Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
YYjRtxS70h.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YYjRtxS70h.exe.log
|
CSV text
|
modified
|
||
C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199804377619[1].htm
|
HTML document, Unicode text, UTF-8 text, with very long lines (3254)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\76561199804377619[1].htm
|
HTML document, Unicode text, UTF-8 text, with very long lines (3254)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0c4sbize.gt5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fimw0nw.epw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44azgeaa.mu5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dvcmsww.5jr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqrrzbsa.01l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gg2wq42q.z3x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqil3wa2.s4a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gx55hdj2.oc1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hprqkrgy.vx4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i51z1tx3.hhq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipoksj5s.xzo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jorhrdbe.jzy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4axp5zv.0yg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqewxhb2.xo3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnrzkanw.2s4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbdh2p4l.dal.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjhfp4k3.uvq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vuybsjww.poo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\YYjRtxS70h.exe
|
"C:\Users\user\Desktop\YYjRtxS70h.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\VmTatwGQo'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\VmTatwGQo
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Windows
|
||
C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe
|
"C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=i_iuPUaT8LXN&l=english&am
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619com
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=47omfdMZRDiz&l=engli
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619?
|
unknown
|
||
https://37.27.43.98/T
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619E
|
unknown
|
||
https://github.com/olosha1/pockket/raw/refs/heads/main/jtkhikadjthsad.exe
|
20.233.83.145
|
||
https://steamcommunity.com/profiles/76561199804377619G
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://37.27.43.98/n
|
unknown
|
||
https://telegram.org/img/t_logo_2x.png
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&a
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S
|
unknown
|
||
https://t.me/m3wm0wT
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619p1up1Mozilla/5.0
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619
|
104.102.49.254
|
||
https://raw.githubusercontent.com/olosha1/pockket/refs/heads/main/jtkhikadjthsad.exe
|
185.199.110.133
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=G3UTKgHH4xLD&l=engl
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619/badges
|
unknown
|
||
https://t.me/_~
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619#
|
unknown
|
||
https://37.27.43.98/5
|
unknown
|
||
https://t.me/m3wm0wc
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcD
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619/
|
unknown
|
||
https://37.27.43.98/A
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://37.27.43.98
|
unknown
|
||
https://t.me/m3wm0w3
|
unknown
|
||
https://steamcommunity.com/o
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199804377619
|
unknown
|
||
https://37.27.43.98/icate
|
unknown
|
||
https://t.me/m3wm0w7
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=_92T
|
unknown
|
||
https://api.P
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199
|
unknown
|
||
https://t.me/y~
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=EZbG2DEumYDH&l=engli
|
unknown
|
||
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=engli
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619_
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://37.27.43.98/r
|
unknown
|
||
https://37.27.43.98/s
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
||
https://37.27.43.98/v
|
unknown
|
||
http://www.microsoft.coU
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=LjouqOsWbS
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619i
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/reportedc
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://t.me/m3wm0w
|
149.154.167.99
|
||
https://t.me/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=nc69vwog8R9p&l=
|
unknown
|
||
https://store.steampowered.com/;)
|
unknown
|
||
https://store.steampowered.com/;a(
|
unknown
|
||
https://web.telegram.org
|
unknown
|
||
https://github.com
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=INiZALwvDIbb
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199804377619tlq
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
github.com
|
20.233.83.145
|
||
raw.githubusercontent.com
|
185.199.110.133
|
||
t.me
|
149.154.167.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.102.49.254
|
steamcommunity.com
|
United States
|
||
37.27.43.98
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
20.233.83.145
|
github.com
|
United States
|
||
185.199.110.133
|
raw.githubusercontent.com
|
Netherlands
|
||
149.154.167.99
|
t.me
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7B60000
|
trusted library allocation
|
page read and write
|
||
6E6F000
|
heap
|
page read and write
|
||
4CDC000
|
stack
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
85DA000
|
trusted library allocation
|
page read and write
|
||
44BB000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
7FD38000
|
trusted library allocation
|
page execute and read and write
|
||
89C2000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
8A13000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
61C5000
|
trusted library allocation
|
page read and write
|
||
8580000
|
trusted library allocation
|
page execute and read and write
|
||
745D000
|
stack
|
page read and write
|
||
466E000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
29CD000
|
trusted library allocation
|
page execute and read and write
|
||
8882000
|
trusted library allocation
|
page read and write
|
||
7FB50000
|
trusted library allocation
|
page execute and read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
5872000
|
trusted library allocation
|
page read and write
|
||
4AE8000
|
trusted library allocation
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
6D3D000
|
stack
|
page read and write
|
||
