Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
555.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_14ead3ce\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_1ab655c1\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC93E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Mar 23 07:02:58 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC5C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDC5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D28.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Mar 22 22:53:11 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER497D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E21.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\555.exe
|
"C:\Users\user\Desktop\555.exe"
|
||
C:\Users\user\Desktop\555.exe
|
C:\Users\user\Desktop\555.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 1180
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1228
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://dersed.com/freebl3.dll
|
unknown
|
||
http://dersed.com/freebl3.dllyD
|
unknown
|
||
http://ip-api.com/line/
|
unknown
|
||
http://dersed.com/nss3.dllv
|
unknown
|
||
http://dersed.com/vcruntime140.dllbg
|
unknown
|
||
http://dersed.com/288
|
unknown
|
||
http://dersed.com/vcruntime140.dll
|
unknown
|
||
http://dersed.com/softokn3.dllUD
|
unknown
|
||
http://dersed.com/vcruntime140.dll_i
|
unknown
|
||
http://dersed.com/msvcp140.dllGD
|
unknown
|
||
http://dersed.com/softokn3.dllmb
|
unknown
|
||
http://dersed.com/msvcp140.dll
|
unknown
|
||
http://dersed.com/nss3.dll
|
unknown
|
||
http://dersed.com/mozglue.dll
|
unknown
|
||
http://dersed.com/softokn3.dllLD
|
unknown
|
||
http://dersed.com/mozglue.dllkD
|
unknown
|
||
http://dersed.com/nss3.dllcom/freebl3.dll
|
unknown
|
||
http://dersed.com/softokn3.dll
|
unknown
|
||
http://dersed.com/vcruntime140.dllGc
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dersed.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
ProgramId
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
FileId
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
LowerCaseLongPath
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
LongPathHash
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
Name
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
Publisher
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
Version
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
BinFileVersion
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
BinaryType
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
ProductName
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
ProductVersion
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
LinkDate
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
BinProductVersion
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
Size
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
Language
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
IsPeFile
|
||
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
|
IsOsComponent
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProgramId
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
FileId
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LowerCaseLongPath
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LongPathHash
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Name
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Publisher
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Version
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinFileVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinaryType
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProductName
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProductVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LinkDate
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinProductVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Size
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Language
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
IsPeFile
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
There are 32 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
474000
|
unkown
|
page readonly
|
||
474000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
47CA000
|
trusted library allocation
|
page read and write
|
||
48D8000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
24750699000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
1BBBF5C0000
|
heap
|
page read and write
|
||
1DA10D87000
|
heap
|
page read and write
|
||
B3A3D7A000
|
stack
|
page read and write
|
||
250C8CF9000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
247506B8000
|
heap
|
page read and write
|
||
E1E814E000
|
stack
|
page read and write
|
||
1DA1043C000
|
heap
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
24750580000
|
heap
|
page read and write
|
||
26576A02000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
1DA10481000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1CE81625000
|
heap
|
page read and write
|
||
A48DC7E000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2640000
|
heap
|
page read and write
|
||
23787945000
|
heap
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
E1E80CB000
|
stack
|
page read and write
|
||
17BBA852000
|
heap
|
page read and write
|
||
