Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_8294a158-742f-49f7-a480-8988f128a410\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D6B.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Nov 25 09:41:31 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FCD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER826E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2276,i,7761635936261596126,5114517660047510357,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1756
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
https://www.youtube.com/:
|
unknown
|
||
https://mail.google.com/mail/
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=
|
unknown
|
||
https://mail.google.com/mail/:
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://www.google.com/tools/feedback/chrome/__submit
|
unknown
|
||
https://www.youtube.com/?feature=ytcap
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
https://mail.google.com/mail/J
|
unknown
|
||
https://www.youtube.com/Q
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://chrome.google.com/webstore206E5
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icofrom_play_api
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b(T
|
unknown
|
||
https://www.youtube.com/s/notifications/manifest/cr_install.html
|
unknown
|
||
https://ch.search.yahoo.com/search
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://www.youtube.com/J
|
unknown
|
||
https://docs.google.com/forms/u/0/create?usp=chrome_actions
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://www.google.com/chrome/tips/gs
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs(T
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://fvtekk5pn.top/v1/upload.php
|
34.116.198.130
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/2J
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://www.google.com/CharPk3
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://www.google.com/
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
https://docs.google.com/document/
|
unknown
|
||
http://google.com/
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://drive.google.com/~
|
unknown
|
||
https://mail.google.com/mail/installwebapp?usp=chrome_default
|
unknown
|
||
https://www.ecosia.org/search?q=
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://docs.google.com/document/installwebapp?usp=chrome_default
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://drive-daily-3.corp.googl
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_default
|
unknown
|
||
https://docs.google.com/spreadsheets/J
|
unknown
|
||
https://docs.google.com/presentation/?usp=installed_webapplt
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b
|
unknown
|
||
https://docs.google.com/spreadsheets/?usp=installed_webapp
|
unknown
|
||
https://drive-staging.corp.google.com/
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
|
unknown
|
||
https://docs.google.com/spreadsheets/:
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7ACF000
|
heap
|
page read and write
|
||
5DEC002F0000
|
trusted library allocation
|
page read and write
|
||
25DD24CA000
|
heap
|
page read and write
|
||
285400868000
|
trusted library allocation
|
page read and write
|
||
285400523000
|
trusted library allocation
|
page read and write
|
||
7B97000
|
heap
|
page read and write
|
||
5FC008A8000
|
trusted library allocation
|
page read and write
|
||
7B11000
|
heap
|
page read and write
|
||
AAE1BFD000
|
stack
|
page read and write
|
||
7962000
|
heap
|
page read and write
|
||
2854000FC000
|
trusted library allocation
|
page read and write
|
||
28540077E000
|
trusted library allocation
|
page read and write
|
||
5FC00788000
|
trusted library allocation
|
page read and write
|
||
5DEC002B0000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
108C000
|
stack
|
page read and write
|
||
285400B9C000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
25DD254F000
|
heap
|
page read and write
|
||
285400E20000
|
trusted library allocation
|
page read and write
|
||
25DD2469000
|
heap
|
page read and write
|
||
28540074C000
|
trusted library allocation
|
page read and write
|
||
285400988000
|
trusted library allocation
|
page read and write
|
||
5FC00960000
|
trusted library allocation
|
page read and write
|
||
5FC008C4000
|
trusted library allocation
|
page read and write
|
||
5FC008F0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC007E4000
|
trusted library allocation
|
page read and write
|
||
796A000
|
heap
|
page read and write
|
||
2854009C0000
|
trusted library allocation
|
page read and write
|
||
AACE3FE000
|
unkown
|
page readonly
|
||
154800234000
|
direct allocation
|
page read and write
|
||
285400D58000
|
trusted library allocation
|
page read and write
|
||
AACEBFE000
|
stack
|
page read and write
|
||
25DD62B0000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
285400CE0000
|
trusted library allocation
|
page read and write
|
||
5DEC00260000
|
trusted library allocation
|
page read and write
|
||
AAD9BFE000
|
stack
|
page read and write
|
||
285400210000
|
trusted library allocation
|
page read and write
|
||
796F000
|
heap
|
page read and write
|
||
AAD2BFB000
|
stack
|
page read and write
|
||
285400EF0000
|
trusted library allocation
|
page read and write
|
||
285400DB4000
|
trusted library allocation
|
page read and write
|
||
25DCED50000
|
heap
|
page read and write
|
||
7965000
|
heap
|
page read and write
|
||
5DEC002B0000
|
trusted library allocation
|
page read and write
|
||
5FC00728000
|
trusted library allocation
|
page read and write
|
||
7A0C000
|
heap
|
page read and write
|
||
25DCED55000
|
heap
|
page read and write
|
||
AAD63FE000
|
unkown
|
page readonly
|
||
1714000
|
heap
|
page read and write
|
||
25DCEB4D000
|
heap
|
page read and write
|
||
25DD8460000
|
trusted library section
|
page read and write
|
||
25DD62E8000
|
heap
|
page read and write
|
||
5FC002E4000
|
trusted library allocation
|
page read and write
|
||
AAEBBFD000
|
stack
|
page read and write
|
||
AAECBFE000
|
stack
|
page read and write
|
||
27DF000
|
unkown
|
page read and write
|
||
25DCEB62000
|
heap
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
AAF7BFE000