4737000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
291F000
|
heap
|
page read and write
|
||
5A17000
|
trusted library allocation
|
page read and write
|
||
88C0000
|
trusted library allocation
|
page read and write
|
||
6B8C000
|
stack
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
22AC000
|
stack
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
4B62000
|
trusted library allocation
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
5082000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
6DFC000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
87C4000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
2722000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
2D97000
|
stack
|
page read and write
|
||
271A000
|
trusted library allocation
|
page execute and read and write
|
||
75C0000
|
heap
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
8C7D000
|
stack
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
868C000
|
heap
|
page read and write
|
||
7532000
|
trusted library allocation
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
764A000
|
heap
|
page read and write
|
||
48BC000
|
trusted library allocation
|
page read and write
|
||
8490000
|
heap
|
page read and write
|
||
679D000
|
stack
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
2931000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
2716000
|
trusted library allocation
|
page execute and read and write
|
||
42CF000
|
stack
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
27C5000
|
heap
|
page read and write
|
||
505C000
|
stack
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
6B1B000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
72AA000
|
stack
|
page read and write
|
||
6F55000
|
heap
|
page read and write
|
||
268C000
|
stack
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page execute and read and write
|
||
2A78000
|
trusted library allocation
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
6E7B000
|
stack
|
page read and write
|
||
7635000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
8755000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
43B1000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
869C000
|
heap
|
page read and write
|
||
774F000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page execute and read and write
|
||
760000
|
heap
|
page read and write
|
||
7880000
|
heap
|
page execute and read and write
|
||
46A5000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
4486000
|
trusted library allocation
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
4FD8000
|
stack
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
767D000
|
heap
|
page read and write
|
||
6BAB000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
31A0000
|
remote allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
6D7A000
|
stack
|
page read and write
|
||
875A000
|
heap
|
page read and write
|
||
7867000
|
trusted library allocation
|
page read and write
|
||
869C000
|
heap
|
page read and write
|
||
329E000
|
unkown
|
page read and write
|
||
7910000
|
trusted library allocation
|
page execute and read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
8CC0000
|
trusted library allocation
|
page execute and read and write
|
||
2AA9000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
trusted library allocation
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
8BBD000
|
stack
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
2B7C000
|
stack
|
page read and write
|
||
78D2000
|
trusted library allocation
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
8C8D000
|
stack
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
6E6B000
|
heap
|
page read and write
|
||
768D000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
70E0000
|
heap
|
page execute and read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
22E8000
|
stack
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
2D25000
|
heap
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
2712000
|
trusted library allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
4492000
|
trusted library allocation
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
71D0000
|
heap
|
page read and write
|
||
23AE000
|
unkown
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page read and write
|
||
7F30000
|
trusted library allocation
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
88B9000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page execute and read and write
|
||
2F20000
|
heap
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
28DB000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
7500000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
77FB000
|
heap
|
page read and write
|
||
49F4000
|
trusted library allocation
|
page read and write
|
||
72BD000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
7805000
|
heap
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
857E000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page execute and read and write
|
||
3330000
|
heap
|
page read and write
|
||
2BB9000
|
stack
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
7120000
|
heap
|
page execute and read and write
|
||
293E000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
8EDE000
|
stack
|
page read and write
|
||
76B3000
|
heap
|
page read and write
|
||
2A66000
|
trusted library allocation
|
page read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
8E9E000
|
stack
|
page read and write
|
||
728A000
|
stack
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
751F000
|
stack
|
page read and write
|
||
8670000
|
heap
|
page read and write
|
||
8717000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
D34000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page execute and read and write
|
||
480D000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
49A6000
|
trusted library allocation
|
page read and write
|
||
71BF000
|
heap
|
page read and write
|
||
7660000
|
heap
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
77CB000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
trusted library allocation
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page execute and read and write
|
||
2F1E000
|
unkown
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
88D0000
|
trusted library allocation
|
page read and write
|
||
2727000
|
trusted library allocation
|
page execute and read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
trusted library allocation
|
page read and write
|
||
2A4C000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
272B000
|
trusted library allocation
|
page execute and read and write
|
||
2F89000
|
heap
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
trusted library allocation
|
page read and write
|
||