2475161D000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
250C8CE2000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
21CE000
|
stack
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
1DA10DA6000
|
heap
|
page read and write
|
||
247506AE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C4A000
|
stack
|
page read and write
|
||
250C8A70000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
250C3476000
|
heap
|
page read and write
|
||
4A4D9FE000
|
stack
|
page read and write
|
||
E1E86F7000
|
stack
|
page read and write
|
||
487B000
|
trusted library allocation
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1DA10D81000
|
heap
|
page read and write
|
||
25BD3630000
|
heap
|
page read and write
|
||
17BBA854000
|
heap
|
page read and write
|
||
25BD37D4000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
805000
|
heap
|
page read and write
|
||
C5B76FF000
|
stack
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
1DA10D95000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
66E000
|
stack
|
page read and write
|
||
25BD37C2000
|
heap
|
page read and write
|
||
6DD2F7E000
|
stack
|
page read and write
|
||
2475069F000
|
heap
|
page read and write
|
||
1CE81678000
|
heap
|
page read and write
|
||
1BBBF853000
|
heap
|
page read and write
|
||
C5B7EFF000
|
stack
|
page read and write
|
||
1DA10D14000
|
heap
|
page read and write
|
||
26F95C02000
|
trusted library allocation
|
page read and write
|
||
236CB180000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
remote allocation
|
page read and write
|
||
2070F708000
|
heap
|
page read and write
|
||
250C349E000
|
heap
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
7DF000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
26576A2A000
|
heap
|
page read and write
|
||
1A0D41A0000
|
heap
|
page read and write
|
||
250C346F000
|
heap
|
page read and write
|
||
489F000
|
trusted library allocation
|
page read and write
|
||
1DA10D78000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
278F000
|
stack
|
page read and write
|
||
24751700000
|
heap
|
page read and write
|
||
1DA10D81000
|
heap
|
page read and write
|
||
9D9B0FC000
|
stack
|
page read and write
|
||
86DF7FD000
|
stack
|
page read and write
|
||
A48D77D000
|
stack
|
page read and write
|
||
1A0D4575000
|
heap
|
page read and write
|
||
1DA10449000
|
heap
|
page read and write
|
||
24751658000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CE81665000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1CE8165C000
|
heap
|
page read and write
|
||
6DD3278000
|
stack
|
page read and write
|
||
24750652000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
1DA10D78000
|
heap
|
page read and write
|
||
4A4DAFB000
|
stack
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
48AE000
|
trusted library allocation
|
page read and write
|
||
1DA10D82000
|
heap
|
page read and write
|
||
2070F702000
|
heap
|
page read and write
|
||
17BBAA25000
|
heap
|
page read and write
|
||
236CBCF0000
|
trusted library allocation
|
page read and write
|
||
1BBBF813000
|
heap
|
page read and write
|
||
250C8AE0000
|
trusted library allocation
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
250C3502000
|
heap
|
page read and write
|
||
17BBA7E3000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
2475063B000
|
heap
|
page read and write
|
||
23787938000
|
heap
|
page read and write
|
||
236CAD70000
|
heap
|
page read and write
|
||
1CE8166E000
|
heap
|
page read and write
|
||
23787B10000
|
heap
|
page read and write
|
||
250C8C00000
|
heap
|
page read and write
|
||
250C3D04000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
2070F613000
|
heap
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
1CE81550000
|
heap
|
page read and write
|
||
250C89A0000
|
trusted library allocation
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
26F95400000
|
heap
|
page read and write
|
||
25BD39D5000
|
heap
|
page read and write
|
||
4899000
|
trusted library allocation
|
page read and write
|
||
17BBA852000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
17BBA80D000
|
heap
|
page read and write
|
||
17BBA7B4000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
9D9B67E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1BBBF882000
|
heap
|
page read and write
|
||
25BD37ED000
|
heap
|
page read and write
|
||
1DA10D97000
|
heap
|
page read and write
|
||
1DA10D7B000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2475065F000
|
heap
|
page read and write
|
||
236CB1B5000
|
heap
|
page read and write
|
||
4A4D5AE000
|
stack
|
page read and write
|
||
85D3DCA000
|
stack
|
page read and write
|
||
1DA10D84000
|
heap
|
page read and write
|
||
C3906EA000
|
stack
|
page read and write
|
||
236CAE70000
|
trusted library allocation
|
page read and write
|
||
86DF97D000
|
stack
|
page read and write
|
||
1BBBF902000
|
heap
|
page read and write
|
||
1DA1121A000
|
heap
|
page read and write
|
||
2070F600000
|
heap
|
page read and write
|
||
1DA10DC3000
|
heap
|
page read and write
|
||
2475171B000
|
heap
|
page read and write
|
||
25BD37E9000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
A48D2FB000
|
stack
|
page read and write
|
||
250C3D13000
|
heap
|
page read and write
|
||
17BBA7E3000
|
heap
|
page read and write
|
||
1DA10D63000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
1BBBF908000
|
heap
|
