Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
y001L6lEK4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\y001L6lEK4.exe
|
"C:\Users\user\Desktop\y001L6lEK4.exe"
|
||
C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe
|
"C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe"
|
||
C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe
|
"C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.206/
|
185.215.113.206
|
||
curverpluch.lat
|
|||
slipperyloo.lat
|
|||
tentabatte.lat
|
|||
manyrestro.lat
|
|||
http://185.215.113.16/X
|
unknown
|
||
https://observerfry.lat/pi
|
unknown
|
||
http://185.215.113.16/off/def.exeQ
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpl
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://185.215.113.206/ws
|
unknown
|
||
https://observerfry.lat/d
|
unknown
|
||
https://observerfry.lat/api5t
|
unknown
|
||
bashfulacid.lat
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exeh
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://observerfry.lat:443/apil
|
unknown
|
||
https://observerfry.lat:443/api
|
unknown
|
||
observerfry.lat
|
|||
http://185.215.113.206/c4becf79229cb002.php0c
|
unknown
|
||
https://observerfry.lat:443/apin.txtPK
|
unknown
|
||
wordyfindy.lat
|
|||
http://185.215.113.206/c4becf79229cb002.phpm$
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://185.215.113.206/l
|
unknown
|
||
https://observerfry.lat/api
|
172.67.199.72
|
||
http://185.215.113.206f
|
unknown
|
||
shapestickyr.lat
|
|||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php
|
185.215.113.206
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.php/
|
unknown
|
||
https://observerfry.lat/
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://185.215.113.16:80/off/def.exet=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
|
unknown
|
||
http://185.215.113.206/e
|
unknown
|
||
talkynicer.lat
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crl.microh
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpH
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
http://185.215.113.16/off/def.exefDb
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://185.215.113.206
|
unknown
|
||
https://observerfry.lat/apiletGw
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpT
|
unknown
|
||
http://185.215.113.16/(
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://185.215.113.206/c4becf79229cb002.phpW
|
unknown
|
There are 55 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
observerfry.lat
|
172.67.199.72
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.206
|
unknown
|
Portugal
|
||
172.67.199.72
|
observerfry.lat
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B21000
|
unkown
|
page execute and read and write
|
||
114D000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
30D000
|
unkown
|
page execute and read and write
|
||
13CC000
|
heap
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
61F6000
|
trusted library allocation
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
6250000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3CC000
|
unkown
|
page execute and write copy
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
F34000
|
unkown
|
page execute and read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
488F000
|
stack
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
unkown
|
page write copy
|
||
309000
|
unkown
|
page execute and write copy
|
||
6303000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page execute and read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
6325000
|
trusted library allocation
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
unkown
|
page execute and read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
F8B000
|
unkown
|
page execute and write copy
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
28E000
|
unkown
|
page execute and read and write
|
||
122000
|
unkown
|
page execute and read and write
|
||
62CB000
|
trusted library allocation
|
page read and write
|
||
6264000
|
trusted library allocation
|
page read and write
|
||
63AC000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
6EEF000
|
stack
|
page read and write
|
||
634A000
|
trusted library allocation
|
page read and write
|
||
620B000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
141D000
|
heap
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
2CB000
|
unkown
|
page execute and write copy
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
629B000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
48C4000
|
heap
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
6281000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
62F3000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
F64000
|
unkown
|
page execute and read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
unkown
|
page execute and read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6302000
|
trusted library allocation
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
2E6000
|
unkown
|
page execute and write copy
|
||
627C000
|
trusted library allocation
|
page read and write
|
||
478B000
|
stack
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
34F000
|
unkown
|
page execute and write copy
|
||
A3F000
|
stack
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
2F1000
|
unkown
|
page execute and write copy
|
||
142F000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
25AB000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
30B000
|
unkown
|
page execute and write copy
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
unkown
|
page execute and read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
unkown
|
page execute and write copy
|
||
3FFE000
|
stack
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
62C7000
|
trusted library allocation
|
page read and write
|
||
634E000
|
trusted library allocation
|
page read and write
|
||
329000
|
unkown
|
page execute and read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
6228000
|
trusted library allocation
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
A6E000
|
stack
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
636A000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
62E1000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
35E000
|
unkown
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
6272000
|
trusted library allocation
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
620D000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
101A000
|
unkown
|
page execute and read and write
|
||
FA6000
|
unkown
|
page execute and write copy
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
621A000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute and write copy
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
6207000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
632D000
|
trusted library allocation
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
623F000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
61F2000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
FCC000
|
unkown
|
page execute and write copy
|
||
954000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
626B000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
5E88000
|
trusted library allocation
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
332000
|
unkown
|
page execute and write copy
|
||
954000
|
heap
|
page read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
625B000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
629F000
|
trusted library allocation
|
page read and write
|
||
473D000
|
trusted library allocation
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6209000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
6327000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
12A000
|
unkown
|
page execute and write copy
|
||
48C1000
|
heap
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
62E9000
|
trusted library allocation
|
page read and write
|
||
F5B000
|
unkown
|
page execute and read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
6352000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
4733000
|
trusted library allocation
|
page execute and read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
3AC000
|
unkown
|
page execute and read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
30A000
|
unkown
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
12A000
|
unkown
|
page execute and write copy
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
2AA000
|
unkown
|
page execute and read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
25B7000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
634C000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
remote allocation
|
page read and write
|
||
379000
|
unkown
|
page execute and write copy
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