8CBE000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
6DF6000
|
heap
|
page read and write
|
||
62CE000
|
stack
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
447E000
|
trusted library allocation
|
page read and write
|
||
76A5000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page readonly
|
||
8BFB000
|
stack
|
page read and write
|
||
D3D000
|
trusted library allocation
|
page execute and read and write
|
||
A3A000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
2921000
|
heap
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
28B5000
|
heap
|
page read and write
|
||
2A27000
|
trusted library allocation
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
325E000
|
unkown
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
584D000
|
stack
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
5758000
|
trusted library allocation
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
6E3D000
|
stack
|
page read and write
|
||
8770000
|
trusted library allocation
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
784D000
|
heap
|
page read and write
|
||
44C000
|
unkown
|
page readonly
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
8838000
|
heap
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page execute and read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
5A38000
|
trusted library allocation
|
page read and write
|
||
77B3000
|
heap
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
770A000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
62E4000
|
trusted library allocation
|
page read and write
|
||
463C000
|
stack
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4B3C000
|
trusted library allocation
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
4B22000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
87D4000
|
heap
|
page read and write
|
||
298C000
|
heap
|
page read and write
|
||
8684000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page execute and read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
737F000
|
stack
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
8882000
|
heap
|
page read and write
|
||
5F28000
|
trusted library allocation
|
page read and write
|
||
7655000
|
heap
|
page read and write
|
||
87DC000
|
heap
|
page read and write
|
||
6E1F000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
26C9000
|
stack
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
8818000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
6171000
|
trusted library allocation
|
page read and write
|
||
2E7D000
|
stack
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
31FD000
|
trusted library allocation
|
page execute and read and write
|
||
8A7E000
|
stack
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
75F9000
|
heap
|
page read and write
|
||
6AED000
|
stack
|
page read and write
|
||
8760000
|
trusted library allocation
|
page read and write
|
||
4734000
|
trusted library allocation
|
page read and write
|
||
7842000
|
heap
|
page read and write
|
||
640C000
|
stack
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
8DCE000
|
stack
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
43BC000
|
stack
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
2A63000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
780F000
|
heap
|
page read and write
|
||
865B000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
heap
|
page execute and read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
87CC000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
4B38000
|
trusted library allocation
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
2880000
|
heap
|
page readonly
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
2728000
|
stack
|
page read and write
|
||
73FA000
|
stack
|
page read and write
|
||
8698000
|
heap
|
page read and write
|
||
861E000
|
stack
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
759E000
|
stack
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
845D000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page execute and read and write
|
||
857E000
|
stack
|
page read and write
|
||
76BC000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page execute and read and write
|
||
3087000
|
heap
|
page read and write
|
||
84A0000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
7270000
|
heap
|
page execute and read and write
|
||
76AC000
|
heap
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
46B8000
|
trusted library allocation
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
85FD000
|
stack
|
page read and write
|
||
8610000
|
trusted library allocation
|
page read and write
|
||
7ABD000
|
stack
|
page read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
7FD20000
|
trusted library allocation
|
page execute and read and write
|
||
C9E000
|
stack
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
561000
|
unkown
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
5177000
|
trusted library allocation
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
2A78000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
658C000
|
heap
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
29C3000
|
trusted library allocation
|
page execute and read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
8B7E000
|
stack
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page execute and read and write
|
||
2AFE000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
3031000
|
heap
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page execute and read and write
|
||
6170000
|
heap
|
page read and write
|
||
2CC6000
|
heap
|
page read and write
|
||
86CF000
|
heap
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
7271000
|
heap
|
page read and write
|
||
71A5000
|
heap
|
page execute and read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
31F3000
|
trusted library allocation
|
page execute and read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
7275000
|
heap
|
page execute and read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
8720000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
652000
|
unkown
|
page readonly
|
||
2D9D000
|
stack
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
4695000
|
heap
|
page execute and read and write
|
||
7D90000
|
heap
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
84CD000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page write copy
|
||
4B33000
|
trusted library allocation
|
page execute and read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
8C7F000
|
stack
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
719E000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page execute and read and write
|
||
4E18000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
49FD000
|
trusted library allocation
|
page execute and read and write
