Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Bire1g8ahY.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4830TYWIJQ5SCGDL2FZPZJN92URB.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Bire1g8ahY.exe
|
"C:\Users\user\Desktop\Bire1g8ahY.exe"
|
||
C:\Users\user\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe
|
"C:\Users\user~1\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe"
|
||
C:\Users\user\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe
|
"C:\Users\user~1\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
http://185.215.113.206/c4becf79229cb002.php/RP
|
unknown
|
||
https://lev-tolstoi.com/x
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://lev-tolstoi.com/t
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
aspecteirs.lat
|
|||
http://185.215.113.206/ws
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
|
unknown
|
||
https://community.fastly.steamstaticp
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
sweepyribs.lat
|
|||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
sustainskelet.lat
|
|||
rapeflowwj.lat
|
|||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
http://store.steampowered.com
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://community.fastly.steamstatic.com/
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://lev-tolstoi.com/2U
|
unknown
|
||
https://lev-tolstoi.com/piHt
|
unknown
|
||
https://lev-tolstoi.com/
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://185.215.113.206a
|
unknown
|
||
energyaffai.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
http://185.215.113.206/MP
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpZm
|
unknown
|
||
https://lev-tolstoi.com/api
|
172.67.157.254
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
http://185.215.113.16/off/def.exe3
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://185.215.113.16/off/def.exe.
|
unknown
|
||
grannyejh.lat
|
|||
https://store.steampowered.com/;
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
necklacebudi.lat
|
|||
https://lev-tolstoi.com/es
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpj
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://lev-tolstoi.com/apiy
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
||
https://medal.tv
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
http://185.215.113.16/steam/random.exeoot
|
unknown
|
||
crosshuaht.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
lev-tolstoi.com
|
172.67.157.254
|
||
sustainskelet.lat
|
unknown
|
||
crosshuaht.lat
|
unknown
|
||
rapeflowwj.lat
|
unknown
|
||
grannyejh.lat
|
unknown
|
||
aspecteirs.lat
|
unknown
|
||
sweepyribs.lat
|
unknown
|
||
discokeyus.lat
|
unknown
|
||
energyaffai.lat
|
unknown
|
||
necklacebudi.lat
|
unknown
|
There are 1 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
||
172.67.157.254
|
lev-tolstoi.com
|
United States
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9AE000
|
heap
|
page read and write
|
||
C1000
|
unkown
|
page execute and read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page execute and write copy
|
||
28BF000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
B87000
|
unkown
|
page execute and write copy
|
||
B64000
|
heap
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
480000
|
unkown
|
page execute and read and write
|
||
600F000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
905000
|
unkown
|
page execute and read and write
|
||
31FE000
|
stack
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
60AB000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
4E9000
|
unkown
|
page execute and write copy
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
B07000
|
unkown
|
page execute and write copy
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
4F12000
|
direct allocation
|
page read and write
|
||
469D000
|
trusted library allocation
|
page execute and read and write
|
||
AF1000
|
unkown
|
page execute and write copy
|
||
130A000
|
heap
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
A73000
|
unkown
|
page execute and write copy
|
||
4540000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
unkown
|
page execute and write copy
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
529000
|
unkown
|
page execute and read and write
|
||
496000
|
unkown
|
page execute and write copy
|
||
5010000
|
remote allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
A74000
|
unkown
|
page execute and read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
1240000
|
direct allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
60BB000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
600D000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
25B7000
|
heap
|
page read and write
|
||
5C7D000
|
trusted library allocation
|
page read and write
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
904000
|
unkown
|
page execute and write copy
|
||
4BB000
|
unkown
|
page execute and read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
600A000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
AAF000
|
unkown
|
page execute and write copy
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
B87000
|
unkown
|
page execute and write copy
|
||
343E000
|
stack
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
6145000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
255E000
|
stack
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
46A4000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
B0B000
|
unkown
|
page execute and write copy
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
6D90000
|
heap
|
page execute and read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
600F000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5C75000
|
trusted library allocation
|
page read and write
|
||
61AD000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
AD3000
|
unkown
|
page execute and write copy
|
||
60E000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
60AD000
|
trusted library allocation
|
page read and write
|
||
599000
|
unkown
|
page execute and write copy
|
||
1347000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4BA000
|
unkown
|
page execute and write copy
|
||
5BA6000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
549000
|
unkown
|
page execute and write copy
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page execute and read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
6019000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
4A5000
|
unkown
|
page execute and read and write
|
||
497000
|
unkown
|
page execute and read and write
|
||
28FF000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
16F000
|
unkown
|
page execute and read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
383D000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
601F000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
5F63000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
AE1000
|
unkown
|
page execute and write copy
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
6009000
|
trusted library allocation
|
page read and write
|
||
1260000
