Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xwZfYpo16i.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:14 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xwZfYpo16i.exe
|
"C:\Users\user\Desktop\xwZfYpo16i.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=5612 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService
--lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
|
"C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=5172 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=2016,i,9763649198199615889,4058380472595766421,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=2456 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=2004,i,8592830290365317448,7467397625344037838,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
|
"C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=2456 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=2056,i,1132564284520540060,11615293102951086546,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
|
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=5364 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=5528 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 64 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/e2b1563c6670f193.phptE
|
unknown
|
||
http://185.215.113.37
|
unknown
|
||
http://185.215.113.37/Data
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php
|
185.215.113.43
|
||
http://185.215.113.37/e2b1563c6670f193.phpt
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
http://185.215.113.37/e2b1563c6670f193.php(3
|
unknown
|
||
http://185.215.113.37/ws
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php9EV
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
http://185.215.113.37/sE
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php
|
185.215.113.37
|
||
http://185.215.113.37/e2b1563c6670f193.phpeV
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpZ
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&
|
unknown
|
||
https://bathdoomgaz.store:443/api
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://licendfilteo.site:443/api
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://steamcommunity.com:443/profiles/76561199724331900
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
|
unknown
|
||
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://www.google.com/favicon.ico
|
172.217.16.132
|
||
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
|
unknown
|
||
https://dissapoiznw.store:443/apic
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
https://sergei-esenin.com:443/apiB
|
unknown
|
||
http://www.valvesoftware.com/le
|
unknown
|
||
https://avatars.akamai.steamstatic
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://sergei-esenin.com/K
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://community.akamai.steamstatic.com/
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&l=e
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://medal.tv
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://sergei-esenin.com/api1
|
unknown
|
||
https://clearancek.site:443/api
|
unknown
|
||
https://sergei-esenin.com/api-
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://login.steampowered.com/
|
unknown
|
||
https://store.steampowered.com/legal/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
|
unknown
|
||
https://recaptcha.net
|
unknown
|
||
https://store.steampowered.com/
|
unknown
|
||
https://play.google.com/log?format=json&hasfast=true&authuser=0
|
172.217.18.14
|
||
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
|
unknown
|
||
https://studennotediw.store:443/api
|
unknown
|
||
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
|
unknown
|
||
http://127.0.0.1:27060
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sergei-esenin.com
|
172.67.206.204
|
||
licendfilteo.site
|
unknown
|
||
clearancek.site
|
unknown
|
||
youtube-ui.l.google.com
|
172.217.23.110
|
||
steamcommunity.com
|
104.102.49.254
|
||
www3.l.google.com
|
142.250.184.206
|
||
play.google.com
|
172.217.18.14
|
||
www.google.com
|
172.217.16.132
|
||
youtube.com
|
142.250.185.110
|
||
bathdoomgaz.store
|
unknown
|
||
spirittunek.store
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
accounts.youtube.com
|
unknown
|
||
eaglepawnoy.store
|
unknown
|
||
www.youtube.com
|
unknown
|
||
dissapoiznw.store
|
unknown
|
There are 7 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
192.168.2.5
|
unknown
|
unknown
|
||
172.67.206.204
|
sergei-esenin.com
|
United States
|
||
172.217.18.14
|
play.google.com
|
United States
|
||
142.250.185.110
|
youtube.com
|
United States
|
||
172.217.23.110
|
youtube-ui.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
142.250.184.206
|
www3.l.google.com
|
United States
|
||
185.215.113.103
|
unknown
|
Portugal
|
||
172.217.16.132
|
www.google.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
cb428cafc9.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
4db5303091.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
641000
|
unkown
|
page execute and write copy
|
||
145E000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
641000
|
unkown
|
page execute and write copy
|
||
221000
|
unkown
|
page execute and read and write
|
||
641000
|
unkown
|
page execute and write copy
|
||
641000
|
unkown
|
page execute and write copy
|
||
B01000
|
unkown
|
page execute and read and write
|
||
B01000
|
unkown
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
272C000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
14D4000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
10FE000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
65E000
|
unkown
|
page readonly
|
||
A5C000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
4E41000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
53A000
|
unkown
|
page execute and read and write
|
||
E20000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
715E000
|
stack
|
page read and write
|
||
5624000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
286F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4CA000
|
unkown
|
page execute and read and write
|
||
14BE000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
146A000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
1898000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
E1A000
|
unkown
|
page execute and read and write
|
||
B6B000
|
unkown
|
page execute and read and write
|
||
372E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
4D1D000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3C31000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
4731000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
B69000
|
unkown
|
page write copy
|
||
53BF000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
3D6D000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14DE000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
E1C000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
B62000
|
unkown
|
page execute and read and write
|
||
48CF000
|
stack
|
page read and write
|
||
18BC000
|
heap
|
page read and write
|
||
6BDB000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1A84F000
|
stack
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
6FAC000
|
stack
|
page read and write
|
||
18B4000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
6FD000
|
unkown
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
6D9000
|
unkown
|
page execute and read and write
|
||
132E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
65E000
|
unkown
|
page readonly
|
||
14A7000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
88A5000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
154F000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page execute and write copy
|
||
3030000
|