|
||
2C1D000
|
trusted library allocation
|
page execute and read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
885C000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
768B000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
4671000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page execute and read and write
|
||
6EC000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
472C000
|
trusted library allocation
|
page read and write
|
||
28E7000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
680000
|
unkown
|
page readonly
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
heap
|
page execute and read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
724D000
|
stack
|
page read and write
|
||
288C000
|
stack
|
page read and write
|
||
84CB000
|
trusted library allocation
|
page read and write
|
||
6EFC000
|
stack
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
48CD000
|
trusted library allocation
|
page read and write
|
||
62FC000
|
trusted library allocation
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page execute and read and write
|
||
2E50000
|
heap
|
page read and write
|
||
4679000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
76C5000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
84FE000
|
stack
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
71C6000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
780B000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
8720000
|
heap
|
page read and write
|
||
8BCE000
|
stack
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
72FB000
|
stack
|
page read and write
|
||
7780000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
7150000
|
heap
|
page read and write
|
||
716B000
|
stack
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
78FD000
|
stack
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
4B34000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
8694000
|
heap
|
page read and write
|
||
7631000
|
heap
|
page read and write
|
||
783E000
|
stack
|
page read and write
|
||
76DF000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
2F0E000
|
stack
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
||
762C000
|
heap
|
page read and write
|
||
30E1000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
2B05000
|
heap
|
page read and write
|
||
300D000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6930000
|
heap
|
page read and write
|
||
7846000
|
heap
|
page read and write
|
||
709D000
|
stack
|
page read and write
|
||
4956000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
316E000
|
unkown
|
page read and write
|
||
46E3000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
43BC000
|
trusted library allocation
|
page read and write
|
||
7F7A0000
|
trusted library allocation
|
page execute and read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page execute and read and write
|
||
3190000
|
heap
|
page read and write
|
||
7B73000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
7711000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
714D000
|
stack
|
page read and write
|
||
2B1E000
|
unkown
|
page read and write
|
||
473D000
|
trusted library allocation
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
87D0000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page execute and read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
30ED000
|
heap
|
page read and write
|
||
8694000
|
heap
|
page read and write
|
||
8450000
|
trusted library allocation
|
page read and write
|
||
763F000
|
heap
|
page read and write
|
||
8B70000
|
trusted library allocation
|
page read and write
|
||
7624000
|
heap
|
page read and write
|
||
52A6000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
6F23000
|
heap
|
page read and write
|
||
71A0000
|
heap
|
page execute and read and write
|
||
76E2000
|
heap
|
page read and write
|
||
76E6000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
718B000
|
stack
|
page read and write
|
||
8863000
|
heap
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
31A0000
|
remote allocation
|
page read and write
|
||
272D000
|
stack
|
page read and write
|
||
8580000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
8688000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
8710000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
7668000
|
heap
|
page read and write
|
||
77F2000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
86F5000
|
heap
|
page read and write
|
||
2E78000
|
stack
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
8876000
|
heap
|
page read and write
|
||
76D9000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
23EF000
|
unkown
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
7643000
|
heap
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
6A8C000
|
stack
|
page read and write
|
||
4310000
|
heap
|
page execute and read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
870B000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
8D8E000
|
stack
|
page read and write
|
||
602C000
|
stack
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page execute and read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
47FC000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page execute and read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
43DA000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page execute and read and write
|
||
50CF000
|
stack
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
517D000
|
stack
|
page read and write
|
||
29C4000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4992000
|
trusted library allocation
|
page read and write
|
||
8690000
|
heap
|
page read and write
|
||
C52000
|
heap
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
6E77000
|
heap
|
page read and write
|
||
46D5000
|
trusted library allocation
|
page read and write
|
||
6820000
|
heap
|
page execute and read and write
|
||
48C4000
|
trusted library allocation
|
page read and write
|
||
8802000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
6F9F000
|
stack
|
page read and write
|
||
29C9000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
heap
|
page read and write
|
||
5738000
|
trusted library allocation
|
page read and write
|
||
4AE6000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page execute and read and write
|
||
71B3000
|
heap
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
8688000
|
heap
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
43DE000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
heap
|
page execute and read and write
|
||
43F2000
|
trusted library allocation
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
8B73000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
6DFB000
|
stack
|
page read and write
|
||
72ED000
|
stack
|
