Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
iaLId0uLUw.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_iaLId0uLUw.exe_b62f335e9f4d493cdebb7667725677f0a978d7_83bbfbb4_83c7bda6-830c-450f-af46-78bfd79da3ad\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F08.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Dec 24 07:42:56 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31D8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31F8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\iaLId0uLUw.exe
|
"C:\Users\user\Desktop\iaLId0uLUw.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 1888
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://observerfry.lat/dowxo
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
curverpluch.lat
|
|||
slipperyloo.lat
|
|||
tentabatte.lat
|
|||
manyrestro.lat
|
|||
https://observerfry.lat/pi
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-
|
unknown
|
||
https://observerfry.lat/p
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
|
unknown
|
||
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
bashfulacid.lat
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
|
185.166.143.50
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX-
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
observerfry.lat
|
|||
https://bitbucket.org/
|
unknown
|
||
https://observerfry.lat/sC
|
unknown
|
||
wordyfindy.lat
|
|||
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://observerfry.lat/api
|
172.67.199.72
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-website
|
unknown
|
||
shapestickyr.lat
|
|||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://observerfry.lat/
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://observerfry.lat/pi8os;g
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://dz8aopenkvv6s.cloudfront.net
|
unknown
|
||
talkynicer.lat
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://observerfry.lat/fonpo
|
unknown
|
||
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeU
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
|
unknown
|
||
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/7dd;
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/
|
unknown
|
There are 49 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-w.us-east-1.amazonaws.com
|
3.5.17.0
|
||
bitbucket.org
|
185.166.143.50
|
||
observerfry.lat
|
172.67.199.72
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.199.72
|
observerfry.lat
|
United States
|
||
3.5.17.0
|
s3-w.us-east-1.amazonaws.com
|
United States
|
||
185.166.143.50
|
bitbucket.org
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
ProgramId
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
FileId
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
LongPathHash
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Name
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
OriginalFileName
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Publisher
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Version
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
BinFileVersion
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
BinaryType
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
ProductName
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
ProductVersion
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
LinkDate
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
BinProductVersion
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
AppxPackageFullName
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Size
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Language
|
||
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
371000
|
unkown
|
page execute and read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page execute and read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
576A000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
502A000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
5033000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
396F000
|
stack
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
56DA000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
4BF4000
|
direct allocation
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
5986000
|
trusted library allocation
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
575C000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
5B2000
|
unkown
|
page execute and read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5C36000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page readonly
|
||
568A000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5A8000
|
unkown
|
page execute and read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page execute and read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
FE2000
|
heap
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
578A000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
662000
|
unkown
|
page execute and write copy
|
||
F80000
|
direct allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
5C9F000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5210000
|
remote allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
5B6000
|
unkown
|
page execute and read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
643000
|
unkown
|
page execute and write copy
|
||
5755000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
4D7C000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
5473000
|
heap
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5682000
|
trusted library allocation
|
page read and write
|
||
64D000
|
unkown
|
page execute and read and write
|
||
654000
|
unkown
|
page execute and write copy
|
||
4731000
|
heap
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
56F8000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
548000
|
unkown
|
page execute and write copy
|
||
472F000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
571F000
|
trusted library allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
57C000
|
unkown
|
page execute and write copy
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
trusted library allocation
|
page read and write
|
||
5CA9000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
4BAD000
|
stack
|
page read and write
|
||
5F6000
|
unkown
|
page execute and write copy
|
||
1050000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
568A000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
3C5000
|
unkown
|
page execute and write copy
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page readonly
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
2A27000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
5E1000
|
unkown
|
page execute and write copy
|
||
5718000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4730000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5A5000
|
unkown
|
page execute and write copy
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
63F000
|
unkown
|
page execute and write copy
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
unkown
|
page execute and write copy
|
||
59BB000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
52E000
|
unkown
|
page execute and write copy
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
568E000
|
trusted library allocation
|
page read and write
|
||
5D1000
|
unkown
|
page execute and write copy
|
||
4731000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
5C1C000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5754000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
unkown
|
page execute and read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
585000
|
unkown
|
page execute and write copy
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
stack
|
page read and write
|
||
5CB000
|
unkown
|
page execute and write copy
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
91B000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
5986000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
5718000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5B26000
|
trusted library allocation
|
page read and write
|
||
53E000
|
unkown
|
page execute and read and write
|
||
4BEC000
|
stack
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5BCC000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
663000
|
unkown
|
page execute and write copy
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
587F000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page execute read
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
64C000
|
unkown
|
page execute and write copy
|
||
118F000
|
stack
|
page read and write
|
||
571D000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5C68000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
56DA000
|
trusted library allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
5210000
|
remote allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
574C000
|
trusted library allocation
|
page read and write
|
||
57E000
|
unkown
|
page execute and read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
654000
|
unkown
|
page execute and write copy
|
||
1079000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
5718000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
trusted library allocation
|
page read and write
|
||
549000
|
unkown
|
page execute and read and write
|
||
FC7000
|
heap
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5764000
|
trusted library allocation
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
2A2D000
|
heap
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
625000
|
unkown
|
page execute and read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
5CCD000
|
trusted library allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
3CF000
|
unkown
|
page execute and write copy
|
||
2C2F000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5D7000
|
unkown
|
page execute and read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
371000
|
unkown
|
page execute and write copy
|
||
542E000
|
stack
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page readonly
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
5B3000
|
unkown
|
page execute and write copy
|
||
5C16000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5DF000
|
unkown
|
page execute and write copy
|
||
105B000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
568C000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
568E000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5C68000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
3C5000
|
unkown
|
page execute and read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
3B5000
|
unkown
|
page execute and read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
5210000
|
remote allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
296B000
|
stack
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
5BE3000
|
trusted library allocation
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
568E000
|
trusted library allocation
|
page read and write
|
||
3D1000
|
unkown
|
page execute and write copy
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
64C000
|
unkown
|
page execute and write copy
|
||
574B000
|
trusted library allocation
|
page read and write
|
||
5A12000
|
trusted library allocation
|
page read and write
|
||
5022000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
598A000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
52B000
|
unkown
|
page execute and read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
59B9000
|
trusted library allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
572C000
|
trusted library allocation
|
page read and write
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
662000
|
unkown
|
page execute and read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
56DA000
|
trusted library allocation
|
page read and write
|
||
573C000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
5B27000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page execute and write copy
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
5C6F000
|
trusted library allocation
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5688000
|
trusted library allocation
|
page read and write
|
||
5983000
|
trusted library allocation
|
page read and write
|
||
64E000
|
unkown
|
page execute and write copy
|
||
9EE000
|
stack
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
6395000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
573A000
|
trusted library allocation
|
page read and write
|
There are 729 hidden memdumps, click here to show them.