|
stack
|
page read and write
|
||
285400C64000
|
trusted library allocation
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
5FC008C8000
|
trusted library allocation
|
page read and write
|
||
7967000
|
heap
|
page read and write
|
||
5FC002FC000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
25DCE9D0000
|
heap
|
page read and write
|
||
B41000
|
unkown
|
page readonly
|
||
25DD24B1000
|
heap
|
page read and write
|
||
25DD2471000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
285400D60000
|
trusted library allocation
|
page read and write
|
||
5FC007D0000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
5FC008E4000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
25DD2551000
|
heap
|
page read and write
|
||
AACF3FE000
|
unkown
|
page readonly
|
||
25DCEA9E000
|
heap
|
page read and write
|
||
285400918000
|
trusted library allocation
|
page read and write
|
||
7AB2000
|
heap
|
page read and write
|
||
AAF53FE000
|
unkown
|
page readonly
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
285400374000
|
trusted library allocation
|
page read and write
|
||
285400320000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
28540070F000
|
trusted library allocation
|
page read and write
|
||
25DD2553000
|
heap
|
page read and write
|
||
25DD2460000
|
heap
|
page read and write
|
||
285400801000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
7A23000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400968000
|
trusted library allocation
|
page read and write
|
||
285400EEC000
|
trusted library allocation
|
page read and write
|
||
285400B14000
|
trusted library allocation
|
page read and write
|
||
285400BA4000
|
trusted library allocation
|
page read and write
|
||
25DD2526000
|
heap
|
page read and write
|
||
25DD66D7000
|
unclassified section
|
page read and write
|
||
285400A0C000
|
trusted library allocation
|
page read and write
|
||
285400360000
|
trusted library allocation
|
page read and write
|
||
AADBBFE000
|
stack
|
page read and write
|
||
2854000E0000
|
trusted library allocation
|
page read and write
|
||
285400AA0000
|
trusted library allocation
|
page read and write
|
||
5FC0080C000
|
trusted library allocation
|
page read and write
|
||
285400180000
|
trusted library allocation
|
page read and write
|
||
AAE0BFE000
|
stack
|
page read and write
|
||
5FC002F4000
|
trusted library allocation
|
page read and write
|
||
285400218000
|
trusted library allocation
|
page read and write
|
||
25DD1F40000
|
heap
|
page read and write
|
||
5DEC002C0000
|
trusted library allocation
|
page read and write
|
||
154800215000
|
direct allocation
|
page read and write
|
||
5FC00864000
|
trusted library allocation
|
page read and write
|
||
285400494000
|
trusted library allocation
|
page read and write
|
||
25DD249F000
|
heap
|
page read and write
|
||
AAED3FE000
|
unkown
|
page readonly
|
||
28540060C000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
5FC00430000
|
trusted library allocation
|
page read and write
|
||
5FC002D4000
|
trusted library allocation
|
page read and write
|
||
25DD8950000
|
trusted library section
|
page read and write
|
||
2854006BC000
|
trusted library allocation
|
page read and write
|
||
285400B64000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
AAE13FE000
|
unkown
|
page readonly
|
||
2854002F8000
|
trusted library allocation
|
page read and write
|
||
285400AF8000
|
trusted library allocation
|
page read and write
|
||
AAF2BFE000
|
stack
|
page read and write
|
||
25DCE990000
|
heap
|
page readonly
|
||
285400D94000
|
trusted library allocation
|
page read and write
|
||
285400C8C000
|
trusted library allocation
|
page read and write
|
||
2854000AC000
|
trusted library allocation
|
page read and write
|
||
28540090C000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
5FC0071C000
|
trusted library allocation
|
page read and write
|
||
5DEC00201000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
2854004F8000
|
trusted library allocation
|
page read and write
|
||
AAD4BFB000
|
stack
|
page read and write
|
||
2854004E4000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
25DCEB2E000
|
heap
|
page read and write
|
||
285400B24000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
AADDBFE000
|
stack
|
page read and write
|
||
285400994000
|
trusted library allocation
|
page read and write
|
||
AAEABFE000
|
stack
|
page read and write
|
||
25DD62F4000
|
heap
|
page read and write
|
||
25DD2461000
|
heap
|
page read and write
|
||
285400624000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
25DD1F7C000
|
heap
|
page read and write
|
||
25DD1F75000
|
heap
|
page read and write
|
||
25DD24FA000
|
heap
|
page read and write
|
||
AAE93FE000
|
unkown
|
page readonly
|
||
285400703000
|
trusted library allocation
|
page read and write
|
||
5FC0060C000
|
trusted library allocation
|
page read and write
|
||
5FC006AC000
|
trusted library allocation
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
2854005B4000
|
trusted library allocation
|
page read and write
|
||
5DEC002B0000
|
trusted library allocation
|
page read and write
|
||
25DD8B5E000
|
trusted library section
|
page read and write
|
||
5FC0040C000
|
trusted library allocation
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
AAEEBFD000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1548002DC000
|
direct allocation
|
page read and write
|
||
285400401000
|
trusted library allocation
|
page read and write
|
||
25DD254B000
|
heap
|
page read and write
|
||
2854008BC000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
3B20000
|
direct allocation
|
page execute and read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
5FC00424000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
B41000
|
unkown
|
page readonly
|
||
1C80000
|
direct allocation
|
page read and write
|
||
7CA3000
|
heap
|
page read and write
|
||
5DEC002A0000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
25DD62BB000
|
heap
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
285400C9C000
|
trusted library allocation
|
page read and write
|
||
285400768000
|
trusted library allocation
|
page read and write
|
||
15480024C000
|