page read and write
|
||
8A33000
|
trusted library allocation
|
page read and write
|
||
4B3D000
|
trusted library allocation
|
page execute and read and write
|
||
61D4000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
8640000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page execute and read and write
|
||
6E7F000
|
heap
|
page read and write
|
||
6B9B000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
72D2000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
289D000
|
unkown
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
4C9C000
|
stack
|
page read and write
|
||
4E00000
|
heap
|
page readonly
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
786A000
|
trusted library allocation
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
55FD000
|
trusted library allocation
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
6E53000
|
heap
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
75D0000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
49F3000
|
trusted library allocation
|
page execute and read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
66A000
|
unkown
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
5EE9000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
49AA000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4D4A000
|
trusted library allocation
|
page execute and read and write
|
||
29AF000
|
stack
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
8690000
|
heap
|
page read and write
|
||
27D3000
|
trusted library allocation
|
page execute and read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
6FF1000
|
heap
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
7A3E000
|
stack
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
527A000
|
stack
|
page read and write
|
||
718C000
|
heap
|
page read and write
|
||
2C98000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
297E000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
8C3E000
|
stack
|
page read and write
|
||
5140000
|
heap
|
page execute and read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
4FE9000
|
stack
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
48C7000
|
trusted library allocation
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
7672000
|
heap
|
page read and write
|
||
61B4000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
5F2C000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
8CCE000
|
stack
|
page read and write
|
||
6E37000
|
heap
|
page read and write
|
||
7638000
|
heap
|
page read and write
|
||
71A6000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page execute and read and write
|
||
874C000
|
heap
|
page read and write
|
||
8D4B000
|
stack
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
6F05000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page execute and read and write
|
||
8680000
|
heap
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
74FB000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
476C000
|
trusted library allocation
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
865D000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
749C000
|
trusted library allocation
|
page read and write
|
||
2B42000
|
heap
|
page read and write
|
||
6F3F000
|
heap
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
871A000
|
trusted library allocation
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
493000
|
unkown
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
85DE000
|
stack
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
heap
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
4B65000
|
trusted library allocation
|
page execute and read and write
|
||
71CE000
|
stack
|
page read and write
|
||
2FCB000
|
heap
|
page read and write
|
||
4489000
|
trusted library allocation
|
page read and write
|
||
46C4000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
heap
|
page execute and read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
77EA000
|
heap
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
48FC000
|
trusted library allocation
|
page read and write
|
||
87C8000
|
heap
|
page read and write
|
||
4B3C000
|
stack
|
page read and write
|
||
2B1A000
|
heap
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page execute and read and write
|
||
2A70000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
7189000
|
stack
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
4661000
|
trusted library allocation
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
79DD000
|
stack
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
heap
|
page read and write
|
||
6C30000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
7039000
|
stack
|
page read and write
|
||
3058000
|
heap
|
page read and write
|
||
6CC1000
|
heap
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page execute and read and write
|
||
2807000
|
trusted library allocation
|
page execute and read and write
|
||
30D3000
|
heap
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
4BD0000
|
heap
|
page readonly
|
||
7723000
|
heap
|
page read and write
|
||
873F000
|
heap
|
page read and write
|
||
5EE1000
|
trusted library allocation
|
page read and write
|
||
87D8000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
658A000
|
heap
|
page read and write
|
||
4FAD000
|
stack
|
page read and write
|
||
6F32000
|
heap
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
67BD000
|
stack
|
page read and write
|
||
6F0E000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page execute and read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
743D000
|
stack
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
76BF000
|
heap
|
page read and write
|
||
8BBE000
|
stack
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
749F000
|
stack
|
page read and write
|
||
4AD0000
|
heap
|
page readonly
|
||
44C000
|
unkown
|
page readonly
|
||
89E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FB68000
|
trusted library allocation
|
page execute and read and write
|
||
A41000
|
heap
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
88BF000
|
trusted library allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
86FA000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page execute and read and write
|
||
8670000
|
heap
|
page read and write
|
||
732B000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page execute and read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
6E7B000
|
heap
|
page read and write
|
||
31A0000
|
remote allocation
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
8680000
|
heap
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page read and write
|
||
692A000
|
stack
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
84C0000
|
trusted library allocation
|
page read and write
|
||
447B000
