000
|
heap
|
page read and write
|
||
798B000
|
heap
|
page read and write
|
||
77EB000
|
heap
|
page read and write
|
||
6EB17FD000
|
stack
|
page read and write
|
||
7308006AC000
|
trusted library allocation
|
page read and write
|
||
65E8002D8000
|
trusted library allocation
|
page read and write
|
||
18DA000
|
heap
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF164000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
65E800278000
|
trusted library allocation
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
2C7C00294000
|
trusted library allocation
|
page read and write
|
||
206CF641000
|
heap
|
page read and write
|
||
206CBD00000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
2C7C008F4000
|
trusted library allocation
|
page read and write
|
||
2C7C00EEC000
|
trusted library allocation
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
206CBBBC000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
2C7C00298000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
6ECD7FD000
|
stack
|
page read and write
|
||
2C7C00078000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C001B4000
|
trusted library allocation
|
page read and write
|
||
730800330000
|
trusted library allocation
|
page read and write
|
||
2C7C006A1000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C00310000
|
trusted library allocation
|
page read and write
|
||
206D6190000
|
trusted library section
|
page read and write
|
||
7753000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C0034C000
|
trusted library allocation
|
page read and write
|
||
6ED4FFE000
|
unkown
|
page readonly
|
||
143E000
|
stack
|
page read and write
|
||
65E800264000
|
trusted library allocation
|
page read and write
|
||
6EC27FC000
|
stack
|
page read and write
|
||
2C7C00538000
|
trusted library allocation
|
page read and write
|
||
6EB5FFE000
|
unkown
|
page readonly
|
||
730800380000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
46E000
|
unkown
|
page read and write
|
||
730800401000
|
trusted library allocation
|
page read and write
|
||
730800724000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
206CF16A000
|
heap
|
page read and write
|
||
2C7C00338000
|
trusted library allocation
|
page read and write
|
||
6ECA7FB000
|
stack
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
2C7C00228000
|
trusted library allocation
|
page read and write
|
||
730800288000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00601000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6ED47FE000
|
stack
|
page read and write
|
||
2C7C003FB000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
2C7C00E2C000
|
trusted library allocation
|
page read and write
|
||
206CBBE1000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF6FF000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
206CF188000
|
heap
|
page read and write
|
||
2C7C0061C000
|
trusted library allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
471000
|
unkown
|
page readonly
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206D53D3000
|
heap
|
page read and write
|
||
206CF6B4000
|
heap
|
page read and write
|
||
7308002B8000
|
trusted library allocation
|
page read and write
|
||
7308006D4000
|
trusted library allocation
|
page read and write
|
||
787E000
|
heap
|
page read and write
|
||
2C7C0067C000
|
trusted library allocation
|
page read and write
|
||
2C7C000DC000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
73080040C000
|
trusted library allocation
|
page read and write
|
||
7308007D0000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
6EAE7FE000
|
stack
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF186000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF1A1000
|
heap
|
page read and write
|
||
2C7C00E38000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00210000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
7370000
|
direct allocation
|
page execute and read and write
|
||
206CF713000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
2C7C00BAC000
|
trusted library allocation
|
page read and write
|
||
730800750000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00CE8000
|
trusted library allocation
|
page read and write
|
||
730800694000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF16C000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
775B000
|
heap
|
page read and write
|
||
730800310000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
46E000
|
unkown
|
page write copy
|
||
130400210000
|
direct allocation
|
page read and write
|
||
206CD9C3000
|
heap
|
page read and write
|
||
2C7C00294000
|
trusted library allocation
|
page read and write
|
||
6ED3FFE000
|
unkown
|
page readonly
|
||
2C7C0032C000
|
trusted library allocation
|
page read and write
|
||
130400260000
|
direct allocation
|
page read and write
|
