Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
5RjjCWZAVv.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5RjjCWZAVv.exe_991026602a4884d639df14ccdc40c22d8cd4_a84d9d60_4b16293f-45ad-45f9-a99c-27623100dc1c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECF0.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:30:28 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF30B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF35A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\5RjjCWZAVv.exe
|
"C:\Users\user\Desktop\5RjjCWZAVv.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 2024
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://lev-tolstoi.com/piN
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://lev-tolstoi.com/s
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=englisW
|
unknown
|
||
https://lev-tolstoi.com/p
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
aspecteirs.lat
|
|||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
sweepyribs.lat
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
sustainskelet.lat
|
|||
https://aui-cdn.atlassian.com/
|
unknown
|
||
rapeflowwj.lat
|
|||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://steambroadcast-test.akamaized
|
unknown
|
||
https://community.fastly.steamstatic.com/
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://lev-tolstoi.com/a
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
23.55.153.106
|
||
https://lev-tolstoi.com/?(BP
|
unknown
|
||
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://lev-tolstoi.com/
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://steambroadcastchat.aka
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
energyaffai.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://127.0.
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.gstatic.cn/re
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
https://lev-tolstoi.com/apieed
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&a
|
unknown
|
||
https://lev-tolstoi.com/api
|
104.21.66.86
|
||
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/globalv2.
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shar_
|
unknown
|
||
https://bbc-frontbucket-canary.prod-east.frontend.pub
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
grannyejh.lat
|
|||
https://store.steampowered.com/;Per
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://community.fas
|
unknown
|
||
https://bbc-frontbucket-static.stg-east.frontend.publi
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://lev-tolstoi.com/ms
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
necklacebudi.lat
|
|||
https://lev-tolstoi.com/es
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
|
unknown
|
||
https://lev-tolstoi.com/apir
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunitm
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://lev-tolstoi.com/apim
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-w.us-east-1.amazonaws.com
|
52.217.203.57
|
||
bitbucket.org
|
185.166.143.49
|
||
steamcommunity.com
|
23.55.153.106
|
||
lev-tolstoi.com
|
104.21.66.86
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
||
sweepyribs.lat
|
unknown
|
||
necklacebudi.lat
|
unknown
|
||
sustainskelet.lat
|
unknown
|
||
crosshuaht.lat
|
unknown
|
||
rapeflowwj.lat
|
unknown
|
||
grannyejh.lat
|
unknown
|
||
aspecteirs.lat
|
unknown
|
||
discokeyus.lat
|
unknown
|
||
energyaffai.lat
|
unknown
|
There are 4 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.66.86
|
lev-tolstoi.com
|
United States
|
||
23.55.153.106
|
steamcommunity.com
|
United States
|
||
185.166.143.49
|
bitbucket.org
|
Germany
|
||
52.217.203.57
|
s3-w.us-east-1.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
ProgramId
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
FileId
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
LongPathHash
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Name
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
OriginalFileName
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Publisher
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Version
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
BinFileVersion
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
BinaryType
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
ProductName
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
ProductVersion
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
LinkDate
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
BinProductVersion
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
AppxPackageFullName
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Size
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Language
|
||
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
331000
|
unkown
|
page execute and read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
5FD1000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
6014000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
384000
|
unkown
|
page execute and read and write
|
||
128F000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
341F000
|
stack
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
4F1D000
|
stack
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
50E6000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
635000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5FDA000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5B63000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
61D000
|
unkown
|
page execute and write copy
|
||
127A000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
600D000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
5580000
|
remote allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
575000
|
unkown
|
page execute and read and write
|
||
1296000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
E7B000
|
stack
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
unkown
|
page execute and read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
612000
|
unkown
|
page execute and write copy
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
55B000
|
unkown
|
page execute and read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
601D000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
597000
|
unkown
|
page execute and write copy
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
54A000
|
unkown
|
page execute and write copy
|
||
4AA1000
|
heap
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page readonly
|
||
1200000
|
direct allocation
|
page read and write
|
||
5A9000
|
unkown
|
page execute and read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
59B000
|
unkown
|
page execute and write copy
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
4F5C000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
stack
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
61C1000
|
trusted library allocation
|
page execute read
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5580000
|
remote allocation
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
heap
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
634000
|
unkown
|
page execute and write copy
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
600D000
|
stack
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page execute and read and write
|
||
1305000
|
heap
|
page read and write
|
||
121A000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
657B000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5B60000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
614E000
|
trusted library allocation
|
page read and write
|
||
6167000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
4EF000
|
unkown
|
page execute and read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
direct allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
6048000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
5BC4000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5B2000
|
unkown
|
page execute and write copy
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
615000
|
unkown
|
page execute and write copy
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
heap
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
581000
|
unkown
|
page execute and read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
2DEB000
|
stack
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
59D000
|
unkown
|
page execute and read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
5F1E000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
5FDE000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
61D000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
531D000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
590B000
|
stack
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
5FC6000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
604C000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
527000
|
unkown
|
page execute and write copy
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5FAC000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
390000
|
unkown
|
page execute and write copy
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
57A000
|
unkown
|
page execute and read and write
|
||
130D000
|
heap
|
page read and write
|
||
626000
|
unkown
|
page execute and write copy
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
570000
|
unkown
|
page execute and write copy
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
576000
|
unkown
|
page execute and write copy
|
||
3F5F000
|
stack
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
583F000
|
stack
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
384000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
60AB000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
52DD000
|
stack
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
53B000
|
unkown
|
page execute and read and write
|
||
60CD000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute and read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
601A000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
60DE000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page execute and read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
5B1A000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5580000
|
remote allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5CDC000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
direct allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
626000
|
unkown
|
page execute and write copy
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page execute and write copy
|
||
125B000
|
heap
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
57B000
|
unkown
|
page execute and write copy
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
unkown
|
page execute and write copy
|
||
600E000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page execute and write copy
|
||
61F000
|
unkown
|
page execute and write copy
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
6108000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
618D000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5FB7000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
stack
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5FD6000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
373000
|
unkown
|
page execute and read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
59A000
|
unkown
|
page execute and read and write
|
||
150F000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
6002000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
stack
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
600C000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
5953000
|
heap
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
F7B000
|
stack
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
555F000
|
stack
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
604A000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
unkown
|
page execute and read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
6018000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page read and write
|
||
61E000
|
unkown
|
page execute and read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page readonly
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
5FF6000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
2E97000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
528000
|
unkown
|
page execute and read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page readonly
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
4F62000
|
direct allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
53A000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
There are 703 hidden memdumps, click here to show them.