|
direct allocation
|
page execute and read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
600B000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
609F000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
6003000
|
trusted library allocation
|
page read and write
|
||
6496000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
heap
|
page execute and read and write
|
||
B7F000
|
unkown
|
page execute and write copy
|
||
5DA6000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
6BBD000
|
stack
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
6006000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
5010000
|
remote allocation
|
page read and write
|
||
617F000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
6209000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
6097000
|
trusted library allocation
|
page read and write
|
||
6011000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
48FC000
|
stack
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
B64000
|
heap
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
156000
|
unkown
|
page execute and read and write
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
6009000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page execute and read and write
|
||
5BA2000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B32000
|
unkown
|
page execute and write copy
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
A7C000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
1240000
|
direct allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
2F8000
|
unkown
|
page execute and read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
6004000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
4F9000
|
stack
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B42000
|
unkown
|
page execute and read and write
|
||
12E2000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
unkown
|
page execute and write copy
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
B23000
|
unkown
|
page execute and read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page execute and read and write
|
||
1347000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
A87000
|
unkown
|
page execute and write copy
|
||
B34000
|
unkown
|
page execute and read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
AD2000
|
unkown
|
page execute and read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
5F65000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
601C000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
4CD000
|
unkown
|
page execute and write copy
|
||
603C000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
906000
|
unkown
|
page execute and write copy
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
614B000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
60B7000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
B7E000
|
unkown
|
page execute and read and write
|
||
50B000
|
unkown
|
page execute and write copy
|
||
1362000
|
heap
|
page read and write
|
||
B1A000
|
unkown
|
page execute and write copy
|
||
303F000
|
stack
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
600B000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
76E000
|
heap
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
6002000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
30C000
|
unkown
|
page execute and read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
60B5000
|
trusted library allocation
|
page read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B35000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
582000
|
unkown
|
page execute and write copy
|
||
C0000
|
unkown
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
5010000
|
remote allocation
|
page read and write
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5B37000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
6092000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
6044000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5A6000
|
unkown
|
page execute and write copy
|
||
604B000
|
trusted library allocation
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
1250000
|
direct allocation
|
page execute and read and write
|
||
26BE000
|
stack
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
C97000
|
unkown
|
page execute and write copy
|
||
4561000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
unkown
|
page execute and read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
48CC000
|
stack
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
60DF000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
unkown
|
page execute and read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
609C000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
B96000
|
unkown
|
page execute and write copy
|
||
2560000
|
direct allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
6042000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
259C000
|
stack
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page execute and write copy
|
||
4B6F000
|
stack
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
1362000
|
heap
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
60AA000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
502000
|
unkown
|
page execute and read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
unkown
|
page execute and write copy
|
||
5C85000
|
trusted library allocation
|
page read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
61D1000
|
trusted library allocation
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
46C000
|
unkown
|
page execute and write copy
|
||
3CFF000
|
stack
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
592000
|
unkown
|
page execute and write copy
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
B98000
|
unkown
|
page execute and write copy
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
7A2000
|
heap
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
5BA6000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
604C000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page execute and write copy
|
||
5B12000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
unkown
|
page write copy
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
638B000
|
trusted library allocation
|
page read and write
|
||
601B000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
6098000
|
trusted library allocation
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
unkown
|
page execute and read and write
|
||
41FE000
|
stack
|
page read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
unkown
|
page write copy
|
||
4FA000
|
unkown
|
page execute and write copy
|
||
4A51000
|
heap
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
318000
|
unkown
|
page execute and write copy
|
||
B64000
|
heap
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
1309000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page execute and write copy
|
||
51BC000
|
stack
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
483000
|
unkown
|
page execute and read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