||
2C7C00DC0000
|
trusted library allocation
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
2C7C00390000
|
trusted library allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
791A000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
730800754000
|
trusted library allocation
|
page read and write
|
||
2C7C00C68000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF689000
|
heap
|
page read and write
|
||
2C7C00708000
|
trusted library allocation
|
page read and write
|
||
2C7C001B4000
|
trusted library allocation
|
page read and write
|
||
73080033C000
|
trusted library allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
730800734000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00E1C000
|
trusted library allocation
|
page read and write
|
||
65E80020C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
1304002E4000
|
direct allocation
|
page read and write
|
||
2C7C00D70000
|
trusted library allocation
|
page read and write
|
||
206CF6B4000
|
heap
|
page read and write
|
||
775F000
|
heap
|
page read and write
|
||
78C4000
|
heap
|
page read and write
|
||
206D3A39000
|
heap
|
page read and write
|
||
6EB1FFE000
|
unkown
|
page readonly
|
||
206CF1A3000
|
heap
|
page read and write
|
||
2C7C00E80000
|
trusted library allocation
|
page read and write
|
||
2C7C00B30000
|
trusted library allocation
|
page read and write
|
||
73080078C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF6E2000
|
heap
|
page read and write
|
||
6EAFFFE000
|
unkown
|
page readonly
|
||
2C7C002B8000
|
trusted library allocation
|
page read and write
|
||
730800354000
|
trusted library allocation
|
page read and write
|
||
65E800274000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
2C7C00ED4000
|
trusted library allocation
|
page read and write
|
||
77FA000
|
heap
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
206CF170000
|
heap
|
page read and write
|
||
2C7C00F08000
|
trusted library allocation
|
page read and write
|
||
206D3444000
|
trusted library allocation
|
page read and write
|
||
6ECAFFE000
|
unkown
|
page readonly
|
||
78A5000
|
heap
|
page read and write
|
||
2B0A000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
2C7C00D44000
|
trusted library allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C0032C000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00504000
|
trusted library allocation
|
page read and write
|
||
783E000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
730800630000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
130400217000
|
direct allocation
|
page read and write
|
||
206CF6B6000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF1A1000
|
heap
|
page read and write
|
||
2C7C003ED000
|
trusted library allocation
|
page read and write
|
||
206CF194000
|
heap
|
page read and write
|
||
6EB9FFE000
|
unkown
|
page readonly
|
||
2C7C00550000
|
trusted library allocation
|
page read and write
|
||
206CF185000
|
heap
|
page read and write
|
||
65E8002C8000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
730800664000
|
trusted library allocation
|
page read and write
|
||
730800718000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
6EBB7FD000
|
stack
|
page read and write
|
||
2C7C00FAC000
|
trusted library allocation
|
page read and write
|
||
206CF1A1000
|
heap
|
page read and write
|
||
2C7C00D30000
|
trusted library allocation
|
page read and write
|
||
2C7C0022C000
|
trusted library allocation
|
page read and write
|
||
730800230000
|
trusted library allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
2C7C00C6C000
|
trusted library allocation
|
page read and write
|
||
2C7C00BF4000
|
trusted library allocation
|
page read and write
|
||
2C7C0073C000
|
trusted library allocation
|
page read and write
|
||
2C7C00B58000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
2C7C00D6C000
|
trusted library allocation
|
page read and write
|
||
2C7C00320000
|
trusted library allocation
|
page read and write
|
||
2C7C0015C000
|
trusted library allocation
|
page read and write
|
||
2C7C0000C000
|
trusted library allocation
|
page read and write
|
||
46E000
|
unkown
|
page write copy
|
||
2C7C002B4000
|
trusted library allocation
|
page read and write
|
||
2C7C001DC000
|
trusted library allocation
|
page read and write
|
||
2C7C00A0C000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
78A5000
|
heap
|
page read and write
|
||
2C7C009DC000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
7885000
|
heap
|
page read and write
|
||
2C7C00401000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
2C7C00D4C000
|
trusted library allocation
|
page read and write
|
||
130400284000
|
direct allocation
|
page read and write
|
||
1304002D0000
|
direct allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C00C8C000
|
trusted library allocation
|
page read and write