page read and write
|
||
B3A3C77000
|
stack
|
page read and write
|
||
170B2FE000
|
stack
|
page read and write
|
||
250C3BF3000
|
trusted library allocation
|
page read and write
|
||
2070F65E000
|
heap
|
page read and write
|
||
1CFEDC41000
|
heap
|
page read and write
|
||
4887000
|
trusted library allocation
|
page read and write
|
||
1DA10516000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2378791B000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
837000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
C390C7C000
|
stack
|
page read and write
|
||
17BBA81D000
|
heap
|
page read and write
|
||
170B4FC000
|
stack
|
page read and write
|
||
1DA1044D000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
1DA10DAE000
|
heap
|
page read and write
|
||
487E000
|
trusted library allocation
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1CE81685000
|
heap
|
page read and write
|
||
1BBBF829000
|
heap
|
page read and write
|
||
1CE81663000
|
heap
|
page read and write
|
||
236CBAA0000
|
trusted library allocation
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
250C8AE0000
|
remote allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
2070F657000
|
heap
|
page read and write
|
||
25BD37E1000
|
heap
|
page read and write
|
||
1CFEDC29000
|
heap
|
page read and write
|
||
1BBBF84D000
|
heap
|
page read and write
|
||
2070F65D000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
2070F64D000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
1CFEDC13000
|
heap
|
page read and write
|
||
1CE814E0000
|
heap
|
page read and write
|
||
23DD000
|
stack
|
page read and write
|
||
1DA10D53000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
26577202000
|
trusted library allocation
|
page read and write
|
||
17BBA854000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
250C32C0000
|
heap
|
page read and write
|
||
1DA10D9F000
|
heap
|
page read and write
|
||
25BD39D0000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
250C89B0000
|
trusted library allocation
|
page read and write
|
||
24751600000
|
heap
|
page read and write
|
||
1CE814F0000
|
heap
|
page read and write
|
||
247506FD000
|
heap
|
page read and write
|
||
250C89C0000
|
trusted library allocation
|
page read and write
|
||
1DA10D78000
|
heap
|
page read and write
|
||
17BBAA20000
|
heap
|
page read and write
|
||
1DA10D7E000
|
heap
|
page read and write
|
||
1DA10DCB000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
250C348D000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
B3A3E7B000
|
stack
|
page read and write
|
||
9D9B57E000
|
stack
|
page read and write
|
||
E4185AB000
|
stack
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
236CB1B9000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
250C8AA0000
|
trusted library allocation
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
C5B7D7F000
|
stack
|
page read and write
|
||
26F95B50000
|
trusted library allocation
|
page read and write
|
||
1DA10D25000
|
heap
|
page read and write
|
||
24750629000
|
heap
|
page read and write
|
||
1DA10D7A000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
1CE81642000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
2070F66A000
|
heap
|
page read and write
|
||
E418AFE000
|
stack
|
page read and write
|
||
1DA104AF000
|
heap
|
page read and write
|
||
2474000
|
heap
|
page read and write
|
||
E1E81CF000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
26576A3D000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
E1E88FF000
|
stack
|
page read and write
|
||
4A4D87E000
|
stack
|
page read and write
|
||
1DA10D85000
|
heap
|
page read and write
|
||
1DA10D85000
|
heap
|
page read and write
|
||
250C3413000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
851000
|
heap
|
page read and write
|
||
4783000
|
direct allocation
|
page execute and read and write
|
||
17BBA80D000
|
heap
|
page read and write
|
||
1DA10D63000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
9D9B87F000
|
stack
|
page read and write
|
||
E8BC27F000
|
stack
|
page read and write
|
||
250C8860000
|
trusted library allocation
|
page read and write
|
||
1CFEDC58000
|
heap
|
page read and write
|
||
1DA10502000
|
heap
|
page read and write
|
||
26F9543C000
|
heap
|
page read and write
|
||
250C8C56000
|
heap
|
page read and write
|
||
236CBCD0000
|
heap
|
page readonly
|
||
263F000
|
stack
|
page read and write
|
||
24750795000
|
heap
|
page read and write
|
||
250C89B0000
|
trusted library allocation
|
page read and write
|
||
24750D40000
|
trusted library allocation
|
page read and write
|
||
2475066B000
|
heap
|
page read and write
|
||
23787B20000
|
heap
|
page read and write
|
||
25BD37E9000
|
heap
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
250C87F0000
|
trusted library allocation
|
page read and write
|
||
236CAE00000
|
heap
|
page read and write
|
||
25BD3780000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
1DA10D9E000
|
heap
|
page read and write
|
||
236CADE0000
|
heap
|
page read and write
|
||
48BA000
|
trusted library allocation
|
page read and write
|
||
23787890000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
250C3502000
|
heap
|
page read and write
|
||
250C34FD000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
247506D9000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