direct allocation
|
page read and write
|
||
AAEB3FE000
|
unkown
|
page readonly
|
||
7ABD000
|
heap
|
page read and write
|
||
2854002D2000
|
trusted library allocation
|
page read and write
|
||
5DEC00220000
|
trusted library allocation
|
page read and write
|
||
7B04000
|
heap
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
25DD1F7D000
|
heap
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
285400082000
|
trusted library allocation
|
page read and write
|
||
796E000
|
heap
|
page read and write
|
||
5FC00918000
|
trusted library allocation
|
page read and write
|
||
25DD8B50000
|
trusted library section
|
page read and write
|
||
2854004BC000
|
trusted library allocation
|
page read and write
|
||
285400D48000
|
trusted library allocation
|
page read and write
|
||
AAEE3FE000
|
unkown
|
page readonly
|
||
285400C3C000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
25DD1F74000
|
heap
|
page read and write
|
||
25DD895E000
|
trusted library section
|
page read and write
|
||
2854004B4000
|
trusted library allocation
|
page read and write
|
||
5FC00828000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
285400201000
|
trusted library allocation
|
page read and write
|
||
28540020C000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
25DD2518000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
7ABF000
|
heap
|
page read and write
|
||
5FC00601000
|
trusted library allocation
|
page read and write
|
||
1548002A8000
|
direct allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
7961000
|
heap
|
page read and write
|
||
25DD1F6F000
|
heap
|
page read and write
|
||
5FC00860000
|
trusted library allocation
|
page read and write
|
||
285400E50000
|
trusted library allocation
|
page read and write
|
||
25DD1F6A000
|
heap
|
page read and write
|
||
285400DBC000
|
trusted library allocation
|
page read and write
|
||
154800270000
|
direct allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
2854002AC000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
25DD24CA000
|
heap
|
page read and write
|
||
285400144000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
6C308000
|
unkown
|
page readonly
|
||
6ED1000
|
heap
|
page read and write
|
||
25DCEA30000
|
trusted library section
|
page readonly
|
||
285400314000
|
trusted library allocation
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
796E000
|
heap
|
page read and write
|
||
5FC006AC000
|
trusted library allocation
|
page read and write
|
||
AAD33FE000
|
unkown
|
page readonly
|
||
285400050000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
285400A6C000
|
trusted library allocation
|
page read and write
|
||
285400C34000
|
trusted library allocation
|
page read and write
|
||
25DCEA00000
|
trusted library allocation
|
page read and write
|
||
AAE3BFC000
|
stack
|
page read and write
|
||
AAD0BFE000
|
stack
|
page read and write
|
||
154800217000
|
direct allocation
|
page read and write
|
||
5FC008D8000
|
trusted library allocation
|
page read and write
|
||
5FC00250000
|
trusted library allocation
|
page read and write
|
||
25DD7FB3000
|
heap
|
page read and write
|
||
AAEDBFE000
|
stack
|
page read and write
|
||
5FC00248000
|
trusted library allocation
|
page read and write
|
||
285400EE0000
|
trusted library allocation
|
page read and write
|
||
AAF93FE000
|
unkown
|
page readonly
|
||
25DD255B000
|
heap
|
page read and write
|
||
25DD2559000
|
heap
|
page read and write
|
||
AAFABFE000
|
stack
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
AAD5BFC000
|
stack
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
5FC007BC000
|
trusted library allocation
|
page read and write
|
||
25DCE9F0000
|
trusted library allocation
|
page read and write
|
||
3B30000
|
direct allocation
|
page execute and read and write
|
||
285400BF0000
|
trusted library allocation
|
page read and write
|
||
7B2B000
|
heap
|
page read and write
|
||
1548002D0000
|
direct allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
285400C9C000
|
trusted library allocation
|
page read and write
|
||
285400C0C000
|
trusted library allocation
|
page read and write
|
||
5FC00868000
|
trusted library allocation
|
page read and write
|
||
5FC00974000
|
trusted library allocation
|
page read and write
|
||
5DEC0020C000
|
trusted library allocation
|
page read and write
|
||
285400A50000
|
trusted library allocation
|
page read and write
|
||
285400544000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
154800220000
|
direct allocation
|
page read and write
|
||
5FC00220000
|
trusted library allocation
|
page read and write
|
||
285400C60000
|
trusted library allocation
|
page read and write
|
||
2854004C0000
|
trusted library allocation
|
page read and write
|
||
2854009E0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC002F0000
|
trusted library allocation
|
page read and write
|
||
AAF5BFA000
|
stack
|
page read and write
|
||
285400CFC000
|
trusted library allocation
|
page read and write
|
||
2854002C0000
|
trusted library allocation
|
page read and write
|
||
7B5B000
|
heap
|
page read and write
|
||
5DEC002E4000
|
trusted library allocation
|
page read and write
|
||
5FC00238000
|
trusted library allocation
|
page read and write
|
||
2854005A0000
|
trusted library allocation
|
page read and write
|
||
AAE8BFC000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
25DD1F6A000
|
heap
|
page read and write
|
||
2854002AC000
|
trusted library allocation
|
page read and write
|
||
AACBBFE000
|
unkown
|
page read and write
|
||
B41000
|
unkown
|
page readonly
|
||
154800290000
|
direct allocation
|
page read and write
|
||
285400DD4000
|
trusted library allocation
|
page read and write
|
||
2854002AC000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
E8C000
|
stack
|
page read and write
|
||
AAF63FE000
|
unkown
|
page readonly
|
||
AAD13FE000
|
unkown
|
page readonly
|
||
5DEC00235000
|
trusted library allocation
|
page read and write
|
||
5FC00840000
|
trusted library allocation
|
page read and write
|
||
25DD8040000
|
heap
|
page read and write
|
||
25DD2469000
|
heap
|
page read and write
|
||
5FC0078C000
|
trusted library allocation
|
page read and write
|
||
7969000
|
heap
|
page read and write