|
||
6EDAFFE000
|
unkown
|
page readonly
|
||
206CF6B4000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
65E8002C0000
|
trusted library allocation
|
page read and write
|
||
781A000
|
heap
|
page read and write
|
||
2C7C001D8000
|
trusted library allocation
|
page read and write
|
||
7812000
|
heap
|
page read and write
|
||
65E800220000
|
trusted library allocation
|
page read and write
|
||
2C7C00788000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
7901000
|
heap
|
page read and write
|
||
78E3000
|
heap
|
page read and write
|
||
2C7C008DC000
|
trusted library allocation
|
page read and write
|
||
2C7C00DE4000
|
trusted library allocation
|
page read and write
|
||
6ED9FFE000
|
unkown
|
page readonly
|
||
206CF16A000
|
heap
|
page read and write
|
||
2C7C00F40000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
730800210000
|
trusted library allocation
|
page read and write
|
||
2C7C00F4C000
|
trusted library allocation
|
page read and write
|
||
6EC4FFE000
|
unkown
|
page readonly
|
||
6ED5FFE000
|
unkown
|
page readonly
|
||
2C7C0055C000
|
trusted library allocation
|
page read and write
|
||
6EC67FA000
|
stack
|
page read and write
|
||
65E8002F0000
|
trusted library allocation
|
page read and write
|
||
18D3000
|
heap
|
page read and write
|
||
730800654000
|
trusted library allocation
|
page read and write
|
||
130400250000
|
direct allocation
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
107C000
|
stack
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
269D000
|
stack
|
page read and write
|
||
2C7C0006C000
|
trusted library allocation
|
page read and write
|
||
730800201000
|
trusted library allocation
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C003F2000
|
trusted library allocation
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
2C7C0071C000
|
trusted library allocation
|
page read and write
|
||
206CBD50000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00214000
|
trusted library allocation
|
page read and write
|
||
206CF171000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
7819000
|
heap
|
page read and write
|
||
6EC47FD000
|
stack
|
page read and write
|
||
6EB4FFE000
|
unkown
|
page readonly
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF72A000
|
heap
|
page read and write
|
||
206CF640000
|
heap
|
page read and write
|
||
2C7C00B50000
|
trusted library allocation
|
page read and write
|
||
2C7C003F2000
|
trusted library allocation
|
page read and write
|
||
2C7C00D7C000
|
trusted library allocation
|
page read and write
|
||
206D53E7000
|
unclassified section
|
page read and write
|
||
65E8002E4000
|
trusted library allocation
|
page read and write
|
||
2C7C00001000
|
trusted library allocation
|
page read and write
|
||
7651000
|
heap
|
page read and write
|
||
2C7C00DB8000
|
trusted library allocation
|
page read and write
|
||
2C7C003ED000
|
trusted library allocation
|
page read and write
|
||
206D6136000
|
trusted library section
|
page read and write
|
||
2C7C00910000
|
trusted library allocation
|
page read and write
|
||
206CF64B000
|
heap
|
page read and write
|
||
46E000
|
unkown
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00374000
|
trusted library allocation
|
page read and write
|
||
6EB87FE000
|
stack
|
page read and write
|
||
7753000
|
heap
|
page read and write
|
||
206CBB08000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
6ED87FE000
|
stack
|
page read and write
|
||
2C7C004A4000
|
trusted library allocation
|
page read and write
|
||
206D5CD0000
|
trusted library section
|
page read and write
|
||
787F000
|
heap
|
page read and write
|
||
2C7C00AC0000
|
trusted library allocation
|
page read and write
|
||
2C7C00338000
|
trusted library allocation
|
page read and write
|
||
2C7C00BA0000
|
trusted library allocation
|
page read and write
|
||
2C7C00CDC000
|
trusted library allocation
|
page read and write
|
||
6EC17FC000
|
stack
|
page read and write
|
||
2C7C00E70000
|
trusted library allocation
|
page read and write
|
||
206CF1A3000
|
heap
|
page read and write
|
||
2C7C00294000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
EA7000
|
heap
|
page read and write
|
||
206CF780000
|
trusted library section
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
6EC5FFE000
|
unkown
|
page readonly
|
||
6EC8FFE000
|
unkown
|
page readonly
|
||
206CF64B000
|
heap
|
page read and write
|
||
65E800260000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
18F8000
|
heap
|
page read and write
|
||
78B4000
|
heap
|
page read and write
|
||
2C7C0040C000
|
trusted library allocation
|
page read and write
|
||
2C7C00F48000
|
trusted library allocation
|
page read and write
|
||
7750000
|
heap
|
page read and write
|
||
206CF6B6000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00418000
|
trusted library allocation
|