E4189F9000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
17BBA7B2000
|
heap
|
page read and write
|
||
1CE81600000
|
heap
|
page read and write
|
||
1CFEDC00000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
489C000
|
trusted library allocation
|
page read and write
|
||
1DA10451000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
4780000
|
direct allocation
|
page execute and read and write
|
||
21CE000
|
stack
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
1CE8166C000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
1CE8163A000
|
heap
|
page read and write
|
||
250C3516000
|
heap
|
page read and write
|
||
17BBA7B4000
|
heap
|
page read and write
|
||
1CE81662000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1CFEE202000
|
trusted library allocation
|
page read and write
|
||
1DA10454000
|
heap
|
page read and write
|
||
2070F661000
|
heap
|
page read and write
|
||
1DA10D95000
|
heap
|
page read and write
|
||
17BBA879000
|
heap
|
page read and write
|
||
26F95508000
|
heap
|
page read and write
|
||
1A0D4070000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
6DD337E000
|
stack
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
24750E02000
|
heap
|
page read and write
|
||
C5B797C000
|
stack
|
page read and write
|
||
250C8C2E000
|
heap
|
page read and write
|
||
1BBBF86A000
|
heap
|
page read and write
|
||
1DA10D82000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
E8BC1FE000
|
stack
|
page read and write
|
||
7AF000
|
heap
|
page read and write
|
||
D60AA7B000
|
stack
|
page read and write
|
||
250C3C02000
|
heap
|
page read and write
|
||
1DA10D79000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
1CE81632000
|
heap
|
page read and write
|
||
250C8C40000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
1DA10D87000
|
heap
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
E1E85FB000
|
stack
|
page read and write
|
||
1CE81613000
|
heap
|
page read and write
|
||
4A4D52B000
|
stack
|
page read and write
|
||
E4188FD000
|
stack
|
page read and write
|
||
1CFEDC02000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
250C8A50000
|
trusted library allocation
|
page read and write
|
||
1DA104E3000
|
heap
|
page read and write
|
||
17BBA630000
|
heap
|
page read and write
|
||
250C89C4000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
26F95502000
|
heap
|
page read and write
|
||
170B57F000
|
stack
|
page read and write
|
||
1DA1045C000
|
heap
|
page read and write
|
||
250C8A90000
|
trusted library allocation
|
page read and write
|
||
1CE81645000
|
heap
|
page read and write
|
||
17BBA788000
|
heap
|
page read and write
|
||
B3A45FC000
|
stack
|
page read and write
|
||
247507B8000
|
heap
|
page read and write
|
||
6DD3078000
|
stack
|
page read and write
|
||
C39076F000
|
stack
|
page read and write
|
||
24750644000
|
heap
|
page read and write
|
||
48A2000
|
trusted library allocation
|
page read and write
|
||
1DA104D6000
|
heap
|
page read and write
|
||
6DD2AEB000
|
stack
|
page read and write
|
||
250C8BE0000
|
trusted library allocation
|
page read and write
|
||
2070F62A000
|
heap
|
page read and write
|
||
1CE8163D000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
250C3507000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
26F95466000
|
heap
|
page read and write
|
||
236CAEDC000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
1DA10DCB000
|
heap
|
page read and write
|
||
E1E87FE000
|
stack
|
page read and write
|
||
25BD37D2000
|
heap
|
page read and write
|
||
250C3479000
|
heap
|
page read and write
|
||
86DF47F000
|
stack
|
page read and write
|
||
1DA104C8000
|
heap
|
page read and write
|
||
1DA10D65000
|
heap
|
page read and write
|
||
24750F3D000
|
heap
|
page read and write
|
||
C390A7F000
|
stack
|
page read and write
|
||
E8BC0FB000
|
stack
|
page read and write
|
||
26576A00000
|
heap
|
page read and write
|
||
170B3FB000
|
stack
|
page read and write
|
||
17BBA87C000
|
heap
|
page read and write
|
||
D60AFFF000
|
stack
|
page read and write
|
||
1CE81660000
|
heap
|
page read and write
|
||
A48CEBC000
|
stack
|
page read and write
|
||
265769A0000
|
remote allocation
|
page read and write
|
||
25BD37D6000
|
heap
|
page read and write
|
||
25BD37ED000
|
heap
|
page read and write
|
||
1DA104E9000
|
heap
|
page read and write
|
||
1DA1045B000
|
heap
|
page read and write
|
||
250C8CDD000
|
heap
|
page read and write
|
||
250C3492000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
247506E4000
|
heap
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
C390BFE000
|
stack
|
page read and write
|
||
C3907EE000
|
stack
|
page read and write
|
||
1DA10D9D000
|
heap
|
page read and write
|
||
247505E0000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
26F9544E000
|
heap
|
page read and write
|
||
250C3400000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
170AFFA000
|
stack
|
page read and write
|
||
1DA10D9F000
|
heap
|
page read and write
|
||
1DA10D83000
|
heap
|
page read and write
|
||
A48D57D000
|
stack
|
page read and write
|
||
250C89A1000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
trusted library allocation
|
page read and write
|
||
1BBBF83C000
|
heap
|
page read and write
|
||
1DA10D89000
|
heap
|
page read and write
|
||
250C3D00000
|
heap
|
page read and write
|
||
250C8CA3000
|
heap
|
page read and write
|
||
D60AAFE000
|
stack