|
trusted library allocation
|
page read and write
|
||
6F43000
|
heap
|
page read and write
|
||
4D52000
|
trusted library allocation
|
page read and write
|
||
78D2000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
heap
|
page read and write
|
||
67FB000
|
stack
|
page read and write
|
||
7A62000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
2A38000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
747A000
|
stack
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
8714000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page read and write
|
||
2A4F000
|
trusted library allocation
|
page read and write
|
||
2AF7000
|
heap
|
page read and write
|
||
7EC000
|
stack
|
page read and write
|
||
46A7000
|
trusted library allocation
|
page read and write
|
||
8C0D000
|
stack
|
page read and write
|
||
6B5D000
|
stack
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
8650000
|
trusted library allocation
|
page read and write
|
||
7686000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
4D39000
|
trusted library allocation
|
page read and write
|
||
D33000
|
trusted library allocation
|
page execute and read and write
|
||
71A4000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
46D8000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
8BFF000
|
stack
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
764D000
|
heap
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
868C000
|
heap
|
page read and write
|
||
46FA000
|
trusted library allocation
|
page read and write
|
||
4350000
|
heap
|
page readonly
|
||
29D9000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
86FC000
|
heap
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
7771000
|
heap
|
page read and write
|
||
45C5000
|
heap
|
page execute and read and write
|
||
285D000
|
unkown
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
6EF0000
|
heap
|
page execute and read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
8680000
|
heap
|
page read and write
|
||
4B77000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
2ED6000
|
heap
|
page read and write
|
||
45C6000
|
trusted library allocation
|
page read and write
|
||
6825000
|
heap
|
page execute and read and write
|
||
62F5000
|
trusted library allocation
|
page read and write
|
||
6F3B000
|
heap
|
page read and write
|
||
709F000
|
stack
|
page read and write
|
||
8CFF000
|
stack
|
page read and write
|
||
6A2B000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
86C2000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
730B000
|
stack
|
page read and write
|
||
73DF000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page execute and read and write
|
||
28FE000
|
stack
|
page read and write
|
||
26EC000
|
stack
|
page read and write
|
||
51AA000
|
trusted library allocation
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
8698000
|
heap
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
85D7000
|
trusted library allocation
|
page read and write
|
||
8660000
|
trusted library allocation
|
page execute and read and write
|
||
7140000
|
heap
|
page read and write
|
||
6E64000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
863E000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4C48000
|
trusted library allocation
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
67D000
|
unkown
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
86D6000
|
heap
|
page read and write
|
||
8745000
|
heap
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
43FE000
|
stack
|
page read and write
|
||
6E48000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
4865000
|
trusted library allocation
|
page read and write
|
||
58F3000
|
trusted library allocation
|
page read and write
|
||
4848000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
stack
|
page read and write
|
||
6F2D000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
870B000
|
heap
|
page read and write
|
||
A12000
|
heap
|
page read and write
|
||
8B80000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
7F7B8000
|
trusted library allocation
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
84B0000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7640000
|
heap
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
8ABE000
|
stack
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
6C3D000
|
stack
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
8754000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
598D000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4EEC000
|
stack
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
6B2A000
|
stack
|
page read and write
|
||
4839000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
8D0D000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
8590000
|
trusted library allocation
|
page execute and read and write
|
||
C42000
|
heap
|
page read and write
|
||
44A0000
|
heap
|
page read and write
|
||
7753000
|
heap
|
page read and write
|
||
4809000
|
trusted library allocation
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page execute and read and write
|
||
6DF9000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
6FF5000
|
heap
|
page execute and read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page write copy
|
||
76EE000
|
heap
|
page read and write
|
||
8890000
|
trusted library allocation
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
501D000
|
stack
|
page read and write
|
||
6F0A000
|
heap
|
page read and write
|
||
29A7000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
4B5A000
|
trusted library allocation
|
page execute and read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
7689000
|
heap
|
page read and write
|
||
8684000
|
heap
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
8743000
|
heap
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page execute and read and write
|
||
845B000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
657B000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
86E2000
|
heap
|
page read and write
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
2805000
|
trusted library allocation
|
page execute and read and write
|
||
A78000
|
heap
|
page read and write
|
||
307B000
|
heap
|
page read and write
|
||
85D0000
|
trusted library allocation
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
86C2000
|
heap
|
page read and write
|
||
8750000
|
trusted library allocation
|
page read and write
|
||
6C7A000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
41EC000
|
stack
|
page read and write
|
||
4A1A000
|
trusted library allocation
|
page execute and read and write
|
||
765C000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
55B000
|
unkown
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
There are 1171 hidden memdumps, click here to show them.