|
||
7C5A000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
7B23000
|
heap
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
2854006D0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400E1C000
|
trusted library allocation
|
page read and write
|
||
5FC0082C000
|
trusted library allocation
|
page read and write
|
||
5FC0039C000
|
trusted library allocation
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
5FC006BC000
|
trusted library allocation
|
page read and write
|
||
28540069C000
|
trusted library allocation
|
page read and write
|
||
7961000
|
heap
|
page read and write
|
||
AAE9BFE000
|
stack
|
page read and write
|
||
28540024C000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
28540070C000
|
trusted library allocation
|
page read and write
|
||
7861000
|
heap
|
page read and write
|
||
285400700000
|
trusted library allocation
|
page read and write
|
||
7AED000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7A2D000
|
heap
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
5DEC00278000
|
trusted library allocation
|
page read and write
|
||
7B8D000
|
heap
|
page read and write
|
||
7350000
|
direct allocation
|
page read and write
|
||
285400A44000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
AAF8BFE000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
7C79000
|
heap
|
page read and write
|
||
2854004B7000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
unkown
|
page write copy
|
||
285400214000
|
trusted library allocation
|
page read and write
|
||
285400220000
|
trusted library allocation
|
page read and write
|
||
285400EA4000
|
trusted library allocation
|
page read and write
|
||
5FC002B0000
|
trusted library allocation
|
page read and write
|
||
25DD26F0000
|
trusted library section
|
page read and write
|
||
5FC00904000
|
trusted library allocation
|
page read and write
|
||
7969000
|
heap
|
page read and write
|
||
AAF23FE000
|
unkown
|
page readonly
|
||
AAEFBFD000
|
stack
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
2854001B0000
|
trusted library allocation
|
page read and write
|
||
285400AB8000
|
trusted library allocation
|
page read and write
|
||
285400E10000
|
trusted library allocation
|
page read and write
|
||
5FC007AC000
|
trusted library allocation
|
page read and write
|
||
285F000
|
stack
|
page read and write
|
||
285400C7C000
|
trusted library allocation
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
25DD0713000
|
heap
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
1548002E4000
|
direct allocation
|
page read and write
|
||
2854002B0000
|
trusted library allocation
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
285400E60000
|
trusted library allocation
|
page read and write
|
||
285400D04000
|
trusted library allocation
|
page read and write
|
||
154800260000
|
direct allocation
|
page read and write
|
||
285400C01000
|
trusted library allocation
|
page read and write
|
||
285400308000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
5FC00818000
|
trusted library allocation
|
page read and write
|
||
2854002BC000
|
trusted library allocation
|
page read and write
|
||
285400B88000
|
trusted library allocation
|
page read and write
|
||
285400384000
|
trusted library allocation
|
page read and write
|
||
7B4F000
|
heap
|
page read and write
|
||
5FC00288000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
1548002EC000
|
direct allocation
|
page read and write
|
||
285400248000
|
trusted library allocation
|
page read and write
|
||
5DEC002F8000
|
trusted library allocation
|
page read and write
|
||
2854008A4000
|
trusted library allocation
|
page read and write
|
||
285400E0C000
|
trusted library allocation
|
page read and write
|
||
25DD24A6000
|
heap
|
page read and write
|
||
25DD8877000
|
unclassified section
|
page read and write
|
||
5FC0095C000
|
trusted library allocation
|
page read and write
|
||
AADC3FE000
|
unkown
|
page readonly
|
||
AAE43FE000
|
unkown
|
page readonly
|
||
7962000
|
heap
|
page read and write
|
||
154800280000
|
direct allocation
|
page read and write
|
||
6C1E0000
|
unkown
|
page readonly
|
||
285400A01000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
25DD1F77000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
25DD1F82000
|
heap
|
page read and write
|
||
5FC00850000
|
trusted library allocation
|
page read and write
|
||
28540040C000
|
trusted library allocation
|
page read and write
|
||
285400D30000
|
trusted library allocation
|
page read and write
|
||
AAD6BFD000
|
stack
|
page read and write
|
||
285400B64000
|
trusted library allocation
|
page read and write
|
||
28540022C000
|
trusted library allocation
|
page read and write
|
||
25DCEB2A000
|
heap
|
page read and write
|
||
AACC3FE000
|
unkown
|
page readonly
|
||
5FC008F4000
|
trusted library allocation
|
page read and write
|
||
5FC00830000
|
trusted library allocation
|
page read and write
|
||
AAE4BFC000
|
stack
|
page read and write
|
||
2854009EC000
|
trusted library allocation
|
page read and write
|
||
7A91000
|
heap
|
page read and write
|
||
285400D6C000
|
trusted library allocation
|
page read and write
|
||
25DD2557000
|
heap
|
page read and write
|
||
7A02000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
28540075D000
|
trusted library allocation
|
page read and write
|
||
285400AE8000
|
trusted library allocation
|
page read and write
|
||
7CDA000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400EBC000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC008B8000
|
trusted library allocation
|
page read and write
|
||
25DD24CF000
|
heap
|
page read and write
|
||
285400CC4000
|
trusted library allocation
|
page read and write
|
||
285400BBC000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
2854005C8000
|
trusted library allocation
|
page read and write
|
||
154800201000
|
direct allocation
|
page read and write
|
||
2854002B0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
796E000
|
heap
|
page read and write
|
||
AAD7BFB000
|
stack
|
page read and write
|
||
5FC00884000
|
trusted library allocation
|
page read and write
|
||
AAEC3FE000
|
unkown
|
page readonly
|
||
5DEC002C0000
|
trusted library allocation