|
page read and write
|
||
236CBCE0000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
1CFEDC5A000
|
heap
|
page read and write
|
||
85D427E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
236CAD80000
|
trusted library allocation
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
6AE000
|
stack
|
page read and write
|
||
1CFEE1A0000
|
trusted library allocation
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
C5B7A7A000
|
stack
|
page read and write
|
||
1DA10D51000
|
heap
|
page read and write
|
||
24750688000
|
heap
|
page read and write
|
||
1DA10457000
|
heap
|
page read and write
|
||
250C8C13000
|
heap
|
page read and write
|
||
250C4370000
|
trusted library allocation
|
page read and write
|
||
265769A0000
|
remote allocation
|
page read and write
|
||
E418B79000
|
stack
|
page read and write
|
||
170B47D000
|
stack
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
842000
|
heap
|
page read and write
|
||
1DA10D85000
|
heap
|
page read and write
|
||
25BD37ED000
|
heap
|
page read and write
|
||
26F95413000
|
heap
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
1DA10D9A000
|
heap
|
page read and write
|
||
23787B15000
|
heap
|
page read and write
|
||
D60AB7E000
|
stack
|
page read and write
|
||
17BBA8A0000
|
heap
|
page read and write
|
||
6DD3177000
|
stack
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
B3A437A000
|
stack
|
page read and write
|
||
4893000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
1CE8165A000
|
heap
|
page read and write
|
||
24750613000
|
heap
|
page read and write
|
||
1DA104E4000
|
heap
|
page read and write
|
||
1DA10D25000
|
heap
|
page read and write
|
||
2070F668000
|
heap
|
page read and write
|
||
1DA10508000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
26F95470000
|
heap
|
page read and write
|
||
26F95380000
|
heap
|
page read and write
|
||
250C8AE0000
|
remote allocation
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
24751713000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
17BBA880000
|
heap
|
page read and write
|
||
26F9544C000
|
heap
|
page read and write
|
||
25BD37F8000
|
heap
|
page read and write
|
||
2C4A000
|
stack
|
page read and write
|
||
25BD37FD000
|
heap
|
page read and write
|
||
17BBB100000
|
heap
|
page read and write
|
||
17BBA7EF000
|
heap
|
page read and write
|
||
24750600000
|
heap
|
page read and write
|
||
2070F63C000
|
heap
|
page read and write
|
||
1DA10456000
|
heap
|
page read and write
|
||
B3A47FE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26F95500000
|
heap
|
page read and write
|
||
2070F700000
|
heap
|
page read and write
|
||
2070F658000
|
heap
|
page read and write
|
||
1CE8165F000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
2070F660000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1DA10B10000
|
remote allocation
|
page read and write
|
||
250C343D000
|
heap
|
page read and write
|
||
1DA10D63000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
1DA10DB1000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
17BBA7EB000
|
heap
|
page read and write
|
||
250C8AC0000
|
trusted library allocation
|
page read and write
|
||
2648000
|
heap
|
page read and write
|
||
1DA10D81000
|
heap
|
page read and write
|
||
250C8CA6000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
E8BC17E000
|
stack
|
page read and write
|
||
D60AEF7000
|
stack
|
page read and write
|
||
236CAE80000
|
heap
|
page read and write
|
||
265769A0000
|
remote allocation
|
page read and write
|
||
C390B78000
|
stack
|
page read and write
|
||
250C47F0000
|
trusted library allocation
|
page read and write
|
||
86DF6FE000
|
stack
|
page read and write
|
||
1DA10D82000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
48A8000
|
trusted library allocation
|
page read and write
|
||
250C8C4D000
|
heap
|
page read and write
|
||
1A0D4570000
|
heap
|
page read and write
|
||
25BD37C7000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
26F95402000
|
heap
|
page read and write
|
||
1BBBF876000
|
heap
|
page read and write
|
||
4A4DCFE000
|
stack
|
page read and write
|
||
250C8AB0000
|
trusted library allocation
|
page read and write
|
||
17BBA9D0000
|
remote allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
236CB1C0000
|
trusted library allocation
|
page read and write
|
||
1DA104AB000
|
heap
|
page read and write
|
||
26576810000
|
heap
|
page read and write
|
||
24750713000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
250C3456000
|
heap
|
page read and write
|
||
17BBA81C000
|
heap
|
page read and write
|
||
1DA10D7D000
|
heap
|
page read and write
|
||
247506CF000
|
heap
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
250C3C00000
|
heap
|
page read and write
|
||
25BD37FE000
|
heap
|
page read and write
|
||
250C3454000
|
heap
|
page read and write
|
||
1BBBF800000
|
heap
|
page read and write
|
||
1DA10D8F000
|
heap
|
page read and write
|
||
D60ADFB000
|
stack
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
250C8A50000
|
trusted library allocation
|
page read and write
|
||
1DA10DAA000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1DA10D63000
|
heap
|
page read and write
|
||
26576970000
|
trusted library allocation
|
page read and write
|
||
26F9548A000
|
heap
|
page read and write
|
||
250C8980000
|
trusted library allocation
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
