Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_5418449f-07a8-4027-96eb-d75d643799d7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1873.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Nov 24 12:33:34 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A58.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A98.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2316,i,660778272520788295,10458363181096637325,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1296
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://anglebug.com/7553rei
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
http://anglebug.com/6953hwJ
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
http://anglebug.com/5430;d
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5906;d
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
http://anglebug.com/6878;d
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://anglebug.com/6860k
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://anglebug.com/6439;d
|
unknown
|
||
http://anglebug.com/5007ernt
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultouch
|
unknown
|
||
https://anglebug.com/7714d
|
unknown
|
||
https://anglebug.com/7847d
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/5281f
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://chrome.google.com/webstore$
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://anglebug.com/8280er
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
http://anglebug.com/6048;d
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
172.217.21.36
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProgramId
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
FileId
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LongPathHash
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Name
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
OriginalFileName
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Publisher
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Version
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinFileVersion
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinaryType
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductName
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductVersion
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LinkDate
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinProductVersion
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageFullName
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Size
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Language
|
||
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
139E000
|
heap
|
page read and write
|
||
1F0836A4000
|
heap
|
page read and write
|
||
BD8002B0000
|
trusted library allocation
|
page read and write
|
||
1F08364C000
|
heap
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6233FFE000
|
unkown
|
page readonly
|
||
1F0818D3000
|
heap
|
page read and write
|
||
77F9000
|
direct allocation
|
page read and write
|
||
24007D8000
|
trusted library allocation
|
page read and write
|
||
7737000
|
heap
|
page read and write
|
||
1F08A1B0000
|
trusted library section
|
page read and write
|
||
2D1000
|
unkown
|
page execute read
|
||
6C71000
|
heap
|
page read and write
|
||
24005E4000
|
trusted library allocation
|
page read and write
|
||
48780024C000
|
direct allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
2400A0C000
|
trusted library allocation
|
page read and write
|
||
2400618000
|
trusted library allocation
|
page read and write
|
||
2400878000
|
trusted library allocation
|
page read and write
|
||
6C5E0000
|
unkown
|
page readonly
|
||
2D1000
|
unkown
|
page execute read
|
||
6C71000
|
heap
|
page read and write
|
||
24006D4000
|
trusted library allocation
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
2D1A000
|
stack
|
page read and write
|
||
BD800330000
|
trusted library allocation
|
page read and write
|
||
24001B4000
|
trusted library allocation
|
page read and write
|
||
1F087CB4000
|
heap
|
page read and write
|
||
1F082320000
|
unkown
|
page read and write
|
||
62237FE000
|
stack
|
page read and write
|
||
78B4000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400664000
|
trusted library allocation
|
page read and write
|
||
BD800320000
|
trusted library allocation
|
page read and write
|
||
2DA000
|
unkown
|
page readonly
|
||
2400F38000
|
trusted library allocation
|
page read and write
|
||
2400715000
|
trusted library allocation
|
page read and write
|
||
121CD000
|
heap
|
page read and write
|
||
121400235000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page write copy
|
||
2400370000
|
trusted library allocation
|
page read and write
|
||
7826000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2400F7C000
|
trusted library allocation
|
page read and write
|
||
2400B64000
|
trusted library allocation
|
page read and write
|
||
2400F6C000
|
trusted library allocation
|
page read and write
|
||
62267FD000
|
stack
|
page read and write
|
||
121400248000
|
trusted library allocation
|
page read and write
|
||
121400250000
|
trusted library allocation
|
page read and write
|
||
24006B0000
|
trusted library allocation
|
page read and write
|
||
2400CD4000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
heap
|
page read and write
|
||
7732000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F083698000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
24009A0000
|
trusted library allocation
|
page read and write
|
||
78AB000
|
heap
|
page read and write
|
||
BD800688000
|
trusted library allocation
|
page read and write
|
||
BD800220000
|
trusted library allocation
|
page read and write
|
||
1A31000
|
heap
|
page read and write
|
||
2400601000
|
trusted library allocation
|
page read and write
|
||
BD800720000
|
trusted library allocation
|
page read and write
|
||
BD8006B0000
|
trusted library allocation
|
page read and write
|
||
1F083672000
|
heap
|
page read and write
|
||
24008E0000
|
trusted library allocation
|
page read and write
|
||
1214002B0000
|
trusted library allocation
|
page read and write
|
||
621BFFE000
|
unkown
|
page readonly
|
||
2400C38000
|
trusted library allocation
|
page read and write
|
||
1F083637000
|
heap
|
page read and write
|
||
BD800668000
|
trusted library allocation
|
page read and write
|
||
621C7FB000
|
stack
|
page read and write
|
||
1214002BD000
|
trusted library allocation
|
page read and write
|
||
1F0835D0000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F083676000
|
heap
|
page read and write
|
||
1F0FDEA0000
|
heap
|
page readonly
|
||
1F089AF0000
|
trusted library section
|
page read and write
|
||
7731000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
62297FC000
|
stack
|
page read and write
|
||
77D8000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7737000
|
heap
|
page read and write
|
||
2400228000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400350000
|
trusted library allocation
|
page read and write
|
||
487800280000
|
direct allocation
|
page read and write
|
||
77F3000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
