Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BVGvbpplT8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\44WNAJWW05E0258PKFVID8DSXYO93MX.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\BVGvbpplT8.exe
|
"C:\Users\user\Desktop\BVGvbpplT8.exe"
|
||
C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe
|
"C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe"
|
||
C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe
|
"C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
http://185.215.113.16/off/def.exeZ
|
unknown
|
||
https://lev-tolstoi.com/p
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
aspecteirs.lat
|
|||
https://steamcommunity.com/ice.
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpNE
|
unknown
|
||
sweepyribs.lat
|
|||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://lev-tolstoi.com/P
|
unknown
|
||
sustainskelet.lat
|
|||
rapeflowwj.lat
|
|||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://lev-tolstoi.com/e
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://lev-tolstoi.com/
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
energyaffai.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://lev-tolstoi.com/apigz2s
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php2E
|
unknown
|
||
https://lev-tolstoi.com/api
|
104.21.66.86
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
grannyejh.lat
|
|||
http://185.215.113.206/aMX
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://lev-tolstoi.com/ms
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
necklacebudi.lat
|
|||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpn
|
unknown
|
||
https://lev-tolstoi.com/apil
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://necklacebudi.lat/api
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
crosshuaht.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
|
unknown
|
||
https://store.steampowered.com/legal/
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
http://185.215.113.16/steam/random.exeT
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpRE
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
https://lev-tolstoi.com/api0
|
unknown
|
||
https://store.steampowered.com/
|
unknown
|
||
https://lev-tolstoi.com/J
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
lev-tolstoi.com
|
104.21.66.86
|
||
ax-0001.ax-msedge.net
|
150.171.28.10
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
sustainskelet.lat
|
unknown
|
||
crosshuaht.lat
|
unknown
|
||
rapeflowwj.lat
|
unknown
|
||
grannyejh.lat
|
unknown
|
||
aspecteirs.lat
|
unknown
|
||
sweepyribs.lat
|
unknown
|
||
discokeyus.lat
|
unknown
|
||
energyaffai.lat
|
unknown
|
||
necklacebudi.lat
|
unknown
|
There are 3 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
||
104.21.66.86
|
lev-tolstoi.com
|
United States
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D3E000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page execute and read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
61C7000
|
trusted library allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
6265000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
7F9000
|
stack
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
61D9000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
835000
|
unkown
|
page execute and read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
61A9000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
616F000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
45A000
|
unkown
|
page execute and read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
5EDA000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page execute and read and write
|
||
613F000
|
trusted library allocation
|
page read and write
|
||
5F2000
|
unkown
|
page execute and write copy
|
||
CBE000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page execute and write copy
|
||
8B9000
|
unkown
|
page execute and read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5DC000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
702F000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page execute and write copy
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
8CB000
|
unkown
|
page execute and write copy
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
unkown
|
page execute and write copy
|
||
6326000
|
trusted library allocation
|
page read and write
|
||
D83000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
692000
|
unkown
|
page execute and write copy
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
386D000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
69C000
|
unkown
|
page execute and read and write
|
||
CF6000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
6174000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
24E7000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
67A000
|
unkown
|
page execute and write copy
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
524D000
|
stack
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
1215000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
698000
|
unkown
|
page execute and read and write
|
||
DC5000
|
heap
|
page read and write
|
||
688000
|
unkown
|
page execute and read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
62E000
|
unkown
|
page execute and write copy
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
6171000
|
trusted library allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
D5B000
|
heap
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
unkown
|
page execute and write copy
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
497C000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
6128000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
633E000
|
trusted library allocation
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
921000
|
unkown
|
page execute and read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
62F2000
|
trusted library allocation
|
page read and write
|
||
456000
|
unkown
|
page write copy
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
69A000
|
unkown
|
page write copy
|
||
F11000
|
unkown
|
page execute and write copy
|
||
D96000
|
heap
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
621C000
|
trusted library allocation
|
page read and write
|
||
61BA000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
456000
|
unkown
|
page write copy
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
89F000
|
unkown
|
page execute and read and write
|
||
5ED6000
|
trusted library allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
64B000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
84A000
|
unkown
|
page execute and write copy
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
892000
|
unkown
|
page execute and read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
618E000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6282000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
5620000
|
remote allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
40C000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5CD6000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
85C000
|
unkown
|
page execute and read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
D5D000
|
heap
|
page read and write