direct allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
6E1F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
6FD000
|
unkown
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
21C000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
141E000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2EA7000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1A70E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
18C3000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
4E41000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4B13000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
18B3000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1A60F000
|
stack
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
4DF1000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
2E1000
|
unkown
|
page execute and write copy
|
||
14D4000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
6A1F000
|
stack
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
994000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
CF6000
|
unkown
|
page execute and read and write
|
||
DD9000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
C44000
|
heap
|
page read and write
|
||
1B42D000
|
stack
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
1A50F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
DD6000
|
unkown
|
page execute and read and write
|
||
142A000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1B32D000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
2750000
|
remote allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
888C000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page execute and read and write
|
||
35EE000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
5DD000
|
unkown
|
page execute and read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
1563000
|
heap
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
1AF2F000
|
stack
|
page read and write
|
||
2E1000
|
unkown
|
page execute and write copy
|
||
43AE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2AE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4C0D000
|
stack
|
page read and write
|
||
53B000
|
unkown
|
page execute and write copy
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
288B000
|
stack
|
page read and write
|
||
14E3000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4F6000
|
unkown
|
page execute and read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
65E000
|
unkown
|
page readonly
|
||
18D9000
|
heap
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
1C5000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
30EF000
|
stack
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
E0B000
|
unkown
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
796000
|
unkown
|
page execute and read and write
|
||
14BE000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
8693000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
796000
|
unkown
|
page execute and read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
289000
|
unkown
|
page write copy
|
||
1EC000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page write copy
|
||
F0C000
|
unkown
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
14DB000
|
heap
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
E1B000
|
unkown
|
page execute and write copy
|
||
2E0000
|
unkown
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
1B1AF000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1B0AE000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
F0C000
|
unkown
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
137F000
|
stack
|
page read and write
|
||
D7A000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
15DB000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
4E41000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
5F4000
|
unkown
|
page execute and write copy
|
||
4DF1000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
89C000
|
unkown
|
page readonly
|
||
D90000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
403F000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
52E1000
|
direct allocation
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
5F3000
|
unkown
|
page execute and write copy
|
||
1530000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page execute and read and write
|
||
67D5000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
5F3000
|
unkown
|
page execute and read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
386E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
130B000
|
stack
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
28B000
|
unkown
|
page execute and read and write
|
||
15FE000
|
stack
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
DD6000
|
unkown
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
3AF4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
722000
|
unkown
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
12FA000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
66B000
|
unkown
|
page write copy
|
||
F02000
|
unkown
|
page readonly
|
||
8890000
|
heap
|
page read and write
|
||
3FC0000
|
heap
|
page read and write
|
||
F0C000
|
unkown
|
page write copy
|
||
4DF1000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
BE4000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
D30000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C6A000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page execute and read and write
|
||
B00000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
1529000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
E1B000
|
unkown
|
page execute and write copy
|
||
4E5E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
282000
|
unkown
|
page execute and read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
10BD000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
67D6000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
72F0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
14A1000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
472F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
D89000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2E1000
|
unkown
|
page execute and read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
36EF000
|
stack
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
4DF1000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page execute and read and write
|
||
E3D000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
797000
|
unkown
|
page execute and write copy
|
||
1520000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
E1A000
|
unkown
|
page execute and read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
141C000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
2D0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1AB0E000
|
stack
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
B6B000
|
unkown
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
1B56D000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
8EA000
|
stack
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
F10000
|
unkown
|
page write copy
|
||
18BF000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
E0B000
|
unkown
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
725F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
89C000
|
unkown
|
page readonly
|
||
14D4000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
2730000
|
direct allocation
|
page execute and read and write
|
||
4501000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
DA0000
|
remote allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
6DB000
|
unkown
|
page execute and write copy
|
||
14D4000
|
heap
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
4C11000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