BD800714000
|
trusted library allocation
|
page read and write
|
||
BD800248000
|
trusted library allocation
|
page read and write
|
||
1F087CB4000
|
heap
|
page read and write
|
||
1F083613000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400762000
|
trusted library allocation
|
page read and write
|
||
2400DCC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6216FFE000
|
unkown
|
page readonly
|
||
2400BF8000
|
trusted library allocation
|
page read and write
|
||
2400F14000
|
trusted library allocation
|
page read and write
|
||
BD800664000
|
trusted library allocation
|
page read and write
|
||
7731000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1214002E4000
|
trusted library allocation
|
page read and write
|
||
2400EC7000
|
trusted library allocation
|
page read and write
|
||
2400304000
|
trusted library allocation
|
page read and write
|
||
2400B90000
|
trusted library allocation
|
page read and write
|
||
BD8002EC000
|
trusted library allocation
|
page read and write
|
||
2400330000
|
trusted library allocation
|
page read and write
|
||
79A9000
|
heap
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
24001D0000
|
trusted library allocation
|
page read and write
|
||
24007B4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
1F083666000
|
heap
|
page read and write
|
||
7868000
|
heap
|
page read and write
|
||
1F087ECE000
|
trusted library section
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
62227FD000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240080C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24001B4000
|
trusted library allocation
|
page read and write
|
||
2400F60000
|
trusted library allocation
|
page read and write
|
||
1F083601000
|
heap
|
page read and write
|
||
77C5000
|
heap
|
page read and write
|
||
24000F0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8007E0000
|
trusted library allocation
|
page read and write
|
||
62257FE000
|
stack
|
page read and write
|
||
2400AA4000
|
trusted library allocation
|
page read and write
|
||
6227FFE000
|
unkown
|
page readonly
|
||
2D80000
|
heap
|
page read and write
|
||
24008EC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
487800290000
|
direct allocation
|
page read and write
|
||
24003A0000
|
trusted library allocation
|
page read and write
|
||
2400C80000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
24009D8000
|
trusted library allocation
|
page read and write
|
||
621FFFE000
|
unkown
|
page readonly
|
||
240045B000
|
trusted library allocation
|
page read and write
|
||
622E7FD000
|
stack
|
page read and write
|
||
1F087C83000
|
heap
|
page read and write
|
||
2400C3C000
|
trusted library allocation
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
2400B98000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
623AFFE000
|
unkown
|
page readonly
|
||
2400D24000
|
trusted library allocation
|
page read and write
|
||
487800217000
|
direct allocation
|
page read and write
|
||
77E3000
|
heap
|
page read and write
|
||
240031C000
|
trusted library allocation
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
761000
|
unkown
|
page execute and write copy
|
||
2400B28000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2DA000
|
unkown
|
page readonly
|
||
FFC000
|
stack
|
page read and write
|
||
BD8002F0000
|
trusted library allocation
|
page read and write
|
||
6215FFE000
|
unkown
|
page readonly
|
||
78F7000
|
heap
|
page read and write
|
||
2400D7C000
|
trusted library allocation
|
page read and write
|
||
240017C000
|
trusted library allocation
|
page read and write
|
||
24008A8000
|
trusted library allocation
|
page read and write
|
||
BD800230000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C70C000
|
unkown
|
page readonly
|
||
1F08A090000
|
trusted library section
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
1F08363A000
|
heap
|
page read and write
|
||
1F08363E000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
622EFFD000
|
stack
|
page read and write
|
||
2400494000
|
trusted library allocation
|
page read and write
|
||
BD80039C000
|
trusted library allocation
|
page read and write
|
||
622F7FE000
|
unkown
|
page readonly
|
||
BD8007CC000
|
trusted library allocation
|
page read and write
|
||
2400FA0000
|
trusted library allocation
|
page read and write
|
||
1F08364C000
|
heap
|
page read and write
|
||
BD800648000
|
trusted library allocation
|
page read and write
|
||
BD8006F0000
|
trusted library allocation
|
page read and write
|
||
24006A4000
|
trusted library allocation
|
page read and write
|
||
240027C000
|
trusted library allocation
|
page read and write
|
||
2400460000
|
trusted library allocation
|
page read and write
|
||
1F0FDE90000
|
heap
|
page read and write
|
||
623FFFE000
|
unkown
|
page readonly
|
||
BD80060C000
|
trusted library allocation
|
page read and write
|
||
2400993000
|
trusted library allocation
|
page read and write
|
||
BD800788000
|
trusted library allocation
|
page read and write
|
||
121400201000
|
trusted library allocation
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
2400C90000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
19F8000
|
heap
|
page read and write
|
||
1F083927000
|
unclassified section
|
page read and write
|
||
2CDD000
|
stack
|
page read and write
|
||
2400DDC000
|
trusted library allocation
|
page read and write
|
||
BD800734000
|
trusted library allocation
|
page read and write
|
||
2400C5C000
|
trusted library allocation
|
page read and write
|
||
1214002F4000
|
trusted library allocation
|
page read and write
|
||
1F087CA5000
|
heap
|
page read and write
|
||
1A43000
|
heap
|
page read and write
|
||
2400B64000
|
trusted library allocation
|
page read and write
|
||
2400D48000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
2400BF8000
|
trusted library allocation
|
page read and write
|
||
1F0836CD000
|
heap
|
page read and write
|
||
1F083890000
|
trusted library section
|
page read and write
|
||
1214002A0000
|
trusted library allocation
|
page read and write
|
||
621DFFE000
|
unkown
|
page readonly
|
||
2400DDC000
|
trusted library allocation
|
page read and write
|
||
240020C000
|
trusted library allocation
|
page read and write
|
||
7A09000
|
heap
|
page read and write
|
||
BD800380000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F0836A6000
|
heap
|
page read and write
|
||
1F087F23000
|
trusted library section
|
page read and write
|
||
1A5C000
|
heap
|
page read and write
|
||
240035C000
|
trusted library allocation
|
page read and write
|
||
24006E1000
|
trusted library allocation
|
page read and write
|
||
121400260000
|
trusted library allocation
|
page read and write
|
||
BD8006EC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2401034000
|
trusted library allocation
|
page read and write
|
||
623DFFE000
|
unkown
|
page readonly
|
||
789F000
|
heap
|
page read and write
|
||
77FB000
|
direct allocation
|
page read and write
|
||
623BFFE000
|
unkown
|
page readonly
|
||
1F083611000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
621E7FA000
|
stack
|
page read and write
|
||
