Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TmmiCE5Ulm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TmmiCE5Ulm.exe_35e225ef6e75852b82d9993be1976e3524db6_9989bd0e_5ec9a849-ba9f-49b2-a7bc-42651bb1cac4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C02.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:26:53 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DA9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DC9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TmmiCE5Ulm.exe
|
"C:\Users\user\Desktop\TmmiCE5Ulm.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 1924
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://bitbucket.org/TU
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
aspecteirs.lat
|
|||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
sweepyribs.lat
|
|||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
sustainskelet.lat
|
|||
https://aui-cdn.atlassian.com/
|
unknown
|
||
rapeflowwj.lat
|
|||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://community.fastly.steamstatic.com/
|
unknown
|
||
https://lev-tolstoi.com/d
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://lev-tolstoi.com/pi:
|
unknown
|
||
https://lev-tolstoi.com/b
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
23.55.153.106
|
||
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://lev-tolstoi.com/
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://lev-tolstoi.com/tF
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
energyaffai.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
https://lev-tolstoi.com/api
|
104.21.66.86
|
||
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
grannyejh.lat
|
|||
https://store.steampowered.com/;
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-pg=q
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exef
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
necklacebudi.lat
|
|||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe_1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://lev-tolstoi.com/=9
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
||
https://medal.tv
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
|
185.166.143.49
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-w.us-east-1.amazonaws.com
|
3.5.16.86
|
||
bitbucket.org
|
185.166.143.49
|
||
steamcommunity.com
|
23.55.153.106
|
||
lev-tolstoi.com
|
104.21.66.86
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
||
sweepyribs.lat
|
unknown
|
||
necklacebudi.lat
|
unknown
|
||
sustainskelet.lat
|
unknown
|
||
crosshuaht.lat
|
unknown
|
||
rapeflowwj.lat
|
unknown
|
||
grannyejh.lat
|
unknown
|
||
aspecteirs.lat
|
unknown
|
||
discokeyus.lat
|
unknown
|
||
energyaffai.lat
|
unknown
|
There are 4 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.66.86
|
lev-tolstoi.com
|
United States
|
||
23.55.153.106
|
steamcommunity.com
|
United States
|
||
185.166.143.49
|
bitbucket.org
|
Germany
|
||
3.5.16.86
|
s3-w.us-east-1.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
ProgramId
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
FileId
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
LongPathHash
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Name
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
OriginalFileName
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Publisher
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Version
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
BinFileVersion
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
BinaryType
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
ProductName
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
ProductVersion
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
LinkDate
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
BinProductVersion
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
AppxPackageFullName
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Size
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Language
|
||
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F70000
|
direct allocation
|
page read and write
|
||
CDB000
|
stack
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
97C000
|
unkown
|
page execute and write copy
|
||
603C000
|
trusted library allocation
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page execute and write copy
|
||
60DF000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
6170000
|
trusted library allocation
|
page readonly
|
||
96C000
|
unkown
|
page execute and write copy
|
||
11A6000
|
heap
|
page read and write
|
||
9DA000
|
unkown
|
page execute and write copy
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
1128000
|
heap
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
unkown
|
page execute and read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
60F7000
|
trusted library allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
5FD1000
|
trusted library allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
50FD000
|
stack
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
unkown
|
page execute and write copy
|
||
4AE1000
|
heap
|
page read and write
|
||
5FFD000
|
trusted library allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
55D0000
|
remote allocation
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
6009000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
744000
|
unkown
|
page execute and write copy
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
750000
|
unkown
|
page execute and write copy
|
||
4FB2000
|
direct allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
932000
|
unkown
|
page execute and write copy
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5FDF000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page execute and write copy
|
||
95B000
|
unkown
|
page execute and write copy
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
60EB000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
94F000
|
unkown
|
page execute and write copy
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page execute and read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
6799000
|
trusted library allocation
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
remote allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
9E9000
|
unkown
|
page execute and write copy
|
||
5F28000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
5FD6000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
90E000
|
unkown
|
page execute and read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
1146000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
93C000
|
unkown
|
page execute and read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
733000
|
unkown
|
page execute and read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
unkown
|
page execute and read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
97E000
|
unkown
|
page execute and read and write
|
||
962000
|
unkown
|
page execute and write copy
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
6164000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
5F2C000
|
trusted library allocation
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
54AD000
|
stack
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
92B000
|
unkown
|
page execute and read and write
|
||
546F000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page readonly
|
||
1143000
|
heap
|
page read and write
|
||
6179000
|
trusted library allocation
|
page readonly
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
118C000
|
heap
|
page read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
2D27000
|
heap
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
92C000
|
unkown
|
page execute and write copy
|
||
6069000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B53000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5B5B000
|
trusted library allocation
|
page read and write
|
||
90F000
|
unkown
|
page execute and write copy
|
||
9D3000
|
unkown
|
page execute and write copy
|
||
44AE000
|
stack
|
page read and write
|
||
5973000
|
heap
|
page read and write
|
||
9C0000
|
unkown
|
page execute and read and write
|
||
1184000
|
heap
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
55D0000
|
remote allocation
|
page read and write
|
||
8D3000
|
unkown
|
page execute and read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
951000
|
unkown
|
page execute and read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
unkown
|
page execute and write copy
|
||
600A000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
901000
|
unkown
|
page execute and write copy
|
||
5132000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5F28000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page execute and read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
744000
|
unkown
|
page execute and read and write
|
||
613D000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
unkown
|
page execute and write copy
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
5FC6000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5FC5000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
unkown
|
page execute and write copy
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
60AD000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
5FCC000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
11B9000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
614D000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5B3C000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
5B63000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
532D000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
96D000
|
unkown
|
page execute and read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
8AB000
|
unkown
|
page execute and read and write
|
||
1149000
|
heap
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
963000
|
unkown
|
page execute and read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and read and write
|
||
6171000
|
trusted library allocation
|
page execute read
|
||
5BD3000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
595C000
|
stack
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
601B000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
6009000
|
trusted library allocation
|
page read and write
|
||
5B8A000
|
trusted library allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5F2E000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
9EA000
|
unkown
|
page execute and write copy
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
94C000
|
unkown
|
page execute and write copy
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
unkown
|
page execute and write copy
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
53FC000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
9C6000
|
unkown
|
page execute and write copy
|
||
1149000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
8E5000
|
unkown
|
page execute and read and write
|
||
11A6000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
6067000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5FF3000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
118C000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
561D000
|
stack
|
page read and write
|
||
5B27000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
40ED000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
8E4000
|
unkown
|
page execute and write copy
|
||
49AE000
|
stack
|
page read and write
|
||
8BC000
|
unkown
|
page execute and read and write
|
||
5A8C000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
52DD000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
unkown
|
page execute and write copy
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
114D000
|
heap
|
page read and write
|
||
5FFA000
|
trusted library allocation
|
page read and write
|
||
5F22000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
94E000
|
unkown
|
page execute and read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
926000
|
unkown
|
page execute and write copy
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
571D000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
unkown
|
page execute and write copy
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
5B54000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
unkown
|
page execute and read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
616D000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5FD7000
|
trusted library allocation
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
9E9000
|
unkown
|
page execute and read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5F22000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
5B54000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
stack
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
600B000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
910000
|
unkown
|
page execute and read and write
|
||
392F000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
DDA000
|
stack
|
page read and write
|
There are 720 hidden memdumps, click here to show them.