|
||
7FA000
|
unkown
|
page execute and read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
5D3000
|
unkown
|
page execute and write copy
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5ED6000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
61B5000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
heap
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
unkown
|
page execute and read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
613D000
|
trusted library allocation
|
page read and write
|
||
6252000
|
trusted library allocation
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
61CA000
|
trusted library allocation
|
page read and write
|
||
6292000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5C93000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
66A000
|
unkown
|
page execute and read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
5CD2000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
62DA000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
616F000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
6E7000
|
unkown
|
page execute and write copy
|
||
46E0000
|
direct allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
695000
|
unkown
|
page execute and write copy
|
||
800000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
694000
|
unkown
|
page execute and read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
unkown
|
page execute and write copy
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
48C0000
|
trusted library allocation
|
page execute and read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
88A000
|
unkown
|
page execute and write copy
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
632C000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
89B000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
650000
|
unkown
|
page execute and read and write
|
||
4E6000
|
unkown
|
page execute and read and write
|
||
61C6000
|
trusted library allocation
|
page read and write
|
||
651000
|
unkown
|
page execute and write copy
|
||
8F6000
|
unkown
|
page execute and read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
655000
|
unkown
|
page execute and read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
936000
|
unkown
|
page execute and write copy
|
||
45D1000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
7FC000
|
unkown
|
page execute and write copy
|
||
9A0000
|
heap
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
67C000
|
unkown
|
page execute and write copy
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
824000
|
unkown
|
page execute and read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
937000
|
unkown
|
page execute and write copy
|
||
6F6000
|
unkown
|
page execute and write copy
|
||
2B9E000
|
stack
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
616B000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
69C000
|
unkown
|
page execute and write copy
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
879000
|
unkown
|
page execute and write copy
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page execute and write copy
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
811000
|
unkown
|
page execute and write copy
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
81D000
|
unkown
|
page execute and write copy
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
51FF000
|
stack
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
683000
|
unkown
|
page execute and read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
5490000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
6F8000
|
unkown
|
page execute and write copy
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
61C4000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
612B000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
45A000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
6148000
|
trusted library allocation
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
62EC000
|
trusted library allocation
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
621E000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
81D000
|
unkown
|
page execute and read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
915000
|
unkown
|
page execute and write copy
|
||
450000
|
unkown
|
page readonly
|
||
5ED8000
|
trusted library allocation
|
page read and write
|
||
61CA000
|
trusted library allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
827000
|
unkown
|
page execute and read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
84C000
|
unkown
|
page execute and write copy
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
6A2000
|
unkown
|
page execute and read and write
|
||
61B3000
|
trusted library allocation
|
page read and write
|
||
627C000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
62AD000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
62DC000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
610F000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
6A1000
|
unkown
|
page execute and write copy
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
5C2F000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
6DD000
|
unkown
|
page execute and write copy
|
||
4BBE000
|
stack
|
page read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
69A000
|
unkown
|
page write copy
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
6C6D000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
929000
|
unkown
|
page execute and write copy
|
||
3BDE000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
6142000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
2A5B000
|
stack
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
667000
|
unkown
|
page execute and write copy
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
6344000
|
trusted library allocation
|
page read and write
|
||
617F000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
6145000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
5CDF000
|
trusted library allocation
|
page read and write
|
||
5C7B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
487A000
|
trusted library allocation
|
page execute and read and write
|
||
5B7000
|
unkown
|
page execute and read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
6328000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
672000
|
unkown
|
page execute and read and write
|
||
9A4000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page execute and read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
6184000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
810000
|
unkown
|
page execute and read and write
|
||
D61000
|
heap
|
page read and write
|
||
548C000
|
stack
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
heap
|
page read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
68E4000
|
trusted library allocation
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
F62000
|
unkown
|
page write copy
|
||
2A6F000
|
stack
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
60F000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
66B000
|
unkown
|
page execute and write copy
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
5620000
|
remote allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