2400678000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800744000
|
trusted library allocation
|
page read and write
|
||
2400FAC000
|
trusted library allocation
|
page read and write
|
||
1F083088000
|
heap
|
page read and write
|
||
2400494000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8006FC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24008D8000
|
trusted library allocation
|
page read and write
|
||
24007C0000
|
trusted library allocation
|
page read and write
|
||
BD800620000
|
trusted library allocation
|
page read and write
|
||
BD800354000
|
trusted library allocation
|
page read and write
|
||
BD800201000
|
trusted library allocation
|
page read and write
|
||
7738000
|
heap
|
page read and write
|
||
24001AC000
|
trusted library allocation
|
page read and write
|
||
2400AF0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400290000
|
trusted library allocation
|
page read and write
|
||
2400A01000
|
trusted library allocation
|
page read and write
|
||
1214002C0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
62197FA000
|
stack
|
page read and write
|
||
24002A4000
|
trusted library allocation
|
page read and write
|
||
6C6BF000
|
unkown
|
page readonly
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2400AD8000
|
trusted library allocation
|
page read and write
|
||
24001EC000
|
trusted library allocation
|
page read and write
|
||
BD800368000
|
trusted library allocation
|
page read and write
|
||
BD80025C000
|
trusted library allocation
|
page read and write
|
||
2400D14000
|
trusted library allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute read
|
||
6C71000
|
heap
|
page read and write
|
||
621EFFE000
|
unkown
|
page readonly
|
||
2400DA4000
|
trusted library allocation
|
page read and write
|
||
1F08369E000
|
heap
|
page read and write
|
||
2400AAB000
|
trusted library allocation
|
page read and write
|
||
1F08A0A1000
|
trusted library section
|
page read and write
|
||
1F0FDF98000
|
heap
|
page read and write
|
||
1F089D10000
|
trusted library section
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
2400454000
|
trusted library allocation
|
page read and write
|
||
2400C78000
|
trusted library allocation
|
page read and write
|
||
62377FD000
|
stack
|
page read and write
|
||
773A000
|
heap
|
page read and write
|
||
2400BD4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F0836CD000
|
heap
|
page read and write
|
||
1A4A000
|
heap
|
page read and write
|
||
2400CA0000
|
trusted library allocation
|
page read and write
|
||
7531000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
2400921000
|
trusted library allocation
|
page read and write
|
||
2400380000
|
trusted library allocation
|
page read and write
|
||
BD8002DC000
|
trusted library allocation
|
page read and write
|
||
1F083090000
|
heap
|
page read and write
|
||
2401058000
|
trusted library allocation
|
page read and write
|
||
BD800401000
|
trusted library allocation
|
page read and write
|
||
BD800424000
|
trusted library allocation
|
page read and write
|
||
BD80020C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
121400288000
|
trusted library allocation
|
page read and write
|
||
240076C000
|
trusted library allocation
|
page read and write
|
||
2400128000
|
trusted library allocation
|
page read and write
|
||
BD800704000
|
trusted library allocation
|
page read and write
|
||
487800215000
|
direct allocation
|
page read and write
|
||
2400E7C000
|
trusted library allocation
|
page read and write
|
||
24001B4000
|
trusted library allocation
|
page read and write
|
||
2400EC4000
|
trusted library allocation
|
page read and write
|
||
487800201000
|
direct allocation
|
page read and write
|
||
759C000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
11AD6000
|
heap
|
page read and write
|
||
1F085680000
|
heap
|
page read and write
|
||
BD8006B8000
|
trusted library allocation
|
page read and write
|
||
1F08364C000
|
heap
|
page read and write
|
||
7736000
|
heap
|
page read and write
|
||
7731000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
77EC000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
2401030000
|
trusted library allocation
|
page read and write
|
||
2400A78000
|
trusted library allocation
|
page read and write
|
||
7811000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
2400634000
|
trusted library allocation
|
page read and write
|
||
2400FAC000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
2400E3C000
|
trusted library allocation
|
page read and write
|
||
240021C000
|
trusted library allocation
|
page read and write
|
||
2400E50000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8006C8000
|
trusted library allocation
|
page read and write
|
||
1F0836A4000
|
heap
|
page read and write
|
||
1F08A0B3000
|
trusted library section
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
623F7FE000
|
stack
|
page read and write
|
||
2400704000
|
trusted library allocation
|
page read and write
|
||
7893000
|
heap
|
page read and write
|
||
1F083641000
|
heap
|
page read and write
|
||
BD800724000
|
trusted library allocation
|
page read and write
|
||
24004C0000
|
trusted library allocation
|
page read and write
|
||
BD800364000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400CA0000
|
trusted library allocation
|
page read and write
|
||
2400FB8000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD80033C000
|
trusted library allocation
|
page read and write
|
||
4878002AC000
|
direct allocation
|
page read and write
|
||
BD800750000
|
trusted library allocation
|
page read and write
|
||
1F087CA8000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2DE000
|
unkown
|
page write copy
|
||
2400C4C000
|
trusted library allocation
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
24001C4000
|
trusted library allocation
|
page read and write
|
||
BD800390000
|
trusted library allocation
|
page read and write
|
||
2400E0F000
|
trusted library allocation
|
page read and write
|
||
2400838000
|
trusted library allocation
|
page read and write
|
||
BD800760000
|
trusted library allocation
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240045B000
|
trusted library allocation
|
page read and write
|
||
1F0FDFB8000
|
heap
|
page read and write
|
||
2400F1C000
|
trusted library allocation
|
page read and write
|
||
6219FFE000
|
unkown
|
page readonly
|
||
BD800770000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7330000
|
direct allocation
|
page execute and read and write
|
||
6C71000
|
heap
|
page read and write
|
||
487800303000
|
direct allocation
|
page read and write
|
||
2400FC8000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
6232FFE000
|
unkown
|
page readonly
|
||
783F000
|
heap
|
page read and write
|
||
2401001000
|
trusted library allocation
|
page read and write
|
||
2400F1C000
|
trusted library allocation
|
page read and write
|
||
6222FFE000
|
unkown
|
page readonly
|
||
1F08307F000
|
heap
|
page read and write
|
||
2400224000
|
trusted library allocation
|
page read and write
|
||
2400DA4000
|
trusted library allocation
|
page read and write
|
||
1F08A17D000
|
trusted library section