|
page read and write
|
||
AAD1BFB000
|
stack
|
page read and write
|
||
285400AD0000
|
trusted library allocation
|
page read and write
|
||
7BF4000
|
heap
|
page read and write
|
||
5DEC002C0000
|
trusted library allocation
|
page read and write
|
||
7969000
|
heap
|
page read and write
|
||
79F8000
|
heap
|
page read and write
|
||
7C39000
|
heap
|
page read and write
|
||
5FC00898000
|
trusted library allocation
|
page read and write
|
||
7963000
|
heap
|
page read and write
|
||
285400854000
|
trusted library allocation
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7A59000
|
direct allocation
|
page read and write
|
||
285400CA4000
|
trusted library allocation
|
page read and write
|
||
2854001F0000
|
trusted library allocation
|
page read and write
|
||
285400320000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7962000
|
heap
|
page read and write
|
||
5FC00700000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7A8B000
|
heap
|
page read and write
|
||
285400898000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
28540071C000
|
trusted library allocation
|
page read and write
|
||
25DD251C000
|
heap
|
page read and write
|
||
285400D14000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400784000
|
trusted library allocation
|
page read and write
|
||
2854001E0000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
2854007B4000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
5DEC00274000
|
trusted library allocation
|
page read and write
|
||
7ADD000
|
heap
|
page read and write
|
||
B3E000
|
unkown
|
page write copy
|
||
B41000
|
unkown
|
page readonly
|
||
AAD03FE000
|
unkown
|
page readonly
|
||
7B26000
|
heap
|
page read and write
|
||
285400888000
|
trusted library allocation
|
page read and write
|
||
6C2BD000
|
unkown
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
25DD1F81000
|
heap
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
7AB3000
|
heap
|
page read and write
|
||
285400938000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
25DD1F6F000
|
heap
|
page read and write
|
||
28540010C000
|
trusted library allocation
|
page read and write
|
||
2854001D0000
|
trusted library allocation
|
page read and write
|
||
5FC006AC000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5DEC002A0000
|
trusted library allocation
|
page read and write
|
||
7963000
|
heap
|
page read and write
|
||
5FC0027C000
|
trusted library allocation
|
page read and write
|
||
AAD23FE000
|
unkown
|
page readonly
|
||
AAF1BFE000
|
stack
|
page read and write
|
||
5DEC002C0000
|
trusted library allocation
|
page read and write
|
||
285400900000
|
trusted library allocation
|
page read and write
|
||
285400298000
|
trusted library allocation
|
page read and write
|
||
25DD7FB0000
|
heap
|
page read and write
|
||
AAE7BFE000
|
stack
|
page read and write
|
||
285400E98000
|
trusted library allocation
|
page read and write
|
||
25DD1F74000
|
heap
|
page read and write
|
||
2854001C4000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400EF4000
|
trusted library allocation
|
page read and write
|
||
2854008D4000
|
trusted library allocation
|
page read and write
|
||
285400E01000
|
trusted library allocation
|
page read and write
|
||
7A3C000
|
heap
|
page read and write
|
||
285400170000
|
trusted library allocation
|
page read and write
|
||
5FC0084C000
|
trusted library allocation
|
page read and write
|
||
5FC002ED000
|
trusted library allocation
|
page read and write
|
||
285400714000
|
trusted library allocation
|
page read and write
|
||
7AE5000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
5FC00848000
|
trusted library allocation
|
page read and write
|
||
285400384000
|
trusted library allocation
|
page read and write
|
||
28540014C000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
2854002AC000
|
trusted library allocation
|
page read and write
|
||
285400CD0000
|
trusted library allocation
|
page read and write
|
||
AADFBFE000
|
stack
|
page read and write
|
||
5FC006C8000
|
trusted library allocation
|
page read and write
|
||
285400CD0000
|
trusted library allocation
|
page read and write
|
||
25DD62E1000
|
heap
|
page read and write
|
||
5DEC00248000
|
trusted library allocation
|
page read and write
|
||
5FC0081C000
|
trusted library allocation
|
page read and write
|
||
5FC00230000
|
trusted library allocation
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
AAE73FE000
|
unkown
|
page readonly
|
||
AACABF5000
|
stack
|
page read and write
|
||
5FC00880000
|
trusted library allocation
|
page read and write
|
||
28540064C000
|
trusted library allocation
|
page read and write
|
||
154800303000
|
direct allocation
|
page read and write
|
||
5DEC00230000
|
trusted library allocation
|
page read and write
|
||
5FC0020C000
|
trusted library allocation
|
page read and write
|
||
285400A90000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
154800294000
|
direct allocation
|
page read and write
|
||
5FC00874000
|
trusted library allocation
|
page read and write
|
||
2854004C8000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
25DD2509000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
25DD24DE000
|
heap
|
page read and write
|
||
25DD8660000
|
trusted library section
|
page read and write
|
||
25DD62C2000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC00948000
|
trusted library allocation
|
page read and write
|
||
5FC00920000
|
trusted library allocation
|
page read and write
|
||
AADB3FE000
|
unkown
|
page readonly
|
||
5FC006E8000
|
trusted library allocation
|
page read and write
|
||
7969000
|
heap
|
page read and write
|
||
25DD2518000
|
heap
|
page read and write
|
||
285400368000
|
trusted library allocation
|
page read and write
|
||
5FC007C0000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page readonly
|
||
AAF6BFC000
|
stack
|
page read and write
|
||
25DD2560000
|
trusted library section
|
page read and write
|
||
25DCED10000
|
heap
|
page read and write
|
||
285400E34000
|
trusted library allocation
|
page read and write
|
||
25DD6331000
|
heap
|
page read and write
|
||
5FC0079C000
|
trusted library allocation
|
page read and write
|
||
7A28000
|
heap
|
page read and write
