Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jSFUzuYPG9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jSFUzuYPG9.exe_89e0a2a224744ed9d773cdd526d4b8ba975a_428023ae_40004372-aeb3-4959-98da-6976da283c96\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C9C.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 07:41:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DD6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E25.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jSFUzuYPG9.exe
|
"C:\Users\user\Desktop\jSFUzuYPG9.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 2140
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://community.fastly.
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://lev-tolstoi.com/x
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500000.1&cta
|
unknown
|
||
https://sustainskelet.lat/
|
unknown
|
||
https://sustainskelet.lat/d
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_f6f292994d7c60be109e4c185cbc03032d36d17160d4e639
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
aspecteirs.lat
|
|||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
|
unknown
|
||
https://sustainskelet.lat/api
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://login.s7
|
unknown
|
||
https://lev-tolstoi.com/;#
|
unknown
|
||
https://lev-tolstoi.com/cE
|
unknown
|
||
sweepyribs.lat
|
|||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
sustainskelet.lat
|
|||
https://aui-cdn.atlassian.com/
|
unknown
|
||
rapeflowwj.lat
|
|||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://lev-tolstoi.com/h
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://community.fastly.steamstatic.com/
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://energyaffai.lat:443/api=
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
23.55.153.106
|
||
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l==
|
unknown
|
||
https://lev-tolstoi.com/
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://steamcommunity.com:443/profiles/76561199724331900
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
energyaffai.lat
|
|||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://grannyejh.lat:443/api$
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
https://lev-tolstoi.com/api
|
104.21.66.86
|
||
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://sweepyribs.lat:443/api
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
grannyejh.lat
|
|||
https://store.steampowered.com/;Per
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
|
unknown
|
||
https://sustainskelet.lat:443/apis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
necklacebudi.lat
|
|||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4CbW4pDk4pbW4CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript
|
unknown
|
||
https://bitbucket.org/f
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steambroadcast.akamaized.nP
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-w.us-east-1.amazonaws.com
|
52.216.152.124
|
||
bitbucket.org
|
185.166.143.49
|
||
steamcommunity.com
|
23.55.153.106
|
||
lev-tolstoi.com
|
104.21.66.86
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
||
sweepyribs.lat
|
unknown
|
||
necklacebudi.lat
|
unknown
|
||
sustainskelet.lat
|
unknown
|
||
crosshuaht.lat
|
unknown
|
||
rapeflowwj.lat
|
unknown
|
||
grannyejh.lat
|
unknown
|
||
aspecteirs.lat
|
unknown
|
||
discokeyus.lat
|
unknown
|
||
energyaffai.lat
|
unknown
|
There are 4 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.66.86
|
lev-tolstoi.com
|
United States
|
||
23.55.153.106
|
steamcommunity.com
|
United States
|
||
185.166.143.49
|
bitbucket.org
|
Germany
|
||
52.216.152.124
|
s3-w.us-east-1.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
ProgramId
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
FileId
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
LowerCaseLongPath
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
LongPathHash
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Name
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
OriginalFileName
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Publisher
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Version
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
BinFileVersion
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
BinaryType
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
ProductName
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
ProductVersion
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
LinkDate
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
BinProductVersion
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
AppxPackageFullName
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Size
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Language
|
||
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
51E0000
|
direct allocation
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
488E000
|
stack
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
C51000
|
unkown
|
page execute and write copy
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
63CD000
|
trusted library allocation
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
638D000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
309B000
|
stack
|
page read and write
|
||
63EB000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
6339000
|
trusted library allocation
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
63BC000
|
trusted library allocation
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
63EC000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
E30000
|
unkown
|
page execute and write copy
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
E69000
|
unkown
|
page execute and read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
5F45000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
E05000
|
unkown
|
page execute and read and write
|
||
E9F000
|
unkown
|
page execute and write copy
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
64CD000
|
stack
|
page read and write
|
||
E95000
|
unkown
|
page execute and write copy
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
EB3000
|
unkown
|
page execute and write copy
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
63D3000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
6282000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
521B000
|
stack
|
page read and write
|
||
5E3B000
|
trusted library allocation
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
5E3B000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
6281000
|
trusted library allocation
|
page read and write
|
||
ED1000
|
unkown
|
page execute and read and write
|
||
636D000
|
trusted library allocation
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
64F4000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
unkown
|
page execute and write copy
|
||
E65000
|
unkown
|
page execute and read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
64D9000
|
trusted library allocation
|
page readonly
|
||
ED3000
|
unkown
|
page execute and read and write
|
||
4D51000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
5EA4000
|
trusted library allocation
|
page read and write
|
||
EA2000
|
unkown
|
page execute and read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
6283000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
6395000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
5EF4000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
64DC000
|
trusted library allocation
|
page read and write
|
||
169B000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
6357000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page readonly
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
unkown
|
page execute and read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
63AF000
|
trusted library allocation
|
page read and write
|
||
5840000
|
remote allocation
|
page read and write
|
||
F17000
|
unkown
|
page execute and write copy
|
||
63A4000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
1643000
|
heap
|
page read and write
|
||
581F000
|
stack
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
EB6000
|
unkown
|
page execute and read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
6380000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
F39000
|
unkown
|
page execute and write copy
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
E28000
|
unkown
|
page execute and read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
6367000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
68F9000
|
trusted library allocation
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
6372000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
E85000
|
unkown
|
page execute and write copy
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
640E000
|
trusted library allocation
|
page read and write
|
||
1606000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5840000
|