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400EF4000
|
trusted library allocation
|
page read and write
|
||
BD800210000
|
trusted library allocation
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
240093C000
|
trusted library allocation
|
page read and write
|
||
6239FFE000
|
unkown
|
page readonly
|
||
6C71000
|
heap
|
page read and write
|
||
6226FFB000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24001C8000
|
trusted library allocation
|
page read and write
|
||
BD8006D0000
|
trusted library allocation
|
page read and write
|
||
2400F3C000
|
trusted library allocation
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
2400F54000
|
trusted library allocation
|
page read and write
|
||
1F083618000
|
heap
|
page read and write
|
||
2400454000
|
trusted library allocation
|
page read and write
|
||
2400B08000
|
trusted library allocation
|
page read and write
|
||
7350000
|
direct allocation
|
page execute and read and write
|
||
2400AB4000
|
trusted library allocation
|
page read and write
|
||
24007A4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
1F083060000
|
heap
|
page read and write
|
||
2D1000
|
unkown
|
page execute read
|
||
2400A60000
|
trusted library allocation
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
62317FE000
|
stack
|
page read and write
|
||
BD8003EC000
|
trusted library allocation
|
page read and write
|
||
2400EC4000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7942000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800408000
|
trusted library allocation
|
page read and write
|
||
62187FB000
|
stack
|
page read and write
|
||
2400EA0000
|
trusted library allocation
|
page read and write
|
||
77D3000
|
heap
|
page read and write
|
||
1F087CB5000
|
heap
|
page read and write
|
||
2400020000
|
trusted library allocation
|
page read and write
|
||
24010A4000
|
trusted library allocation
|
page read and write
|
||
48780023C000
|
direct allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
6236FFE000
|
unkown
|
page readonly
|
||
2400B00000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F0836AD000
|
heap
|
page read and write
|
||
24002B0000
|
trusted library allocation
|
page read and write
|
||
BD8006B4000
|
trusted library allocation
|
page read and write
|
||
BD8006AC000
|
trusted library allocation
|
page read and write
|
||
BD800658000
|
trusted library allocation
|
page read and write
|
||
121400230000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
621CFFE000
|
unkown
|
page readonly
|
||
2DA000
|
unkown
|
page readonly
|
||
6C71000
|
heap
|
page read and write
|
||
2400F00000
|
trusted library allocation
|
page read and write
|
||
6C708000
|
unkown
|
page readonly
|
||
2400A30000
|
trusted library allocation
|
page read and write
|
||
1F0FE180000
|
heap
|
page read and write
|
||
1F083641000
|
heap
|
page read and write
|
||
1F083681000
|
heap
|
page read and write
|
||
7736000
|
heap
|
page read and write
|
||
62127FD000
|
unkown
|
page read and write
|
||
2400134000
|
trusted library allocation
|
page read and write
|
||
2400E9C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800320000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page write copy
|
||
2400711000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
4878002E4000
|
direct allocation
|
page read and write
|
||
6225FFE000
|
unkown
|
page readonly
|
||
240016C000
|
trusted library allocation
|
page read and write
|
||
77DD000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F083666000
|
heap
|
page read and write
|
||
1F083676000
|
heap
|
page read and write
|
||
2400218000
|
trusted library allocation
|
page read and write
|
||
2400DB8000
|
trusted library allocation
|
page read and write
|
||
2400778000
|
trusted library allocation
|
page read and write
|
||
BD80027C000
|
trusted library allocation
|
page read and write
|
||
240050C000
|
trusted library allocation
|
page read and write
|
||
1F0FE0D0000
|
trusted library allocation
|
page read and write
|
||
1F08A020000
|
trusted library section
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F0FE185000
|
heap
|
page read and write
|
||
2400684000
|
trusted library allocation
|
page read and write
|
||
24004B4000
|
trusted library allocation
|
page read and write
|
||
1F0855C7000
|
unclassified section
|
page read and write
|
||
7340000
|
direct allocation
|
page execute and read and write
|
||
6212FFE000
|
unkown
|
page readonly
|
||
7733000
|
heap
|
page read and write
|
||
1F0836B3000
|
heap
|
page read and write
|
||
622D7FC000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1A5C000
|
heap
|
page read and write
|
||
2400D00000
|
trusted library allocation
|
page read and write
|
||
BD80069C000
|
trusted library allocation
|
page read and write
|
||
6218FFE000
|
unkown
|
page readonly
|
||
24001D4000
|
trusted library allocation
|
page read and write
|
||
62337FE000
|
stack
|
page read and write
|
||
1F0836B3000
|
heap
|
page read and write
|
||
2400064000
|
trusted library allocation
|
page read and write
|
||
1F0836A6000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
7811000
|
heap
|
page read and write
|
||
2400298000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
2400350000
|
trusted library allocation
|
page read and write
|
||
7A8C000
|
heap
|
page read and write
|
||
2400F38000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
62287FC000
|
stack
|
page read and write
|
||
BD800644000
|
trusted library allocation
|
page read and write
|
||
2400788000
|
trusted library allocation
|
page read and write
|
||
BD800698000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400CB0000
|
trusted library allocation
|
page read and write
|
||
1214002C0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F08369E000
|
heap
|
page read and write
|
||
24004E8000
|
trusted library allocation
|
page read and write
|
||
1A37000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
621D7FC000
|
stack
|
page read and write
|
||
2E1000
|
unkown
|
page readonly
|
||
6C5E1000
|
unkown
|
page execute read
|
||
1F087C74000
|
heap
|
page read and write
|
||
1214002A0000
|
trusted library allocation
|
page read and write
|
||
BD800610000
|
trusted library allocation
|
page read and write
|
||
62357FD000
|
stack
|
page read and write
|
||
2400304000
|
trusted library allocation
|
page read and write
|
||
7733000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24001E0000
|
trusted library allocation
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
62137FE000
|
stack
|
page read and write
|
||
2400E28000
|
trusted library allocation
|
page read and write
|
||
2400FA8000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
487800234000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400CBC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
240018C000
|
trusted library allocation
|
page read and write
|
||
2DA000
|
unkown
|
page readonly
|
||
487800250000
|
direct allocation
|
page read and write
|
||
BD800601000
|
trusted library allocation
|
page read and write
|
||
2400220000
|
trusted library allocation
|
page read and write
|
||
2400D88000
|
trusted library allocation
|