|
||
7A72000
|
heap
|
page read and write
|
||
5FC006E8000
|
trusted library allocation
|
page read and write
|
||
7BCF000
|
heap
|
page read and write
|
||
2854006F0000
|
trusted library allocation
|
page read and write
|
||
285400718000
|
trusted library allocation
|
page read and write
|
||
2854000A0000
|
trusted library allocation
|
page read and write
|
||
6C2BF000
|
unkown
|
page readonly
|
||
6ED1000
|
heap
|
page read and write
|
||
AAF9BFE000
|
stack
|
page read and write
|
||
5FC00790000
|
trusted library allocation
|
page read and write
|
||
5DEC002D8000
|
trusted library allocation
|
page read and write
|
||
6C309000
|
unkown
|
page read and write
|
||
285400CF0000
|
trusted library allocation
|
page read and write
|
||
285400303000
|
trusted library allocation
|
page read and write
|
||
5DEC002F4000
|
trusted library allocation
|
page read and write
|
||
2854002CC000
|
trusted library allocation
|
page read and write
|
||
5FC00890000
|
trusted library allocation
|
page read and write
|
||
7A99000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC0085C000
|
trusted library allocation
|
page read and write
|
||
5FC00894000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
1714000
|
heap
|
page read and write
|
||
154800230000
|
direct allocation
|
page read and write
|
||
285400E64000
|
trusted library allocation
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
28540023C000
|
trusted library allocation
|
page read and write
|
||
154800274000
|
direct allocation
|
page read and write
|
||
285400CB4000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
285400041000
|
trusted library allocation
|
page read and write
|
||
AAF33FE000
|
unkown
|
page readonly
|
||
25DD7FC7000
|
unclassified section
|
page read and write
|
||
5FC00844000
|
trusted library allocation
|
page read and write
|
||
28540021C000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
7B16000
|
heap
|
page read and write
|
||
2854003B8000
|
trusted library allocation
|
page read and write
|
||
AACCBFF000
|
stack
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
AAFA3FE000
|
unkown
|
page readonly
|
||
285400308000
|
trusted library allocation
|
page read and write
|
||
25DD2543000
|
heap
|
page read and write
|
||
AACDBFE000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
79FB000
|
heap
|
page read and write
|
||
25DD24DC000
|
heap
|
page read and write
|
||
5FC007E0000
|
trusted library allocation
|
page read and write
|
||
5DEC002C0000
|
trusted library allocation
|
page read and write
|
||
AAD73FE000
|
unkown
|
page readonly
|
||
5FC008E8000
|
trusted library allocation
|
page read and write
|
||
5FC007A0000
|
trusted library allocation
|
page read and write
|
||
5FC00778000
|
trusted library allocation
|
page read and write
|
||
285400BF0000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
285400DF0000
|
trusted library allocation
|
page read and write
|
||
25DD252A000
|
heap
|
page read and write
|
||
28540068C000
|
trusted library allocation
|
page read and write
|
||
AAF13FE000
|
unkown
|
page readonly
|
||
285400CD0000
|
trusted library allocation
|
page read and write
|
||
2854006E0000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
25DCEB4A000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
285400001000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
AAE03FE000
|
unkown
|
page readonly
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
285400C40000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
7A5C000
|
heap
|
page read and write
|
||
B41000
|
unkown
|
page readonly
|
||
285400190000
|
trusted library allocation
|
page read and write
|
||
285400394000
|
trusted library allocation
|
page read and write
|
||
2854002D8000
|
trusted library allocation
|
page read and write
|
||
25DD1F7F000
|
heap
|
page read and write
|
||
5FC006F4000
|
trusted library allocation
|
page read and write
|
||
796C000
|
heap
|
page read and write
|
||
AAEF3FE000
|
unkown
|
page readonly
|
||
25DD24D7000
|
heap
|
page read and write
|
||
28540071C000
|
trusted library allocation
|
page read and write
|
||
5FC007D4000
|
trusted library allocation
|
page read and write
|
||
2854001A0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7965000
|
heap
|
page read and write
|
||
2854004A0000
|
trusted library allocation
|
page read and write
|
||
285400DA4000
|
trusted library allocation
|
page read and write
|
||
5FC00878000
|
trusted library allocation
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
285400EF8000
|
trusted library allocation
|
page read and write
|
||
148D000
|
unkown
|
page execute and write copy
|
||
5FC006D4000
|
trusted library allocation
|
page read and write
|
||
AADE3FE000
|
unkown
|
page readonly
|
||
23FA000
|
stack
|
page read and write
|
||
285400EB0000
|
trusted library allocation
|
page read and write
|
||
7A93000
|
heap
|
page read and write
|
||
25DD1F50000
|
heap
|
page read and write
|
||
79FF000
|
heap
|
page read and write
|
||
7A2D000
|
heap
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
5DEC002C8000
|
trusted library allocation
|
page read and write
|
||
AAF0BFE000
|
stack
|
page read and write
|
||
AADA3FE000
|
unkown
|
page readonly
|
||
2854004BC000
|
trusted library allocation
|
page read and write
|
||
285400238000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
25DD62C5000
|
heap
|
page read and write
|
||
28540052C000
|
trusted library allocation
|
page read and write
|
||
AAFB3FE000
|
unkown
|
page readonly
|
||
285400E8C000
|
trusted library allocation
|
page read and write
|
||
5DEC002A0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC0070C000
|
trusted library allocation
|
page read and write
|
||
285400828000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
25DD250C000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC00964000
|
trusted library allocation
|
page read and write
|
||
2854007A4000
|
trusted library allocation
|
page read and write
|
||
2854001B8000
|
trusted library allocation
|
page read and write
|
||
2854008CC000
|
trusted library allocation
|
page read and write
|
||
285400030000
|
trusted library allocation
|
page read and write
|
||
5DEC00288000
|
trusted library allocation