1BBBFE02000
|
trusted library allocation
|
page read and write
|
||
1DA10D7B000
|
heap
|
page read and write
|
||
17BBA7E3000
|
heap
|
page read and write
|
||
B3A3A7B000
|
stack
|
page read and write
|
||
1DA102F0000
|
heap
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
1DA10D9E000
|
heap
|
page read and write
|
||
1CE8164E000
|
heap
|
page read and write
|
||
1CFEDD13000
|
heap
|
page read and write
|
||
E8BBC8C000
|
stack
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
250C8870000
|
trusted library allocation
|
page read and write
|
||
170B27E000
|
stack
|
page read and write
|
||
236CB120000
|
trusted library allocation
|
page read and write
|
||
24750F38000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2070F65C000
|
heap
|
page read and write
|
||
24750FF6000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1A0D41C0000
|
heap
|
page read and write
|
||
1DA1044A000
|
heap
|
page read and write
|
||
1DA1044E000
|
heap
|
page read and write
|
||
250C8980000
|
trusted library allocation
|
page read and write
|
||
1DA1047D000
|
heap
|
page read and write
|
||
1DA10280000
|
heap
|
page read and write
|
||
E1E84FC000
|
stack
|
page read and write
|
||
1DA104F5000
|
heap
|
page read and write
|
||
1DA10D84000
|
heap
|
page read and write
|
||
17BBA780000
|
heap
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
1DA10D82000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
86DF87E000
|
stack
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
9D9B1FE000
|
stack
|
page read and write
|
||
250C8CFB000
|
heap
|
page read and write
|
||
250C4280000
|
trusted library allocation
|
page read and write
|
||
1CFEDC75000
|
heap
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
4896000
|
trusted library allocation
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
1CFED9E0000
|
heap
|
page read and write
|
||
6DD3477000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
236CAE87000
|
heap
|
page read and write
|
||
1DA10D81000
|
heap
|
page read and write
|
||
1DA10D25000
|
heap
|
page read and write
|
||
26F95482000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
236CAED5000
|
heap
|
page read and write
|
||
1DA103F0000
|
trusted library allocation
|
page read and write
|
||
17BBA7E6000
|
heap
|
page read and write
|
||
17BBA7C4000
|
heap
|
page read and write
|
||
1CE8165E000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
278F000
|
stack
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
247506BB000
|
heap
|
page read and write
|
||
4881000
|
trusted library allocation
|
page read and write
|
||
250C34AB000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
C5B767C000
|
stack
|
page read and write
|
||
250C8D00000
|
heap
|
page read and write
|
||
2070F540000
|
heap
|
page read and write
|
||
1DA10400000
|
heap
|
page read and write
|
||
85D417E000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1DA10429000
|
heap
|
page read and write
|
||
1DA10D25000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
1DA10D78000
|
heap
|
page read and write
|
||
17BBA7E3000
|
heap
|
page read and write
|
||
250C32B0000
|
heap
|
page read and write
|
||
2070F688000
|
heap
|
page read and write
|
||
2070F669000
|
heap
|
page read and write
|
||
1CE81646000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
247506FF000
|
heap
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
1BBBF7F0000
|
trusted library allocation
|
page read and write
|
||
17BBA80D000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1DA10D7D000
|
heap
|
page read and write
|
||
24751602000
|
heap
|
page read and write
|
||
1DA10DAC000
|
heap
|
page read and write
|
||
250C3D58000
|
heap
|
page read and write
|
||
250C8CAF000
|
heap
|
page read and write
|
||
1DA10D7D000
|
heap
|
page read and write
|
||
2070F663000
|
heap
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
E41897E000
|
stack
|
page read and write
|
||
17BBA852000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
D60B0FF000
|
stack
|
page read and write
|
||
25BD37E9000
|
heap
|
page read and write
|
||
26576A5C000
|
heap
|
page read and write
|
||
1DA10B10000
|
remote allocation
|
page read and write
|
||
2475067F000
|
heap
|
page read and write
|
||
1DA10D64000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
2475062F000
|
heap
|
page read and write
|
||
247506FB000
|
heap
|
page read and write
|
||
1DA10D76000
|
heap
|
page read and write
|
||
1DA10DBB000
|
heap
|
page read and write
|
||
1CE81631000
|
heap
|
page read and write
|
||
247507E1000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
1DA10D9E000
|
heap
|
page read and write
|
||
1A0D42B0000
|
heap
|
page read and write
|
||
488D000
|
trusted library allocation
|
page read and write
|
||
86DF0FB000
|
stack
|
page read and write
|
||
1DA10413000
|
heap
|
page read and write
|
||
1CE8167B000
|
heap
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
1DA10D76000
|
heap
|
page read and write
|
||
4A4DBF7000
|
stack
|
page read and write
|
||
1DA10D81000
|
heap
|
page read and write
|
||
247507FD000
|
heap
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
1DA11200000
|
heap
|
page read and write
|
||
25BD37F7000
|
heap
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
1DA10448000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
1CE81E02000
|
trusted library allocation