page read and write
|
||
7308006EC000
|
trusted library allocation
|
page read and write
|
||
6EC0FFE000
|
unkown
|
page readonly
|
||
206D5320000
|
heap
|
page read and write
|
||
2C7C00C1D000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
6EBC7FA000
|
stack
|
page read and write
|
||
2C7C002FB000
|
trusted library allocation
|
page read and write
|
||
206CF646000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
7308006E4000
|
trusted library allocation
|
page read and write
|
||
788D000
|
heap
|
page read and write
|
||
206CBBC7000
|
heap
|
page read and write
|
||
6EAB7EF000
|
stack
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
65E800248000
|
trusted library allocation
|
page read and write
|
||
6EBAFFE000
|
unkown
|
page readonly
|
||
2C7C004A0000
|
trusted library allocation
|
page read and write
|
||
6ED27FE000
|
stack
|
page read and write
|
||
6ECDFFE000
|
unkown
|
page readonly
|
||
206CF17B000
|
heap
|
page read and write
|
||
78B3000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
730800320000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C0059C000
|
trusted library allocation
|
page read and write
|
||
791D000
|
heap
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
730800730000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
730800364000
|
trusted library allocation
|
page read and write
|
||
206CBBF3000
|
heap
|
page read and write
|
||
730800760000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
206CF170000
|
heap
|
page read and write
|
||
730800601000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
206CF173000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
65E8002BC000
|
trusted library allocation
|
page read and write
|
||
6C1FC000
|
unkown
|
page readonly
|
||
7753000
|
heap
|
page read and write
|
||
786A000
|
heap
|
page read and write
|
||
65E8002B0000
|
trusted library allocation
|
page read and write
|
||
2C7C005B0000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
7EC000
|
stack
|
page read and write
|
||
6ECCFFE000
|
unkown
|
page readonly
|
||
2C7C0001C000
|
trusted library allocation
|
page read and write
|
||
2C7C00428000
|
trusted library allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
130400201000
|
direct allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
2C7C00A40000
|
trusted library allocation
|
page read and write
|
||
2C7C00BDC000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00CB4000
|
trusted library allocation
|
page read and write
|
||
7308002E4000
|
trusted library allocation
|
page read and write
|
||
206CF189000
|
heap
|
page read and write
|
||
2C7C006C0000
|
trusted library allocation
|
page read and write
|
||
2C7C002F3000
|
trusted library allocation
|
page read and write
|
||
6EACFFE000
|
unkown
|
page readonly
|
||
730800714000
|
trusted library allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
7A84000
|
heap
|
page read and write
|
||
7308003EC000
|
trusted library allocation
|
page read and write
|
||
6ED8FFE000
|
unkown
|
page readonly
|
||
730800248000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
18DF000
|
heap
|
page read and write
|
||
2C7C00D60000
|
trusted library allocation
|
page read and write
|
||
206CF150000
|
heap
|
page read and write
|
||
7308006B4000
|
trusted library allocation
|
page read and write
|
||
6EB67FB000
|
stack
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C001F0000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
65E8002C0000
|
trusted library allocation
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
78DB000
|
heap
|
page read and write
|
||
6EC87FD000
|
stack
|
page read and write
|
||
2C7C00D98000
|
trusted library allocation
|
page read and write
|
||
6EBE7FE000
|
stack
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
76D2000
|
direct allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF6E2000
|
heap
|
page read and write
|
||
65E800270000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF16C000
|
heap
|
page read and write
|
||
7815000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
6EB8FFE000
|
unkown
|
page readonly
|
||
1870000
|
direct allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF184000
|
heap
|
page read and write
|
||
730800430000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
2C7C00D90000
|
trusted library allocation
|
page read and write
|
||
7308006D0000
|
trusted library allocation
|
page read and write
|
||
2C7C00EFC000
|
trusted library allocation
|
page read and write
|
||
730800644000
|
trusted library allocation
|
page read and write
|
||
6ECC7FE000
|
stack
|
page read and write
|
||
2C7C00EB0000
|
trusted library allocation
|
page read and write
|
||
7308006C4000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
2C7C00578000
|
trusted library allocation
|
page read and write
|
||
206CF6F7000
|