page read and write
|
||
2400FAC000
|
trusted library allocation
|
page read and write
|
||
BD800430000
|
trusted library allocation
|
page read and write
|
||
62117EF000
|
stack
|
page read and write
|
||
62167FE000
|
stack
|
page read and write
|
||
2400E01000
|
trusted library allocation
|
page read and write
|
||
240051C000
|
trusted library allocation
|
page read and write
|
||
1F083678000
|
heap
|
page read and write
|
||
78C1000
|
heap
|
page read and write
|
||
623D7FC000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C6BD000
|
unkown
|
page read and write
|
||
2400DCC000
|
trusted library allocation
|
page read and write
|
||
24002F0000
|
trusted library allocation
|
page read and write
|
||
1F0FDF00000
|
heap
|
page read and write
|
||
19E7000
|
heap
|
page read and write
|
||
8190000
|
heap
|
page read and write
|
||
7848000
|
heap
|
page read and write
|
||
6240FFE000
|
unkown
|
page readonly
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
1F08361F000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
2400794000
|
trusted library allocation
|
page read and write
|
||
240072C000
|
trusted library allocation
|
page read and write
|
||
2400380000
|
trusted library allocation
|
page read and write
|
||
BD80035C000
|
trusted library allocation
|
page read and write
|
||
4878002A8000
|
direct allocation
|
page read and write
|
||
24003B0000
|
trusted library allocation
|
page read and write
|
||
6234FFE000
|
unkown
|
page readonly
|
||
24002B4000
|
trusted library allocation
|
page read and write
|
||
BD800248000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
2400B0A000
|
trusted library allocation
|
page read and write
|
||
623B7FE000
|
stack
|
page read and write
|
||
24002BC000
|
trusted library allocation
|
page read and write
|
||
6221FFE000
|
unkown
|
page readonly
|
||
BD8002EE000
|
trusted library allocation
|
page read and write
|
||
121400278000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
unkown
|
page read and write
|
||
487800294000
|
direct allocation
|
page read and write
|
||
2400194000
|
trusted library allocation
|
page read and write
|
||
77FD000
|
heap
|
page read and write
|
||
1F083090000
|
heap
|
page read and write
|
||
2400D30000
|
trusted library allocation
|
page read and write
|
||
310F000
|
unkown
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400304000
|
trusted library allocation
|
page read and write
|
||
BD8002F4000
|
trusted library allocation
|
page read and write
|
||
1F0FDFFE000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400494000
|
trusted library allocation
|
page read and write
|
||
1214002D8000
|
trusted library allocation
|
page read and write
|
||
1F0FDFD3000
|
heap
|
page read and write
|
||
2400A88000
|
trusted library allocation
|
page read and write
|
||
1F0FDFE0000
|
heap
|
page read and write
|
||
2DA000
|
unkown
|
page readonly
|
||
62277FE000
|
unkown
|
page readonly
|
||
1214002C0000
|
trusted library allocation
|
page read and write
|
||
1F0836D0000
|
trusted library section
|
page read and write
|
||
BD800288000
|
trusted library allocation
|
page read and write
|
||
789A000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6235FFE000
|
unkown
|
page readonly
|
||
3690000
|
direct allocation
|
page read and write
|
||
2400DCC000
|
trusted library allocation
|
page read and write
|
||
791D000
|
heap
|
page read and write
|
||
BD800640000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400310000
|
trusted library allocation
|
page read and write
|
||
1F083090000
|
heap
|
page read and write
|
||
623A7FE000
|
stack
|
page read and write
|
||
1A24000
|
heap
|
page read and write
|
||
BD8006C4000
|
trusted library allocation
|
page read and write
|
||
1F08A172000
|
trusted library section
|
page read and write
|
||
24005A8000
|
trusted library allocation
|
page read and write
|
||
BD800624000
|
trusted library allocation
|
page read and write
|
||
2400344000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
B50000
|
heap
|
page read and write
|
||
7898000
|
heap
|
page read and write
|
||
BD80078C000
|
trusted library allocation
|
page read and write
|
||
7A6A000
|
heap
|
page read and write
|
||
BD80040C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
4878002DC000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8007C8000
|
trusted library allocation
|
page read and write
|
||
BD800320000
|
trusted library allocation
|
page read and write
|
||
12140020C000
|
trusted library allocation
|
page read and write
|
||
62347FE000
|
stack
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
2400330000
|
trusted library allocation
|
page read and write
|
||
2400FB8000
|
trusted library allocation
|
page read and write
|
||
623CFFE000
|
unkown
|
page readonly
|
||
24001DC000
|
trusted library allocation
|
page read and write
|
||
2400001000
|
trusted library allocation
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
623E7FE000
|
stack
|
page read and write
|
||
2400470000
|
trusted library allocation
|
page read and write
|
||
1F089AFE000
|
trusted library section
|
page read and write
|
||
1F08308C000
|
heap
|
page read and write
|
||
2400F94000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
62177FD000
|
stack
|
page read and write
|
||
622A7FB000
|
stack
|
page read and write
|
||
487800284000
|
direct allocation
|
page read and write
|
||
2400D41000
|
trusted library allocation
|
page read and write
|
||
621F7FE000
|
stack
|
page read and write
|
||
BD8002C4000
|
trusted library allocation
|
page read and write
|
||
1F08361D000
|
heap
|
page read and write
|
||
622CFFE000
|
unkown
|
page readonly
|
||
2400A40000
|
trusted library allocation
|
page read and write
|
||
1F08A04E000
|
trusted library section
|
page read and write
|
||
1F083624000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
6224FFE000
|
unkown
|
page readonly
|
||
4878002EC000
|
direct allocation
|
page read and write
|
||
1F085597000
|
unclassified section
|
page read and write
|
||
BD800700000
|
trusted library allocation
|
page read and write
|
||
121400238000
|
trusted library allocation
|
page read and write
|
||
2400BB0000
|
trusted library allocation
|
page read and write
|
||
1F083636000
|
heap
|
page read and write
|
||
622C7FC000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2E1000
|
unkown
|
page readonly
|
||
2400214000
|
trusted library allocation
|
page read and write
|
||
7857000
|
heap
|
page read and write
|
||
2400908000
|
trusted library allocation
|
page read and write
|
||
2400DA0000
|
trusted library allocation
|
page read and write
|
||
78CD000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
62207FE000
|
stack
|
page read and write
|
||
622BFFE000
|
unkown
|
page readonly
|
||
31AF000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8006E8000
|
trusted library allocation
|
page read and write
|
||
24005D0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400C3C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800330000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
1F08362F000
|
heap
|
page read and write
|
||
1F0FDFF3000
|
heap
|
page read and write
|
||
7739000
|