88E000
|
unkown
|
page execute and write copy
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
5D2000
|
unkown
|
page execute and read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
627E000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
616A000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
6143000
|
trusted library allocation
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
61BE000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
unkown
|
page execute and write copy
|
||
3FEE000
|
stack
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
61A3000
|
trusted library allocation
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
249C000
|
stack
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
618A000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
813000
|
unkown
|
page execute and read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
635000
|
unkown
|
page execute and read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
61C5000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
6182000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
6169000
|
trusted library allocation
|
page read and write
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
830000
|
unkown
|
page execute and write copy
|
||
245E000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
5002000
|
direct allocation
|
page read and write
|
||
633000
|
unkown
|
page execute and write copy
|
||
18C000
|
stack
|
page read and write
|
||
5C9B000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
5C24000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BA000
|
unkown
|
page execute and write copy
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
84B000
|
unkown
|
page execute and read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
5620000
|
remote allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page execute and read and write
|
||
61B7000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
4704000
|
trusted library allocation
|
page read and write
|
||
87E000
|
unkown
|
page execute and read and write
|
||
810000
|
heap
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
DA6000
|
heap
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
929000
|
unkown
|
page execute and write copy
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
470D000
|
trusted library allocation
|
page execute and read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
61D4000
|
trusted library allocation
|
page read and write
|
||
632000
|
unkown
|
page execute and read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
616E000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
61A5000
|
trusted library allocation
|
page read and write
|
||
6143000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
D4D000
|
heap
|
page read and write
|
||
4714000
|
trusted library allocation
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
489B000
|
trusted library allocation
|
page execute and read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
62C3000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
614D000
|
trusted library allocation
|
page read and write
|
||
61B5000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
616C000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
641000
|
unkown
|
page execute and write copy
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
85D000
|
unkown
|
page execute and write copy
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page execute and read and write
|
||
CF6000
|
heap
|
page read and write
|
||
5C24000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
unkown
|
page execute and read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
unkown
|
page execute and read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
922000
|
unkown
|
page execute and write copy
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
464000
|
unkown
|
page execute and write copy
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
6340000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5EDB000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
63DC000
|
trusted library allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
67B000
|
unkown
|
page execute and read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6161000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
6E7000
|
unkown
|
page execute and write copy
|
||
F10000
|
unkown
|
page readonly
|
||
534D000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
5EDC000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page execute and read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
626B000
|
trusted library allocation
|
page read and write
|
||
475C000
|
stack
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
88D000
|
unkown
|
page execute and read and write
|
||
39AE000
|
stack
|
page read and write
|
||
6DA0000
|
heap
|
page execute and read and write
|
||
920000
|
unkown
|
page execute and write copy
|
||
32DF000
|
stack
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
822000
|
unkown
|
page execute and write copy
|
||
4FF000
|
unkown
|
page execute and read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
826000
|
unkown
|
page execute and write copy
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
6F8000
|
unkown
|
page execute and write copy
|
||
45D1000
|
heap
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
538D000
|
stack
|
page read and write
|
||
6176000
|
trusted library allocation
|
page read and write
|
||
6123000
|
trusted library allocation
|
page read and write
|
||
920000
|
unkown
|
page execute and write copy
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
860000
|
unkown
|
page execute and read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
62AF000
|
trusted library allocation
|
page read and write
|
||
4DE000
|
unkown
|
page execute and read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
610D000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
912000
|
unkown
|
page execute and write copy
|
||
9A4000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
936000
|
unkown
|
page execute and read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6A8000
|
unkown
|
page execute and write copy
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
5DD000
|
unkown
|
page execute and read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
4703000
|
trusted library allocation
|
page execute and read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6222000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
6305000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
6072000
|
trusted library allocation
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
614B000
|
trusted library allocation
|
page read and write
|
||
5186000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
6123000
|
trusted library allocation
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5F9000
|
unkown
|
page execute and read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
unkown
|
page execute and read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
4897000
|
trusted library allocation
|
page execute and read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
There are 1253 hidden memdumps, click here to show them.