629C000
|
trusted library allocation
|
page read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3BB000
|
unkown
|
page execute and write copy
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
FCA000
|
unkown
|
page execute and write copy
|
||
335000
|
unkown
|
page execute and write copy
|
||
5E88000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
6321000
|
trusted library allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
63D1000
|
trusted library allocation
|
page read and write
|
||
562C000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
62D9000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
62C3000
|
trusted library allocation
|
page read and write
|
||
F5C000
|
unkown
|
page execute and write copy
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
63BA000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
632B000
|
trusted library allocation
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
62F1000
|
trusted library allocation
|
page read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
63AE000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
62FC000
|
trusted library allocation
|
page read and write
|
||
66A6000
|
trusted library allocation
|
page read and write
|
||
F8D000
|
unkown
|
page execute and read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
48AA000
|
trusted library allocation
|
page execute and read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
BB6000
|
unkown
|
page execute and read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
unkown
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
unkown
|
page execute and read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
6272000
|
trusted library allocation
|
page read and write
|
||
136000
|
unkown
|
page execute and write copy
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
101B000
|
unkown
|
page execute and write copy
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6461000
|
trusted library allocation
|
page read and write
|
||
62E7000
|
trusted library allocation
|
page read and write
|
||
B20000
|
unkown
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
100C000
|
unkown
|
page execute and write copy
|
||
636A000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
636C000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
6367000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
622A000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
61FB000
|
trusted library allocation
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
AED000
|
heap
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
2CB7000
|
heap
|
page read and write
|
||
5D9A000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
62ED000
|
trusted library allocation
|
page read and write
|
||
6352000
|
trusted library allocation
|
page read and write
|
||
63F3000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
63CF000
|
trusted library allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
F03000
|
unkown
|
page execute and write copy
|
||
FD9000
|
unkown
|
page execute and read and write
|
||
FCB000
|
unkown
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
13BE000
|
heap
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
2EA000
|
unkown
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
62E8000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
62A5000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
F82000
|
unkown
|
page execute and write copy
|
||
3CA000
|
unkown
|
page execute and write copy
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
2C80000
|
direct allocation
|
page execute and read and write
|
||
D6A000
|
unkown
|
page write copy
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
61D6000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
61FA000
|
trusted library allocation
|
page read and write
|
||
6594000
|
trusted library allocation
|
page read and write
|
||
334000
|
unkown
|
page execute and read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
6407000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page read and write
|
||
62EF000
|
trusted library allocation
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
6226000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
D6C000
|
unkown
|
page execute and write copy
|
||
4700000
|
heap
|
page read and write
|
||
351000
|
unkown
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
6344000
|
trusted library allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page read and write
|
||
BAE000
|
unkown
|
page execute and read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
8F5000
|
stack
|
page read and write
|
||
6698000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
6401000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
31D000
|
unkown
|
page execute and write copy
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
D58000
|
unkown
|
page execute and read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
629B000
|
trusted library allocation
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
356000
|
unkown
|
page execute and write copy
|
||
45F1000
|
heap
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
6226000
|
trusted library allocation
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
63D5000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
4734000
|
trusted library allocation
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
623E000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
ECA000
|
unkown
|
page execute and write copy
|
||
AB0000
|
unkown
|
page readonly
|
||
30A0000
|
direct allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
625D000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6264000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6162000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
6427000
|
trusted library allocation
|
page read and write
|
||
6262000
|
trusted library allocation
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
2CA0000
|
direct allocation
|
page execute and read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
62A7000
|
trusted library allocation
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
unkown
|
page execute and write copy
|
||
387E000
|
stack
|
page read and write
|
||
6404000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
622C000
|
trusted library allocation
|
page read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
337000
|
unkown
|
page execute and read and write
|
||
6340000
|
trusted library allocation
|
page read and write
|
||
5E0F000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1005000
|
unkown
|
page execute and write copy
|
||
4DE1000
|
heap
|
page read and write
|
||
6375000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
6244000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
2E7000
|
unkown
|
page execute and read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
F13000
|
unkown
|
page execute and write copy
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
633A000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
6366000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
2E8000
|
unkown
|
page execute and write copy
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
62A5000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
58E0000
|
remote allocation
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
628B000
|
trusted library allocation
|
page read and write
|
||
6254000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
F83000
|
unkown
|
page execute and read and write
|
||
626C000
|
trusted library allocation
|
page read and write
|
||
6A54000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
6308000
|
trusted library allocation
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
654D000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
remote allocation
|
page read and write
|
||
F99000
|
unkown
|
page execute and read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
unkown
|
page execute and write copy
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page execute and read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
FF2000
|
unkown
|
page execute and read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
62A2000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
628A000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page read and write
|
||
62F3000
|
trusted library allocation
|
page read and write
|
||
6385000
|
trusted library allocation
|
page read and write
|
||
6CBD000
|
stack
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
4A2C000
|
stack
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
F08000
|
unkown
|
page execute and read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
101A000
|
unkown
|
page execute and write copy
|
||
AE2000
|
heap
|
page read and write
|
||