heap
|
page read and write
|
||
6214FFE000
|
unkown
|
page readonly
|
||
BD800758000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1214002F0000
|
trusted library allocation
|
page read and write
|
||
48780026C000
|
direct allocation
|
page read and write
|
||
1214002C8000
|
trusted library allocation
|
page read and write
|
||
1F089AC7000
|
unclassified section
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2400DE8000
|
trusted library allocation
|
page read and write
|
||
24001E4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400298000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2400454000
|
trusted library allocation
|
page read and write
|
||
1F0836A0000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240029A000
|
trusted library allocation
|
page read and write
|
||
2400C2C000
|
trusted library allocation
|
page read and write
|
||
2400D90000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2400B74000
|
trusted library allocation
|
page read and write
|
||
2400080000
|
trusted library allocation
|
page read and write
|
||
2400454000
|
trusted library allocation
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
2E1000
|
unkown
|
page readonly
|
||
623EFFE000
|
unkown
|
page readonly
|
||
2400948000
|
trusted library allocation
|
page read and write
|
||
7737000
|
heap
|
page read and write
|
||
6217FFE000
|
unkown
|
page readonly
|
||
2400210000
|
trusted library allocation
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
62417FE000
|
stack
|
page read and write
|
||
7733000
|
heap
|
page read and write
|
||
BD800684000
|
trusted library allocation
|
page read and write
|
||
1F08366C000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400C6C000
|
trusted library allocation
|
page read and write
|
||
2E1000
|
unkown
|
page readonly
|
||
1F088660000
|
trusted library section
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400201000
|
trusted library allocation
|
page read and write
|
||
2400F7C000
|
trusted library allocation
|
page read and write
|
||
121400220000
|
trusted library allocation
|
page read and write
|
||
487800270000
|
direct allocation
|
page read and write
|
||
118CB000
|
heap
|
page read and write
|
||
1F083681000
|
heap
|
page read and write
|
||
787E000
|
heap
|
page read and write
|
||
1F0836A2000
|
heap
|
page read and write
|
||
1F087F8D000
|
trusted library section
|
page read and write
|
||
2400854000
|
trusted library allocation
|
page read and write
|
||
7739000
|
heap
|
page read and write
|
||
1F08307A000
|
heap
|
page read and write
|
||
6228FFE000
|
unkown
|
page readonly
|
||
2400A24000
|
trusted library allocation
|
page read and write
|
||
2400328000
|
trusted library allocation
|
page read and write
|
||
3690000
|
direct allocation
|
page read and write
|
||
2400C1C000
|
trusted library allocation
|
page read and write
|
||
62367FE000
|
stack
|
page read and write
|
||
1F083686000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800330000
|
trusted library allocation
|
page read and write
|
||
1A2D000
|
heap
|
page read and write
|
||
BD8006D4000
|
trusted library allocation
|
page read and write
|
||
6223FFE000
|
unkown
|
page readonly
|
||
622B7FA000
|
stack
|
page read and write
|
||
1F087E60000
|
heap
|
page read and write
|
||
2400F40000
|
trusted library allocation
|
page read and write
|
||
240096C000
|
trusted library allocation
|
page read and write
|
||
2400490000
|
trusted library allocation
|
page read and write
|
||
77E3000
|
heap
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
62217FE000
|
stack
|
page read and write
|
||
1F0836AD000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2400EAC000
|
trusted library allocation
|
page read and write
|
||
24000A8000
|
trusted library allocation
|
page read and write
|
||
2400074000
|
trusted library allocation
|
page read and write
|
||
1F08307F000
|
heap
|
page read and write
|
||
BD8007D0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1A5C000
|
heap
|
page read and write
|
||
2400494000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7738000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
BD800310000
|
trusted library allocation
|
page read and write
|
||
7986000
|
heap
|
page read and write
|
||
1F083077000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240092C000
|
trusted library allocation
|
page read and write
|
||
62157FE000
|
stack
|
page read and write
|
||
2400988000
|
trusted library allocation
|
page read and write
|
||
2400D3C000
|
trusted library allocation
|
page read and write
|
||
62387FE000
|
stack
|
page read and write
|
||
24008B0000
|
trusted library allocation
|
page read and write
|
||
240000C000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F088460000
|
trusted library section
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6A6F8000
|
direct allocation
|
page read and write
|
||
BD8007B4000
|
trusted library allocation
|
page read and write
|
||
BD800404000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400401000
|
trusted library allocation
|
page read and write
|
||
1214002A0000
|
trusted library allocation
|
page read and write
|
||
2400CE4000
|
trusted library allocation
|
page read and write
|
||
2400E44000
|
trusted library allocation
|
page read and write
|
||
487800230000
|
direct allocation
|
page read and write
|
||
24004B4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F0FDF0B000
|
heap
|
page read and write
|
||
780E000
|
heap
|
page read and write
|
||
1F083087000
|
heap
|
page read and write
|
||
78EB000
|
heap
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
6237FFE000
|
unkown
|
page readonly
|
||
24004A4000
|
trusted library allocation
|
page read and write
|
||
2400D50000
|
trusted library allocation
|
page read and write
|
||
783B000
|
heap
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
48780020C000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400344000
|
trusted library allocation
|
page read and write
|
||
BD800678000
|
trusted library allocation
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD80033C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400CF8000
|
trusted library allocation
|
page read and write
|
||
24000A0000
|
trusted library allocation
|
page read and write
|
||
24001E8000
|
trusted library allocation
|
page read and write
|
||
24002C0000
|
trusted library allocation
|
page read and write
|
||
240071C000
|
trusted library allocation
|
page read and write
|
||
2400380000
|
trusted library allocation
|
page read and write
|
||
BD8002B8000
|
trusted library allocation
|
page read and write
|
||
240008C000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
487800210000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
2400CCC000
|
trusted library allocation
|
page read and write
|
||
BD80080C000
|
trusted library allocation
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
1F0FDFF5000
|
heap
|
page read and write
|
||
1F0836A0000
|
heap
|
page read and write
|
||
1F087882000
|
trusted library allocation
|
page read and write
|
||
79C6000
|
heap
|
page read and write
|
||
2400D08000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