6123000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
B7D000
|
unkown
|
page execute and write copy
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
601A000
|
trusted library allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page execute and write copy
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
30A000
|
unkown
|
page write copy
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page execute and write copy
|
||
32FF000
|
stack
|
page read and write
|
||
5A24000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
stack
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
519000
|
unkown
|
page execute and write copy
|
||
B64000
|
heap
|
page read and write
|
||
4EE000
|
unkown
|
page execute and read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
991000
|
unkown
|
page execute and write copy
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
3A7D000
|
stack
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
604A000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
60A2000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
48D000
|
unkown
|
page execute and read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
46DB000
|
trusted library allocation
|
page execute and read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page execute and read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
6006000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
5B66000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
6093000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
46D7000
|
trusted library allocation
|
page execute and read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
25BB000
|
heap
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
53B000
|
unkown
|
page execute and write copy
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5DB4000
|
trusted library allocation
|
page read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
2577000
|
heap
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
unkown
|
page execute and read and write
|
||
46CA000
|
trusted library allocation
|
page execute and read and write
|
||
A99000
|
unkown
|
page execute and read and write
|
||
599000
|
unkown
|
page execute and write copy
|
||
5F64000
|
trusted library allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
935000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
60AF000
|
trusted library allocation
|
page read and write
|
||
492000
|
unkown
|
page execute and write copy
|
||
B98000
|
unkown
|
page execute and write copy
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5B26000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
AEB000
|
unkown
|
page execute and write copy
|
||
B64000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
4CC000
|
unkown
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
520000
|
unkown
|
page execute and read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
609C000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
133C000
|
heap
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
6203000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
50F000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
30A000
|
unkown
|
page write copy
|
||
AC0000
|
unkown
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
64A3000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
60B3000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
C1000
|
unkown
|
page execute and write copy
|
||
61CF000
|
trusted library allocation
|
page read and write
|
||
A7D000
|
unkown
|
page execute and read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
60A6000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
604B000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4693000
|
trusted library allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
6103000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
6068000
|
trusted library allocation
|
page read and write
|
||
4452000
|
heap
|
page read and write
|
||
6183000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
600A000
|
trusted library allocation
|
page read and write
|
||
A72000
|
unkown
|
page execute and read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
48D000
|
unkown
|
page execute and write copy
|
||
54B000
|
unkown
|
page execute and read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
B1B000
|
unkown
|
page execute and read and write
|
||
12E2000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
B96000
|
unkown
|
page execute and read and write
|
||
1340000
|
heap
|
page read and write
|
||
6005000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
unkown
|
page execute and read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
585000
|
unkown
|
page execute and write copy
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
B38000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
60FD000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
507D000
|
stack
|
page read and write
|
||
50BD000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
606C000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
472C000
|
stack
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
601F000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
6099000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page execute and write copy
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
30C000
|
unkown
|
page execute and write copy
|
||
46C0000
|
direct allocation
|
page execute and read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
A57000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
5A7000
|
unkown
|
page execute and write copy
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
2540000
|
direct allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
14E000
|
unkown
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
ACE000
|
unkown
|
page execute and write copy
|
||
253F000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
481000
|
unkown
|
page execute and write copy
|
||
B64000
|
heap
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
B50000
|
direct allocation
|
page read and write
|
||
4694000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
2560000
|
direct allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
A89000
|
unkown
|
page execute and read and write
|
||
5C2F000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
613F000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
5A6000
|
unkown
|
page execute and read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
65BD000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
130A000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
B35000
|
unkown
|
page execute and write copy
|
||
4A51000
|
heap
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
5A21000
|
trusted library allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
8F6000
|
unkown
|
page write copy
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
A92000
|
unkown
|
page execute and write copy
|
||
6070000
|
trusted library allocation
|
page read and write
|
There are 1261 hidden memdumps, click here to show them.