heap
|
page read and write
|
||
2C7C009D4000
|
trusted library allocation
|
page read and write
|
||
6EB77FC000
|
stack
|
page read and write
|
||
2C7C00FB8000
|
trusted library allocation
|
page read and write
|
||
7757000
|
heap
|
page read and write
|
||
2C7C00360000
|
trusted library allocation
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
7308002FC000
|
trusted library allocation
|
page read and write
|
||
1304002AC000
|
direct allocation
|
page read and write
|
||
2C7C00224000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
730800348000
|
trusted library allocation
|
page read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C001B4000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
1870000
|
direct allocation
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
65E800235000
|
trusted library allocation
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page readonly
|
||
65E8002F4000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
2C7C00540000
|
trusted library allocation
|
page read and write
|
||
206CF1A5000
|
heap
|
page read and write
|
||
206CF6F7000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
206CF6B6000
|
heap
|
page read and write
|
||
1304002DC000
|
direct allocation
|
page read and write
|
||
2C7C00801000
|
trusted library allocation
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
2C7C0008F000
|
trusted library allocation
|
page read and write
|
||
2C7C001AC000
|
trusted library allocation
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
65E8002C0000
|
trusted library allocation
|
page read and write
|
||
730800684000
|
trusted library allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
2C7C00AFC000
|
trusted library allocation
|
page read and write
|
||
2C7C00B74000
|
trusted library allocation
|
page read and write
|
||
2C7C003A4000
|
trusted library allocation
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
2C7C00690000
|
trusted library allocation
|
page read and write
|
||
2C7C00F18000
|
trusted library allocation
|
page read and write
|
||
46E000
|
unkown
|
page write copy
|
||
2C7C00C2C000
|
trusted library allocation
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
65E8002F8000
|
trusted library allocation
|
page read and write
|
||
6EBBFFE000
|
unkown
|
page readonly
|
||
2C7C0014C000
|
trusted library allocation
|
page read and write
|
||
791D000
|
heap
|
page read and write
|
||
2C7C00E58000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206CF16D000
|
heap
|
page read and write
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
206CF18B000
|
heap
|
page read and write
|
||
2C7C00F88000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
7931000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
6ED0FFE000
|
unkown
|
page readonly
|
||
206CF6F9000
|
heap
|
page read and write
|
||
206D5CEE000
|
trusted library section
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
206CBC10000
|
heap
|
page read and write
|
||
730800614000
|
trusted library allocation
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
7A09000
|
heap
|
page read and write
|
||
2C7C00B7C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF950000
|
trusted library section
|
page read and write
|
||
206CF188000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
7308007B4000
|
trusted library allocation
|
page read and write
|
||
65E8002A0000
|
trusted library allocation
|
page read and write
|
||
206CF713000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
206CF689000
|
heap
|
page read and write
|
||
206CF664000
|
heap
|
page read and write
|
||
206CBD60000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00CB4000
|
trusted library allocation
|
page read and write
|
||
206CF679000
|
heap
|
page read and write
|
||
1870000
|
direct allocation
|
page read and write
|
||
7308006E8000
|
trusted library allocation
|
page read and write
|
||
65E8002A0000
|
trusted library allocation
|
page read and write
|
||
2C7C00054000
|
trusted library allocation
|
page read and write
|
||
2C7C00920000
|
trusted library allocation
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
6EBDFFE000
|
unkown
|
page readonly
|
||
7ABD000
|
heap
|
page read and write
|
||
206CBB92000
|
heap
|
page read and write
|
||
7755000
|
heap
|
page read and write
|
||
73080069C000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
130400294000
|
direct allocation
|
page read and write
|
||
2C7C0020C000
|
trusted library allocation
|
page read and write
|
||
6ED67FB000
|
stack
|
page read and write
|
||
2C7C00CCC000
|
trusted library allocation
|
page read and write
|
||
13040020C000
|
direct allocation
|
page read and write
|
||
7308006CC000
|
trusted library allocation
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C00098000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
