Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yuij5p5p3W.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_yuij5p5p3W.exe_7993edd1949fe3b12f176beeaa63fdd4ada698f_e019711b_98493af3-49f5-4220-9844-f4aa7ce4fe6c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER152F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:36:00 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16A7.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\yuij5p5p3W.exe
|
"C:\Users\user\Desktop\yuij5p5p3W.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 2016
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
|
unknown
|
||
https://observerfry.lat/m
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
slipperyloo.lat
|
|||
curverpluch.lat
|
|||
tentabatte.lat
|
|||
manyrestro.lat
|
|||
https://observerfry.lat/t
|
unknown
|
||
https://observerfry.lat/pi
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://bitbucket.org/d
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
|
unknown
|
||
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
https://observerfry.lat/G
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
bashfulacid.lat
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://observerfry.lat/apisw
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
|
185.166.143.50
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exeu
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=16964251364
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX-
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://observerfry.lat:443/api
|
unknown
|
||
observerfry.lat
|
|||
https://bitbucket.org/
|
unknown
|
||
wordyfindy.lat
|
|||
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://observerfry.lat/tem
|
unknown
|
||
https://observerfry.lat/api
|
104.21.36.201
|
||
https://bbc-object-storage--frontbucket.us-east-1.pr
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-website
|
unknown
|
||
shapestickyr.lat
|
|||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://observerfry.lat/apiObGoF
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://observerfry.lat/
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://dz8aopenkvv6s.cloudfront.net
|
unknown
|
||
talkynicer.lat
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeN
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
|
unknown
|
||
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://observerfry.lat/x
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 54 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-w.us-east-1.amazonaws.com
|
54.231.128.9
|
||
bitbucket.org
|
185.166.143.50
|
||
observerfry.lat
|
104.21.36.201
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
54.231.128.9
|
s3-w.us-east-1.amazonaws.com
|
United States
|
||
104.21.36.201
|
observerfry.lat
|
United States
|
||
185.166.143.50
|
bitbucket.org
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
ProgramId
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
FileId
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
LowerCaseLongPath
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
LongPathHash
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Name
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
OriginalFileName
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Publisher
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Version
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
BinFileVersion
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
BinaryType
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
ProductName
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
ProductVersion
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
LinkDate
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
BinProductVersion
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
AppxPackageFullName
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Size
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Language
|
||
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
00180012D8270AF5
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
821000
|
unkown
|
page execute and read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
71B000
|
heap
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
A96000
|
unkown
|
page execute and read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
A86000
|
unkown
|
page execute and read and write
|
||
781000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
53EA000
|
trusted library allocation
|
page read and write
|
||
590B000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page execute read
|
||
790000
|
heap
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
A64000
|
unkown
|
page execute and read and write
|
||
53D6000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
57FF000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
540C000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
58A4000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53E5000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
A15000
|
unkown
|
page execute and read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page execute and read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53F8000
|
trusted library allocation
|
page read and write
|
||
A43000
|
unkown
|
page execute and read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
87F000
|
unkown
|
page execute and write copy
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
B02000
|
unkown
|
page execute and write copy
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
58E8000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
9FF000
|
unkown
|
page execute and write copy
|
||
5975000
|
trusted library allocation
|
page read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
2790000
|
direct allocation
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
A76000
|
unkown
|
page execute and write copy
|
||
770000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
unkown
|
page execute and write copy
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
A97000
|
unkown
|
page execute and write copy
|
||
568C000
|
stack
|
page read and write
|
||
B0A000
|
unkown
|
page execute and write copy
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
875000
|
unkown
|
page execute and read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
606C000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
48AB000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
4EE0000
|
remote allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
402F000
|
stack
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
49ED000
|
stack
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
AF2000
|
unkown
|
page execute and read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
274C000
|
stack
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
53F2000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
880000
|
unkown
|
page execute and read and write
|
||
758000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
58ED000
|
stack
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
A75000
|
unkown
|
page execute and read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
53F2000
|
trusted library allocation
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5A38000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
B04000
|
unkown
|
page execute and write copy
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
58C8000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
5421000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
5901000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53F3000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
53F6000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
53F8000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
537A000
|
trusted library allocation
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
865000
|
unkown
|
page execute and read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
53C5000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
3EA000
|
stack
|
page read and write
|
||
A9F000
|
unkown
|
page execute and read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
5732000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
A32000
|
unkown
|
page execute and write copy
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
573A000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
53F7000
|
trusted library allocation
|
page read and write
|
||
A57000
|
unkown
|
page execute and write copy
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
unkown
|
page execute and read and write
|
||
4EDF000
|
stack
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
769000
|
heap
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
A84000
|
unkown
|
page execute and write copy
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
4BD9000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page readonly
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
5143000
|
heap
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
58A6000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
58FD000
|
trusted library allocation
|
page read and write
|
||
A78000
|
unkown
|
page execute and read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
B03000
|
unkown
|
page execute and read and write
|
||
767000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
53F3000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
48B4000
|
direct allocation
|
page read and write
|
||
A8F000
|
unkown
|
page execute and write copy
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
remote allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
B02000
|
unkown
|
page execute and write copy
|
||
5BA0000
|
trusted library allocation
|
page readonly
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5373000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page readonly
|
||
9F6000
|
unkown
|
page execute and write copy
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
unkown
|
page execute and write copy
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
A58000
|
unkown
|
page execute and read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
53D5000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
535C000
|
trusted library allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
4CDD000
|
trusted library allocation
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
38EE000
|
stack
|
page read and write
|
||
53D3000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
unkown
|
page execute and write copy
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
53E5000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
9F7000
|
unkown
|
page execute and read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
821000
|
unkown
|
page execute and write copy
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
7A4000
|
heap
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
5361000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
A19000
|
unkown
|
page execute and read and write
|
||
53EA000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
4CD3000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
5654000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
A18000
|
unkown
|
page execute and write copy
|
||
2B2E000
|
stack
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5A26000
|
trusted library allocation
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
9E2000
|
unkown
|
page execute and write copy
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
A06000
|
unkown
|
page execute and write copy
|
||
720000
|
heap
|
page read and write
|
||
5898000
|
trusted library allocation
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
heap
|
page read and write
|
||
540C000
|
trusted library allocation
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
unkown
|
page execute and read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
4C5D000
|
stack
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
5558000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
B19000
|
unkown
|
page execute and write copy
|
||
5657000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
5B5A000
|
trusted library allocation
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
53D3000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
unkown
|
page execute and read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
remote allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
B18000
|
unkown
|
page execute and write copy
|
||
5398000
|
trusted library allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
800000
|
direct allocation
|
page read and write
|
||
9FD000
|
unkown
|
page execute and write copy
|
||
416F000
|
stack
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
572A000
|
trusted library allocation
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
59C8000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
unkown
|
page execute and write copy
|
||
3C6F000
|
stack
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
5907000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
591F000
|
trusted library allocation
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
820000
|
unkown
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
unkown
|
page execute and write copy
|
||
78F000
|
heap
|
page read and write
|
||
5657000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
77D000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
53E5000
|
trusted library allocation
|
page read and write
|
||
4A29000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
5905000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
A08000
|
unkown
|
page execute and read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
881000
|
unkown
|
page execute and write copy
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
2790000
|
direct allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
565B000
|
trusted library allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
B18000
|
unkown
|
page execute and read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
27A7000
|
heap
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
875000
|
unkown
|
page execute and write copy
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
A13000
|
unkown
|
page execute and write copy
|
There are 696 hidden memdumps, click here to show them.