|
page read and write
|
||
1548002AC000
|
direct allocation
|
page read and write
|
||
25DCE9A0000
|
heap
|
page read and write
|
||
285400BAC000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
285400E8C000
|
trusted library allocation
|
page read and write
|
||
285400334000
|
trusted library allocation
|
page read and write
|
||
285400D0C000
|
trusted library allocation
|
page read and write
|
||
5DEC00250000
|
trusted library allocation
|
page read and write
|
||
7968000
|
heap
|
page read and write
|
||
28540051C000
|
trusted library allocation
|
page read and write
|
||
AAD8BFE000
|
stack
|
page read and write
|
||
285400250000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400234000
|
trusted library allocation
|
page read and write
|
||
7967000
|
heap
|
page read and write
|
||
2854002B4000
|
trusted library allocation
|
page read and write
|
||
7B5D000
|
heap
|
page read and write
|
||
285400314000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
2854007E0000
|
trusted library allocation
|
page read and write
|
||
285400DE4000
|
trusted library allocation
|
page read and write
|
||
7A77000
|
heap
|
page read and write
|
||
285400601000
|
trusted library allocation
|
page read and write
|
||
28540003C000
|
trusted library allocation
|
page read and write
|
||
285400DC8000
|
trusted library allocation
|
page read and write
|
||
154800250000
|
direct allocation
|
page read and write
|
||
2854001F4000
|
trusted library allocation
|
page read and write
|
||
285400D78000
|
trusted library allocation
|
page read and write
|
||
7A48000
|
heap
|
page read and write
|
||
285400454000
|
trusted library allocation
|
page read and write
|
||
AAD83FE000
|
unkown
|
page readonly
|
||
285400590000
|
trusted library allocation
|
page read and write
|
||
154800210000
|
direct allocation
|
page read and write
|
||
25DCEB50000
|
heap
|
page read and write
|
||
796A000
|
heap
|
page read and write
|
||
285400334000
|
trusted library allocation
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
6ED1000
|
heap
|
page read and write
|
||
AAE5BFC000
|
stack
|
page read and write
|
||
7A5B000
|
direct allocation
|
page read and write
|
||
2854009D8000
|
trusted library allocation
|
page read and write
|
||
285400712000
|
trusted library allocation
|
page read and write
|
||
AAF4BFE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
285400E44000
|
trusted library allocation
|
page read and write
|
||
AAD53FE000
|
unkown
|
page readonly
|
||
285400AB4000
|
trusted library allocation
|
page read and write
|
||
28540073C000
|
trusted library allocation
|
page read and write
|
||
5FC0091C000
|
trusted library allocation
|
page read and write
|
||
5FC00210000
|
trusted library allocation
|
page read and write
|
||
AAE2BFA000
|
stack
|
page read and write
|
||
25DD8867000
|
unclassified section
|
page read and write
|
||
AADEBFE000
|
stack
|
page read and write
|
||
285400158000
|
trusted library allocation
|
page read and write
|
||
285400AC4000
|
trusted library allocation
|
page read and write
|
||
285400658000
|
trusted library allocation
|
page read and write
|
||
285400224000
|
trusted library allocation
|
page read and write
|
||
285400240000
|
trusted library allocation
|
page read and write
|
||
285400C54000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
AAF73FE000
|
unkown
|
page readonly
|
||
25DCEB6D000
|
heap
|
page read and write
|
||
5FC006C8000
|
trusted library allocation
|
page read and write
|
||
AADCBFA000
|
stack
|
page read and write
|
||
5FC006F0000
|
trusted library allocation
|
page read and write
|
||
5FC00408000
|
trusted library allocation
|
page read and write
|
||
2854000C4000
|
trusted library allocation
|
page read and write
|
||
25DD250D000
|
heap
|
page read and write
|
||
2854001EC000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute and write copy
|
||
7966000
|
heap
|
page read and write
|
||
285400C8C000
|
trusted library allocation
|
page read and write
|
||
285400454000
|
trusted library allocation
|
page read and write
|
||
2854002CC000
|
trusted library allocation
|
page read and write
|
||
285400638000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
2854000D7000
|
trusted library allocation
|
page read and write
|
||
28540008C000
|
trusted library allocation
|
page read and write
|
||
AAE83FE000
|
unkown
|
page readonly
|
||
285400E10000
|
trusted library allocation
|
page read and write
|
||
AAE63FE000
|
unkown
|
page readonly
|
||
285400354000
|
trusted library allocation
|
page read and write
|
||
AAE23FE000
|
unkown
|
page readonly
|
||
6ED1000
|
heap
|
page read and write
|
||
285400ADC000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
7A9E000
|
heap
|
page read and write
|
||
2854002AC000
|
trusted library allocation
|
page read and write
|
||
7A52000
|
heap
|
page read and write
|
||
5FC00201000
|
trusted library allocation
|
page read and write
|
||
AADD3FE000
|
unkown
|
page readonly
|
||
AAF43FE000
|
unkown
|
page readonly
|
||
6ED1000
|
heap
|
page read and write
|
||
2854001D0000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
25DCEA80000
|
heap
|
page read and write
|
||
AADABFE000
|
stack
|
page read and write
|
||
5DEC002BC000
|
trusted library allocation
|
page read and write
|
||
285400144000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
7A3B000
|
heap
|
page read and write
|
||
7C12000
|
heap
|
page read and write
|
||
285400C88000
|
trusted library allocation
|
page read and write
|
||
25DCEA88000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
5DEC00264000
|
trusted library allocation
|
page read and write
|
||
285400D4D000
|
trusted library allocation
|
page read and write
|
||
AAE33FE000
|
unkown
|
page readonly
|
||
AAD43FE000
|
unkown
|
page readonly
|
||
5DEC00294000
|
trusted library allocation
|
page read and write
|
||
277E000
|
unkown
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5FC00248000
|
trusted library allocation
|
page read and write
|
||
2854002C0000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7A6F000
|
heap
|
page read and write
|
||
7AA8000
|
heap
|
page read and write
|
||
6C30C000
|
unkown
|
page readonly