D5E000
|
stack
|
page read and write
|
||
206D61EE000
|
trusted library section
|
page read and write
|
||
2C7C00DA8000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
2C7C00C48000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
2C7C000FC000
|
trusted library allocation
|
page read and write
|
||
7839000
|
heap
|
page read and write
|
||
6EC97FC000
|
stack
|
page read and write
|
||
46E000
|
unkown
|
page write copy
|
||
7390000
|
direct allocation
|
page execute and read and write
|
||
730800354000
|
trusted library allocation
|
page read and write
|
||
7AE3000
|
heap
|
page read and write
|
||
7120000
|
direct allocation
|
page read and write
|
||
2C7C00C58000
|
trusted library allocation
|
page read and write
|
||
1969000
|
heap
|
page read and write
|
||
206CF6E6000
|
heap
|
page read and write
|
||
65E800201000
|
trusted library allocation
|
page read and write
|
||
2C7C00320000
|
trusted library allocation
|
page read and write
|
||
18F9000
|
heap
|
page read and write
|
||
6ED07FD000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2C7C00290000
|
trusted library allocation
|
page read and write
|
||
2C7C006F8000
|
trusted library allocation
|
page read and write
|
||
206D6011000
|
trusted library section
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
782B000
|
direct allocation
|
page read and write
|
||
78EB000
|
heap
|
page read and write
|
||
7308007CC000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
785B000
|
heap
|
page read and write
|
||
7B1000
|
unkown
|
page execute and write copy
|
||
1A1F000
|
stack
|
page read and write
|
||
2C7C00C2C000
|
trusted library allocation
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
206D53D0000
|
heap
|
page read and write
|
||
130400274000
|
direct allocation
|
page read and write
|
||
2C7C006CC000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
206CF18A000
|
heap
|
page read and write
|
||
2C7C00CA4000
|
trusted library allocation
|
page read and write
|
||
7759000
|
heap
|
page read and write
|
||
206CF16A000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page readonly
|
||
18F7000
|
heap
|
page read and write
|
||
130400220000
|
direct allocation
|
page read and write
|
||
6C1AF000
|
unkown
|
page readonly
|
||
6CA1000
|
heap
|
page read and write
|
||
775A000
|
heap
|
page read and write
|
||
6C0D0000
|
unkown
|
page readonly
|
||
6ED37FE000
|
stack
|
page read and write
|
||
206CF187000
|
heap
|
page read and write
|
||
6EB7FFE000
|
unkown
|
page readonly
|
||
65E800288000
|
trusted library allocation
|
page read and write
|
||
6ED57FD000
|
stack
|
page read and write
|
||
2C7C00D14000
|
trusted library allocation
|
page read and write
|
||
2C7C00C2C000
|
trusted library allocation
|
page read and write
|
||
730800250000
|
trusted library allocation
|
page read and write
|
||
2C7C00340000
|
trusted library allocation
|
page read and write
|
||
7755000
|
heap
|
page read and write
|
||
7753000
|
heap
|
page read and write
|
||
7758000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
2C7C00CBC000
|
trusted library allocation
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
6ED97FE000
|
stack
|
page read and write
|
||
73080075C000
|
trusted library allocation
|
page read and write
|
||
6EBEFFE000
|
unkown
|
page readonly
|
||
206CF17B000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
2C7C0063C000
|
trusted library allocation
|
page read and write
|
||
6EBD7FE000
|
stack
|
page read and write
|
||
206CBB00000
|
heap
|
page read and write
|
||
6C1AD000
|
unkown
|
page read and write
|
||
73080033C000
|
trusted library allocation
|
page read and write
|
||
2C7C003F8000
|
trusted library allocation
|
page read and write
|
||
7308002D4000
|
trusted library allocation
|
page read and write
|
||
7308002F4000
|
trusted library allocation
|
page read and write
|
||
13040023C000
|
direct allocation
|
page read and write
|
||
79CD000
|
heap
|
page read and write
|
||
2C7C00DD0000
|
trusted library allocation
|
page read and write
|
||
2C7C00E5E000
|
trusted library allocation
|
page read and write
|
||
206D6070000
|
trusted library section
|
page read and write
|
||
206CF17B000
|
heap
|
page read and write
|
||
7308002ED000
|
trusted library allocation
|
page read and write
|
||
2C7C005C8000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
2C7C00904000
|
trusted library allocation
|
page read and write
|
||
2C7C0058C000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
206CBBF9000
|
heap
|
page read and write
|
||
6CA1000
|
heap
|
page read and write
|
||
206CF179000
|
heap
|
page read and write
|
||
206CF181000
|
heap
|
page read and write
|
||
2C7C004EC000
|
trusted library allocation
|
page read and write
|
||
73080060C000
|
trusted library allocation
|
page read and write
|
There are 1268 hidden memdumps, click here to show them.