2400C01000
|
trusted library allocation
|
page read and write
|
||
BD800784000
|
trusted library allocation
|
page read and write
|
||
1F083083000
|
heap
|
page read and write
|
||
2400298000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400350000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
773B000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24009E0000
|
trusted library allocation
|
page read and write
|
||
2400750000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400230000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
78D5000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2400694000
|
trusted library allocation
|
page read and write
|
||
6241FFE000
|
unkown
|
page readonly
|
||
1F087EB0000
|
trusted library section
|
page read and write
|
||
BD800614000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24006EC000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page write copy
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
2400ACC000
|
trusted library allocation
|
page read and write
|
||
24001B4000
|
trusted library allocation
|
page read and write
|
||
2400C78000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7A38000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400CDC000
|
trusted library allocation
|
page read and write
|
||
78C0000
|
heap
|
page read and write
|
||
2400644000
|
trusted library allocation
|
page read and write
|
||
7969000
|
heap
|
page read and write
|
||
BD8006E0000
|
trusted library allocation
|
page read and write
|
||
2400D68000
|
trusted library allocation
|
page read and write
|
||
62147FE000
|
stack
|
page read and write
|
||
773C000
|
heap
|
page read and write
|
||
2400294000
|
trusted library allocation
|
page read and write
|
||
2400E28000
|
trusted library allocation
|
page read and write
|
||
787A000
|
heap
|
page read and write
|
||
1F08A080000
|
trusted library section
|
page read and write
|
||
2400F28000
|
trusted library allocation
|
page read and write
|
||
2400118000
|
trusted library allocation
|
page read and write
|
||
24005BC000
|
trusted library allocation
|
page read and write
|
||
77C4000
|
heap
|
page read and write
|
||
2400480000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
24001AC000
|
trusted library allocation
|
page read and write
|
||
1F083083000
|
heap
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
240045B000
|
trusted library allocation
|
page read and write
|
||
240001C000
|
trusted library allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute read
|
||
622FFFE000
|
unkown
|
page readonly
|
||
1F083613000
|
heap
|
page read and write
|
||
4878002D0000
|
direct allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400D29000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
1F08A031000
|
trusted library section
|
page read and write
|
||
24001A0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
773B000
|
heap
|
page read and write
|
||
1F087F82000
|
trusted library section
|
page read and write
|
||
62307FB000
|
stack
|
page read and write
|
||
2400EDC000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
BD800374000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
240020C000
|
trusted library allocation
|
page read and write
|
||
7843000
|
heap
|
page read and write
|
||
1F085610000
|
trusted library section
|
page read and write
|
||
2401030000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
240106C000
|
trusted library allocation
|
page read and write
|
||
240022C000
|
trusted library allocation
|
page read and write
|
||
7813000
|
heap
|
page read and write
|
||
1F083615000
|
heap
|
page read and write
|
||
787C000
|
heap
|
page read and write
|
||
789D000
|
heap
|
page read and write
|
||
240045B000
|
trusted library allocation
|
page read and write
|
||
62247FE000
|
stack
|
page read and write
|
||
622DFFE000
|
unkown
|
page readonly
|
||
2400DD8000
|
trusted library allocation
|
page read and write
|
||
1F08307A000
|
heap
|
page read and write
|
||
78B4000
|
heap
|
page read and write
|
||
2400801000
|
trusted library allocation
|
page read and write
|
||
24001D8000
|
trusted library allocation
|
page read and write
|
||
BD800630000
|
trusted library allocation
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
2400584000
|
trusted library allocation
|
page read and write
|
||
76A2000
|
direct allocation
|
page read and write
|
||
2401078000
|
trusted library allocation
|
page read and write
|
||
1214002A0000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page read and write
|
||
2400EB8000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400598000
|
trusted library allocation
|
page read and write
|
||
62407FE000
|
stack
|
page read and write
|
||
2400F8C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
621A7FE000
|
stack
|
page read and write
|
||
BD800320000
|
trusted library allocation
|
page read and write
|
||
2400894000
|
trusted library allocation
|
page read and write
|
||
1F083086000
|
heap
|
page read and write
|
||
240015C000
|
trusted library allocation
|
page read and write
|
||
623C7FA000
|
stack
|
page read and write
|
||
77F2000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6231FFE000
|
unkown
|
page readonly
|
||
2400E6C000
|
trusted library allocation
|
page read and write
|
||
773A000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page read and write
|
||
24004B8000
|
trusted library allocation
|
page read and write
|
||
240014C000
|
trusted library allocation
|
page read and write
|
||
240060C000
|
trusted library allocation
|
page read and write
|
||
1F083678000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6229FFE000
|
unkown
|
page readonly
|
||
FEF000
|
stack
|
page read and write
|
||
7A53000
|
heap
|
page read and write
|
||
1F0FDFD8000
|
heap
|
page read and write
|
||
2401088000
|
trusted library allocation
|
page read and write
|
||
1F085683000
|
heap
|
page read and write
|
||
24001F0000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
24006E6000
|
trusted library allocation
|
page read and write
|
||
1F0FDF94000
|
heap
|
page read and write
|
||
8B90000
|
heap
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
2400B7C000
|
trusted library allocation
|
page read and write
|
||
1F08A156000
|
trusted library section
|
page read and write
|
||
1214002B0000
|
trusted library allocation
|
page read and write
|
||
621AFFE000
|
unkown
|
page readonly
|
||
2E1000
|
unkown
|
page readonly
|
||
62397FE000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24010E0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
BD800368000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400DB0000
|
trusted library allocation
|
page read and write
|
||
1F0FE0E0000
|
trusted library allocation
|
page read and write
|
||
1F0FDFF5000
|
heap
|
page read and write
|
||
1F08307F000
|
heap
|
page read and write
|
||
1F0FDEE0000
|
heap
|
page read and write
|
||
24002A4000
|
trusted library allocation
|
page read and write
|
||
2400ED0000
|
trusted library allocation
|
page read and write
|
||
BD8002CC000
|
trusted library allocation
|
page read and write
|
||