|
page read and write
|
||
1A0D42B8000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
9D9B77E000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
250C8CF3000
|
heap
|
page read and write
|
||
26F95466000
|
heap
|
page read and write
|
||
250C34A7000
|
heap
|
page read and write
|
||
1BBBF82C000
|
heap
|
page read and write
|
||
1DA11221000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
170B37E000
|
stack
|
page read and write
|
||
26F95390000
|
heap
|
page read and write
|
||
26F9544B000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
170B5FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DA10447000
|
heap
|
page read and write
|
||
236CB1A0000
|
trusted library allocation
|
page read and write
|
||
A48D97F000
|
stack
|
page read and write
|
||
236CAEDC000
|
heap
|
page read and write
|
||
236CBD40000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
25BD37E1000
|
heap
|
page read and write
|
||
250C8988000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1CE81644000
|
heap
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
1DA11203000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
29CF000
|
stack
|
page read and write
|
||
250C3BF0000
|
trusted library allocation
|
page read and write
|
||
26F95513000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
E418A7D000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1DA10D7B000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
247506CB000
|
heap
|
page read and write
|
||
1DA10DDC000
|
heap
|
page read and write
|
||
17BBA7C4000
|
heap
|
page read and write
|
||
250C34FD000
|
heap
|
page read and write
|
||
1DA10D81000
|
heap
|
page read and write
|
||
17BBA852000
|
heap
|
page read and write
|
||
1DA104B5000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
250C8A50000
|
trusted library allocation
|
page read and write
|
||
2070F550000
|
heap
|
page read and write
|
||
2DE1000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1CE81702000
|
heap
|
page read and write
|
||
1CE81657000
|
heap
|
page read and write
|
||
1CE81641000
|
heap
|
page read and write
|
||
C390AFE000
|
stack
|
page read and write
|
||
17BBB101000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
250C3D18000
|
heap
|
page read and write
|
||
6DD34FF000
|
unkown
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
24750D90000
|
trusted library allocation
|
page read and write
|
||
1DA10D82000
|
heap
|
page read and write
|
||
25BD37C7000
|
heap
|
page read and write
|
||
24750F00000
|
heap
|
page read and write
|
||
17BBA854000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
A48D87E000
|
stack
|
page read and write
|
||
17BBA7EF000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
250C3429000
|
heap
|
page read and write
|
||
1DA10D76000
|
heap
|
page read and write
|
||
1DA1046D000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
24750F63000
|
heap
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
86DF57C000
|
stack
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
17BBA7AD000
|
heap
|
page read and write
|
||
C5B787B000
|
stack
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
250C3C15000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
9D9B17E000
|
stack
|
page read and write
|
||
1DA10D99000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
C5B7C7B000
|
stack
|
page read and write
|
||
26576A13000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
85D41FF000
|
stack
|
page read and write
|
||
24750590000
|
heap
|
page read and write
|
||
1DA10DB8000
|
heap
|
page read and write
|
||
1DA10C02000
|
heap
|
page read and write
|
||
2070F5B0000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
17BBA9D0000
|
remote allocation
|
page read and write
|
||
23787AE0000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1DA10D97000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
4927000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
remote allocation
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1DA1044C000
|
heap
|
page read and write
|
||
250C8C63000
|
heap
|
page read and write
|
||
236CB1B0000
|
heap
|
page read and write
|
||
1CE8166A000
|
heap
|
page read and write
|
||
2070F67F000
|
heap
|
page read and write
|
||
1DA10B10000
|
remote allocation
|
page read and write
|
||
1BBBF620000
|
heap
|
page read and write
|
||
1DA10D9B000
|
heap
|
page read and write
|
||
1DA10D98000
|
heap
|
page read and write
|
||
250C3D02000
|
heap
|
page read and write
|
||
236CAECE000
|
heap
|
page read and write
|
||
1DA10D00000
|
heap
|
page read and write
|
||
250C8AE0000
|
remote allocation
|
page read and write
|
||
6DD2BEE000
|
stack
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
1DA10452000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
82E000
|
heap
|
page read and write
|
||
25BD37E1000
|
heap
|
page read and write
|
||
1CFEDA40000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
17BBA7C4000
|
heap
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
250C8CB6000
|
heap
|
page read and write
|
||
1CE81667000
|
heap
|
page read and write
|
||
1DA10D1D000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
250C8C20000
|
heap
|
page read and write
|
||
17BBA87C000
|
heap
|
page read and write
|
||
250C3A80000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
250C34AB000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