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7902000
|
direct allocation
|
page read and write
|
||
25DD2534000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
AAF83FE000
|
unkown
|
page readonly
|
||
15480023C000
|
direct allocation
|
page read and write
|
||
B3A000
|
unkown
|
page readonly
|
||
B3E000
|
unkown
|
page write copy
|
||
5FC00418000
|
trusted library allocation
|
page read and write
|
||
5FC006E0000
|
trusted library allocation
|
page read and write
|
||
25DCEB17000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
285400B74000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400958000
|
trusted library allocation
|
page read and write
|
||
28540020C000
|
trusted library allocation
|
page read and write
|
||
285400308000
|
trusted library allocation
|
page read and write
|
||
6C1E1000
|
unkown
|
page execute read
|
||
5FC002CC000
|
trusted library allocation
|
page read and write
|
||
7A93000
|
heap
|
page read and write
|
||
AAD3BFE000
|
stack
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
796D000
|
heap
|
page read and write
|
||
5FC008EC000
|
trusted library allocation
|
page read and write
|
||
AAE53FE000
|
unkown
|
page readonly
|
||
285400348000
|
trusted library allocation
|
page read and write
|
||
25DD1F81000
|
heap
|
page read and write
|
||
AADF3FE000
|
unkown
|
page readonly
|
||
285400244000
|
trusted library allocation
|
page read and write
|
||
25DD2555000
|
heap
|
page read and write
|
||
5DEC00270000
|
trusted library allocation
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
285400B80000
|
trusted library allocation
|
page read and write
|
||
7B14000
|
heap
|
page read and write
|
||
5FC00801000
|
trusted library allocation
|
page read and write
|
||
7AE3000
|
heap
|
page read and write
|
||
7B06000
|
heap
|
page read and write
|
||
5FC0087C000
|
trusted library allocation
|
page read and write
|
||
285400230000
|
trusted library allocation
|
page read and write
|
||
2854005F0000
|
trusted library allocation
|
page read and write
|
||
5FC008AC000
|
trusted library allocation
|
page read and write
|
||
5FC0039C000
|
trusted library allocation
|
page read and write
|
||
28540080C000
|
trusted library allocation
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
5FC0025C000
|
trusted library allocation
|
page read and write
|
||
25DCE8B0000
|
heap
|
page read and write
|
||
AAF3BFE000
|
stack
|
page read and write
|
||
285400EFC000
|
trusted library allocation
|
page read and write
|
||
285400E28000
|
trusted library allocation
|
page read and write
|
||
2854003A8000
|
trusted library allocation
|
page read and write
|
||
285400454000
|
trusted library allocation
|
page read and write
|
||
796E000
|
heap
|
page read and write
|
||
AAEA3FE000
|
unkown
|
page readonly
|
||
25DD64C0000
|
trusted library allocation
|
page read and write
|
||
28540000C000
|
trusted library allocation
|
page read and write
|
||
2854002CC000
|
trusted library allocation
|
page read and write
|
||
796D000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
25DD1160000
|
unkown
|
page read and write
|
||
2854007F0000
|
trusted library allocation
|
page read and write
|
||
285400348000
|
trusted library allocation
|
page read and write
|
||
5DEC002A0000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
285400788000
|
trusted library allocation
|
page read and write
|
||
28540032C000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
direct allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
285400340000
|
trusted library allocation
|
page read and write
|
||
15480020C000
|
direct allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
AAE6BFD000
|
stack
|
page read and write
|
||
7AF6000
|
heap
|
page read and write
|
||
28540011C000
|
trusted library allocation
|
page read and write
|
||
285400A80000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
2854002F8000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
AAF03FE000
|
unkown
|
page readonly
|
||
25DD6702000
|
trusted library allocation
|
page read and write
|
||
796D000
|
heap
|
page read and write
|
||
2854001F8000
|
trusted library allocation
|
page read and write
|
||
285400A20000
|
trusted library allocation
|
page read and write
|
||
285400C44000
|
trusted library allocation
|
page read and write
|
||
25DD24B1000
|
heap
|
page read and write
|
||
2854002FB000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
285400C44000
|
trusted library allocation
|
page read and write
|
||
285400728000
|
trusted library allocation
|
page read and write
|
||
285400CA4000
|
trusted library allocation
|
page read and write
|
||
285400384000
|
trusted library allocation
|
page read and write
|
||
25DD0710000
|
heap
|
page read and write
|
||
5FC002B8000
|
trusted library allocation
|
page read and write
|
||
285400144000
|
trusted library allocation
|
page read and write
|
||
2854004B0000
|
trusted library allocation
|
page read and write
|
||
7B0C000
|
heap
|
page read and write
|
||
2854001D0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
direct allocation
|
page execute and read and write
|
||
2854001D0000
|
trusted library allocation
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
285400228000
|
trusted library allocation
|
page read and write
|
||
154800284000
|
direct allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
2854005DC000
|
trusted library allocation
|
page read and write
|
||
152F000
|
stack
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
2854000B8000
|
trusted library allocation
|
page read and write
|
||
7B74000
|
heap
|
page read and write
|
||
7BCB000
|
heap
|
page read and write
|
||
5DEC00238000
|
trusted library allocation
|
page read and write
|
||
6ED1000
|
heap
|
page read and write
|
||
5FC00401000
|
trusted library allocation
|
page read and write
|
||
5FC00404000
|
trusted library allocation
|
page read and write
|
||
7967000
|
heap
|
page read and write
|
||
285400454000
|
trusted library allocation
|
page read and write
|
||
AAD93FE000
|
unkown
|
page readonly
|
||
285400D3C000
|
trusted library allocation
|
page read and write
|
||
AACFBFE000
|
stack
|
page read and write
|
There are 939 hidden memdumps, click here to show them.