1F083050000
|
heap
|
page read and write
|
||
2400044000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
121400274000
|
trusted library allocation
|
page read and write
|
||
62327FE000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
48780025C000
|
direct allocation
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
2DA000
|
unkown
|
page readonly
|
||
6C71000
|
heap
|
page read and write
|
||
11F3000
|
unkown
|
page execute and write copy
|
||
2400D24000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
2400300000
|
trusted library allocation
|
page read and write
|
||
1F083083000
|
heap
|
page read and write
|
||
1F0FDFFE000
|
heap
|
page read and write
|
||
24000D0000
|
trusted library allocation
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
24001F8000
|
trusted library allocation
|
page read and write
|
||
BD80035C000
|
trusted library allocation
|
page read and write
|
||
2400AC0000
|
trusted library allocation
|
page read and write
|
||
7857000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
773F000
|
heap
|
page read and write
|
||
2400C0C000
|
trusted library allocation
|
page read and write
|
||
621B7FB000
|
stack
|
page read and write
|
||
1F083087000
|
heap
|
page read and write
|
||
BD8006CC000
|
trusted library allocation
|
page read and write
|
||
2400494000
|
trusted library allocation
|
page read and write
|
||
2400EE8000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400678000
|
trusted library allocation
|
page read and write
|
||
BD800310000
|
trusted library allocation
|
page read and write
|
||
7874000
|
heap
|
page read and write
|
||
240005A000
|
trusted library allocation
|
page read and write
|
||
1214002C0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F087EC2000
|
trusted library section
|
page read and write
|
||
2400350000
|
trusted library allocation
|
page read and write
|
||
1F0FDFF3000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
487800220000
|
direct allocation
|
page read and write
|
||
6C709000
|
unkown
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1214002BC000
|
trusted library allocation
|
page read and write
|
||
BD80075C000
|
trusted library allocation
|
page read and write
|
||
121400270000
|
trusted library allocation
|
page read and write
|
||
1A37000
|
heap
|
page read and write
|
||
622AFFE000
|
unkown
|
page readonly
|
||
6C71000
|
heap
|
page read and write
|
||
1F08A042000
|
trusted library section
|
page read and write
|
||
78B8000
|
heap
|
page read and write
|
||
2400C78000
|
trusted library allocation
|
page read and write
|
||
BD800694000
|
trusted library allocation
|
page read and write
|
||
1F083698000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
1F087C89000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1214002F8000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
2400B1C000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
240040C000
|
trusted library allocation
|
page read and write
|
||
2400454000
|
trusted library allocation
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
2400368000
|
trusted library allocation
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
24001AC000
|
trusted library allocation
|
page read and write
|
||
24002F3000
|
trusted library allocation
|
page read and write
|
||
BD8006E4000
|
trusted library allocation
|
page read and write
|
||
24002F7000
|
trusted library allocation
|
page read and write
|
||
1214002C0000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400E0D000
|
trusted library allocation
|
page read and write
|
||
1F08366C000
|
heap
|
page read and write
|
||
BD800754000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
7736000
|
heap
|
page read and write
|
||
240033C000
|
trusted library allocation
|
page read and write
|
||
24002A4000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
121400264000
|
trusted library allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
6230FFE000
|
unkown
|
page readonly
|
||
3120000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800250000
|
trusted library allocation
|
page read and write
|
||
1F083672000
|
heap
|
page read and write
|
||
240104C000
|
trusted library allocation
|
page read and write
|
||
1F0FDEC0000
|
heap
|
page read and write
|
||
BD800354000
|
trusted library allocation
|
page read and write
|
||
2400C80000
|
trusted library allocation
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
24000E0000
|
trusted library allocation
|
page read and write
|
||
2E1000
|
unkown
|
page readonly
|
||
2400534000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
1F08368D000
|
heap
|
page read and write
|
||
2400F38000
|
trusted library allocation
|
page read and write
|
||
6238FFE000
|
unkown
|
page readonly
|
||
2400394000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
2400298000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
1F083300000
|
heap
|
page read and write
|
||
2400628000
|
trusted library allocation
|
page read and write
|
||
1F087C60000
|
heap
|
page read and write
|
||
121400294000
|
trusted library allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute read
|
||
BD800418000
|
trusted library allocation
|
page read and write
|
||
1F083641000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1F083580000
|
trusted library section
|
page read and write
|
||
1F087F66000
|
trusted library section
|
page read and write
|
||
240104C000
|
trusted library allocation
|
page read and write
|
||
7964000
|
heap
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800238000
|
trusted library allocation
|
page read and write
|
||
24002E0000
|
trusted library allocation
|
page read and write
|
||
2400E80000
|
trusted library allocation
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
2400FB8000
|
trusted library allocation
|
page read and write
|
||
2400E18000
|
trusted library allocation
|
page read and write
|
||
2400C4C000
|
trusted library allocation
|
page read and write
|
||
1F083150000
|
trusted library section
|
page readonly
|
||
240100C000
|
trusted library allocation
|
page read and write
|
||
7360000
|
direct allocation
|
page execute and read and write
|
||
1F0836A2000
|
heap
|
page read and write
|
||
2400E90000
|
trusted library allocation
|
page read and write
|
||
1F0818D0000
|
heap
|
page read and write
|
||
2400DDC000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD800348000
|
trusted library allocation
|
page read and write
|
||
24001F4000
|
trusted library allocation
|
page read and write
|
||
1F083646000
|
heap
|
page read and write
|
||
1F089D1E000
|
trusted library section
|
page read and write
|
||
7631000
|
heap
|
page read and write
|
||
BD800730000
|
trusted library allocation
|
page read and write
|
||
1A2C000
|
heap
|
page read and write
|
||
1F085580000
|
trusted library allocation
|
page read and write
|
||
6220FFE000
|
unkown
|
page readonly
|
||
24010D8000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
BD8002FC000
|
trusted library allocation
|
page read and write
|
||
24009BC000
|
trusted library allocation
|
page read and write
|
There are 1158 hidden memdumps, click here to show them.