156A000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
301C000
|
stack
|
page read and write
|
||
F10000
|
unkown
|
page write copy
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
121E000
|
stack
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
65E000
|
unkown
|
page readonly
|
||
15BF000
|
stack
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
5E4000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
66B000
|
unkown
|
page write copy
|
||
4FF1000
|
direct allocation
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
DA0000
|
remote allocation
|
page read and write
|
||
6B90000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
2E1000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
76D000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
5331000
|
direct allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page write copy
|
||
DDC000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page write copy
|
||
296F000
|
stack
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
475000
|
heap
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
417F000
|
stack
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
362E000
|
stack
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
66B000
|
unkown
|
page write copy
|
||
476E000
|
stack
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
F0C000
|
unkown
|
page write copy
|
||
E11000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page write copy
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
1B46D000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1A98E000
|
stack
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
89C000
|
unkown
|
page readonly
|
||
3C31000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
F0C000
|
unkown
|
page write copy
|
||
22A0000
|
heap
|
page read and write
|
||
416000
|
unkown
|
page execute and read and write
|
||
386E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
5F3000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
797000
|
unkown
|
page execute and write copy
|
||
11BF000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
DCD000
|
heap
|
page read and write
|
||
2740000
|
direct allocation
|
page execute and read and write
|
||
303E000
|
stack
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
522000
|
unkown
|
page execute and read and write
|
||
C20000
|
direct allocation
|
page execute and read and write
|
||
374F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
D30000
|
direct allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
89C000
|
unkown
|
page readonly
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
68DF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
130B000
|
stack
|
page read and write
|
||
1B2EF000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
CF6000
|
unkown
|
page execute and read and write
|
||
DA0000
|
remote allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
66C000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3874000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
722000
|
unkown
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
4DF1000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
EDC000
|
unkown
|
page readonly
|
||
14D4000
|
heap
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
5F4000
|
unkown
|
page execute and write copy
|
||
47CE000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
50CF000
|
stack
|
page read and write
|
||
4C1D000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
6F1000
|
unkown
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
72FE000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
52B000
|
unkown
|
page execute and read and write
|
||
18B9000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
412E000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
6CDC000
|
stack
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
D5B000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
16B4000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
1CE000
|
stack
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
5E4000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2750000
|
remote allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
496D000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
1491000
|
heap
|
page read and write
|
||
289000
|
unkown
|
page write copy
|
||
14D4000
|
heap
|
page read and write
|
||
1B06F000
|
stack
|
page read and write
|
||
8690000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
E3D000
|
heap
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4CA000
|
unkown
|
page execute and read and write
|
||
840000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
1552000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
1541000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
66B000
|
unkown
|
page write copy
|
||
BE4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
49BD000
|
stack
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
6B5F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
155E000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1B1EE000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
1529000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
DC0000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
5F3000
|
unkown
|
page execute and write copy
|
||
13F0000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
1AACF000
|
stack
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page write copy
|
||
43FF000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
D4F000
|
stack
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
221000
|
unkown
|
page execute and write copy
|
||
128A000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1AC0C000
|
stack
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
F0C000
|
unkown
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
DFE000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
F02000
|
unkown
|
page readonly
|
||
3C30000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
2750000
|
remote allocation
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
3EFF000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1A88D000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
72F1000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
4541000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
4FDD000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
146E000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1A74E000
|
stack
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
18BA000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
3B7D000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
5DD000
|
unkown
|
page execute and read and write
|
||
14D4000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
FBB000
|
unkown
|
page execute and write copy
|
||
994000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
3C31000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
2920000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
1AF6E000
|
stack
|
page read and write
|
||
4550000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
B62000
|
unkown
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
FBB000
|
unkown
|
page execute and write copy
|
||
312E000
|
stack
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1A9CE000
|
stack
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
1890000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
2D0000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
F14000
|
unkown
|
page readonly
|
||
4DF1000
|
heap
|
page read and write
|
||
4AE9000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
CC9000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
DB0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
There are 1664 hidden memdumps, click here to show them.