remote allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
unkown
|
page execute and write copy
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
E41000
|
unkown
|
page execute and write copy
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
E42000
|
unkown
|
page execute and read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
unkown
|
page execute and write copy
|
||
5E8C000
|
trusted library allocation
|
page read and write
|
||
6338000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5FCD000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
CA4000
|
unkown
|
page execute and read and write
|
||
1643000
|
heap
|
page read and write
|
||
E66000
|
unkown
|
page execute and write copy
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
5643000
|
trusted library allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
F21000
|
unkown
|
page execute and read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
EFA000
|
unkown
|
page execute and read and write
|
||
565B000
|
trusted library allocation
|
page read and write
|
||
6281000
|
trusted library allocation
|
page read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
6468000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
642C000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
F20000
|
unkown
|
page execute and write copy
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
645E000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
E91000
|
unkown
|
page execute and write copy
|
||
6375000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
F3A000
|
unkown
|
page execute and write copy
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
F7B000
|
stack
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5DF9000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
5EEE000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
trusted library allocation
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
160C000
|
heap
|
page read and write
|
||
ED6000
|
unkown
|
page execute and read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
6344000
|
trusted library allocation
|
page read and write
|
||
F39000
|
unkown
|
page execute and read and write
|
||
ED2000
|
unkown
|
page execute and write copy
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5222000
|
direct allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
unkown
|
page execute and read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page execute and write copy
|
||
6468000
|
trusted library allocation
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
5EE6000
|
trusted library allocation
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
6283000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
heap
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
628B000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
E94000
|
unkown
|
page execute and read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
640E000
|
trusted library allocation
|
page read and write
|
||
5EA1000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
162B000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
64D3000
|
trusted library allocation
|
page read and write
|
||
E97000
|
unkown
|
page execute and read and write
|
||
6346000
|
trusted library allocation
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
5E3B000
|
trusted library allocation
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
628B000
|
trusted library allocation
|
page read and write
|
||
628A000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
unkown
|
page execute and read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5FC5000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
6342000
|
trusted library allocation
|
page read and write
|
||
15CE000
|
heap
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
63CC000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E3B000
|
trusted library allocation
|
page read and write
|
||
6343000
|
trusted library allocation
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
EC3000
|
unkown
|
page execute and read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
5F1C000
|
stack
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
E27000
|
unkown
|
page execute and write copy
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
C93000
|
unkown
|
page execute and read and write
|
||
E89000
|
unkown
|
page execute and read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
64D1000
|
trusted library allocation
|
page execute read
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
6283000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
6366000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page readonly
|
||
F14000
|
unkown
|
page execute and write copy
|
||
314D000
|
heap
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5EA3000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
EA5000
|
unkown
|
page execute and read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
636F000
|
trusted library allocation
|
page read and write
|
||
6281000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
E08000
|
unkown
|
page execute and write copy
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
169B000
|
heap
|
page read and write
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
169C000
|
heap
|
page read and write
|
||
5840000
|
remote allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
ED0000
|
unkown
|
page execute and write copy
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
unkown
|
page execute and write copy
|
||
632B000
|
trusted library allocation
|
page read and write
|
||
63BD000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
stack
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
6389000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
169F000
|
heap
|
page read and write
|
||
63AC000
|
trusted library allocation
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
63A6000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
6363000
|
trusted library allocation
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
1640000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
1647000
|
heap
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
CAF000
|
unkown
|
page execute and read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
E3C000
|
unkown
|
page execute and write copy
|
||
632E000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
F22000
|
unkown
|
page execute and write copy
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
628A000
|
trusted library allocation
|
page read and write
|
||
5EEE000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
51DD000
|
stack
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
5E74000
|
trusted library allocation
|
page read and write
|
||
628B000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
6322000
|
trusted library allocation
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
168C000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
unkown
|
page execute and write copy
|
||
5C9E000
|
stack
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
4D60000
|
heap
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
168C000
|
heap
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
6518000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
64DF000
|
trusted library allocation
|
page read and write
|
||
5E6C000
|
trusted library allocation
|
page read and write
|
||
5E63000
|
trusted library allocation
|
page read and write
|
||
168C000
|
heap
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
16A1000
|
heap
|
page read and write
|
||
64AD000
|
trusted library allocation
|
page read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
EA3000
|
unkown
|
page execute and write copy
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
unkown
|
page execute and write copy
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
stack
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
E32000
|
unkown
|
page execute and read and write
|
||
1460000
|
direct allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
3147000
|
heap
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
6499000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
unkown
|
page execute and write copy
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
160D000
|
heap
|
page read and write
|
||
E1F000
|
unkown
|
page execute and read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
5EE7000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
638E000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
5E7E000
|
trusted library allocation
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
E56000
|
unkown
|
page execute and write copy
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
644F000
|
trusted library allocation
|
page read and write
|
||
E84000
|
unkown
|
page execute and read and write
|
||
6328000
|
trusted library allocation
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
There are 658 hidden memdumps, click here to show them.