627C000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
625E000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
352000
|
unkown
|
page execute and write copy
|
||
413E000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
242F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
3CC000
|
unkown
|
page execute and write copy
|
||
759000
|
stack
|
page read and write
|
||
636D000
|
trusted library allocation
|
page read and write
|
||
48BB000
|
trusted library allocation
|
page execute and read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
1004000
|
unkown
|
page execute and write copy
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
61B6000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
290000
|
unkown
|
page execute and write copy
|
||
954000
|
heap
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
627F000
|
trusted library allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
622D000
|
trusted library allocation
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
634C000
|
trusted library allocation
|
page read and write
|
||
61F4000
|
trusted library allocation
|
page read and write
|
||
621E000
|
trusted library allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
F74000
|
unkown
|
page execute and read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
6242000
|
trusted library allocation
|
page read and write
|
||
6213000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
62F5000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5BC4000
|
trusted library allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
direct allocation
|
page execute and read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
629E000
|
trusted library allocation
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
623C000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
6215000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
634E000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
F72000
|
unkown
|
page execute and write copy
|
||
2E3F000
|
stack
|
page read and write
|
||
6224000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
6273000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
142F000
|
heap
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
6302000
|
trusted library allocation
|
page read and write
|
||
6243000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6215000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
604D000
|
trusted library allocation
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
63D7000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
6403000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
direct allocation
|
page execute and read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
4744000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
61F3000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
6222000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
122000
|
unkown
|
page execute and write copy
|
||
F55000
|
unkown
|
page execute and write copy
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
626B000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
F4C000
|
unkown
|
page execute and write copy
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
D9F000
|
unkown
|
page execute and write copy
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
654D000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
2B7000
|
unkown
|
page execute and write copy
|
||
48C1000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3BB000
|
unkown
|
page execute and write copy
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
54ED000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
B21000
|
unkown
|
page execute and write copy
|
||
61F6000
|
trusted library allocation
|
page read and write
|
||
323000
|
unkown
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
627A000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
63DB000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
625A000
|
trusted library allocation
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
F96000
|
unkown
|
page execute and write copy
|
||
63B2000
|
trusted library allocation
|
page read and write
|
||
62A5000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
632B000
|
trusted library allocation
|
page read and write
|
||
F75000
|
unkown
|
page execute and write copy
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
621E000
|
trusted library allocation
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
62C8000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
6161000
|
trusted library allocation
|
page read and write
|
||
355000
|
unkown
|
page execute and read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
6368000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
2BFC000
|
stack
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
48C1000
|
heap
|
page read and write
|
||
1004000
|
unkown
|
page execute and read and write
|
||
6391000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
6265000
|
trusted library allocation
|
page read and write
|
||
6325000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
620C000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
100C000
|
unkown
|
page execute and write copy
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
13E9000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
13B2000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
623A000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
2B7000
|
unkown
|
page execute and read and write
|
||
5DFE000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
61FA000
|
trusted library allocation
|
page read and write
|
||
37C000
|
unkown
|
page execute and read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
57C000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
126000
|
unkown
|
page write copy
|
||
3C3F000
|
stack
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
48B7000
|
trusted library allocation
|
page execute and read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
63BC000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
620D000
|
trusted library allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
625D000
|
trusted library allocation
|
page read and write
|
||
5DC2000
|
trusted library allocation
|
page read and write
|
||
4D7C000
|
stack
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
unkown
|
page execute and read and write
|
||
8FE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
6222000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
324000
|
unkown
|
page execute and write copy
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
direct allocation
|
page read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
6DE0000
|
heap
|
page execute and read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
6299000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
2FE000
|
unkown
|
page execute and read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
626A000
|
trusted library allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
AF0000
|
direct allocation
|
page read and write
|
||
FA9000
|
unkown
|
page execute and read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
629F000
|
trusted library allocation
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
D78000
|
unkown
|
page execute and write copy
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
EEE000
|
unkown
|
page execute and write copy
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
6308000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
5ED9000
|
trusted library allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
6329000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
61F8000
|
trusted library allocation
|
page read and write
|
||
6262000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
heap
|
page execute and read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
625F000
|
trusted library allocation
|
page read and write
|
||
B03000
|
unkown
|
page write copy
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
12A000
|
unkown
|
page execute and read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
126000
|
unkown
|
page write copy
|
||
6227000
|
trusted library allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
EF6000
|
unkown
|
page execute and read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
3AB000
|
unkown
|
page execute and write copy
|
||
4DE1000
|
heap
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
F22000
|
unkown
|
page execute and write copy
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
unkown
|
page execute and read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
256F000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
626A000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
There are 1197 hidden memdumps, click here to show them.