82B000
|
heap
|
page read and write
|
||
250C8D02000
|
heap
|
page read and write
|
||
1DA11262000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DA10513000
|
heap
|
page read and write
|
||
26F95449000
|
heap
|
page read and write
|
||
2070F67F000
|
heap
|
page read and write
|
||
250C8D04000
|
heap
|
page read and write
|
||
1DA104E6000
|
heap
|
page read and write
|
||
1DA10D78000
|
heap
|
page read and write
|
||
2070F713000
|
heap
|
page read and write
|
||
2070F666000
|
heap
|
page read and write
|
||
7AF000
|
heap
|
page read and write
|
||
1DA11203000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
D60AC7C000
|
stack
|
page read and write
|
||
250C8D02000
|
heap
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
26F9542A000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
1CE81580000
|
trusted library allocation
|
page read and write
|
||
1DA10D63000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
2420000
|
trusted library allocation
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
26576800000
|
heap
|
page read and write
|
||
D60ACFF000
|
stack
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
1CFEDD02000
|
heap
|
page read and write
|
||
1DA10470000
|
heap
|
page read and write
|
||
26F9544F000
|
heap
|
page read and write
|
||
1DA1046D000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
17BBA7C4000
|
heap
|
page read and write
|
||
E41887E000
|
stack
|
page read and write
|
||
250C3474000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
1DA10D25000
|
heap
|
page read and write
|
||
1CE81658000
|
heap
|
page read and write
|
||
250C8CDD000
|
heap
|
page read and write
|
||
26F9544A000
|
heap
|
page read and write
|
||
247506E1000
|
heap
|
page read and write
|
||
25BD37B0000
|
heap
|
page read and write
|
||
250C898E000
|
trusted library allocation
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
A48DA7E000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
2475063E000
|
heap
|
page read and write
|
||
1BBBF900000
|
heap
|
page read and write
|
||
250C8BC0000
|
trusted library allocation
|
page read and write
|
||
1DA10DA7000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
C5B7B7E000
|
stack
|
page read and write
|
||
1BBBF5B0000
|
heap
|
page read and write
|
||
2C4A000
|
stack
|
page read and write
|
||
250C3320000
|
heap
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
1DA10D68000
|
heap
|
page read and write
|
||
25BD3760000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
2070FE02000
|
trusted library allocation
|
page read and write
|
||
24750650000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
1CFED9D0000
|
heap
|
page read and write
|
||
2475160A000
|
heap
|
page read and write
|
||
1BBBF913000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
25BD37D5000
|
heap
|
page read and write
|
||
17BBA876000
|
heap
|
page read and write
|
||
17BBA9D0000
|
remote allocation
|
page read and write
|
||
1DA104C1000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
24750649000
|
heap
|
page read and write
|
||
1CE81647000
|
heap
|
page read and write
|
||
2475065D000
|
heap
|
page read and write
|
||
1DA10D9F000
|
heap
|
page read and write
|
||
250C3D18000
|
heap
|
page read and write
|
||
488A000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
1DA10D7C000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
250C8AD0000
|
trusted library allocation
|
page read and write
|
||
48AB000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
17BBA854000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
2480000
|
trusted library allocation
|
page read and write
|
||
1DA10484000
|
heap
|
page read and write
|
||
2070F5E0000
|
trusted library allocation
|
page read and write
|
||
24751602000
|
heap
|
page read and write
|
||
23787910000
|
heap
|
page read and write
|
||
26576870000
|
heap
|
page read and write
|
||
24750637000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
A48D47E000
|
stack
|
page read and write
|
||
26F953F0000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
7C1000
|
heap
|
page read and write
|
||
25BD37B9000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26F95451000
|
heap
|
page read and write
|
||
4A4DDFF000
|
stack
|
page read and write
|
||
B3A407B000
|
stack
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
86DF5FE000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
24750683000
|
heap
|
page read and write
|
||
26F95488000
|
heap
|
page read and write
|
||
24751643000
|
heap
|
page read and write
|
||
250C4261000
|
trusted library allocation
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
A48DB7F000
|
stack
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
236CAEDC000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
250C3D59000
|
heap
|
page read and write
|
||
26576B02000
|
heap
|
page read and write
|
||
B3A3F7E000
|
stack
|
page read and write
|
||
17BBA7EF000
|
heap
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
1DA11202000
|
heap
|
page read and write
|
||
1CE8167C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
24751702000
|
heap
|
page read and write
|
||
C5B7E7B000
|
stack
|
page read and write
|
||
24750FDD000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
6DD2B6E000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page execute and read and write
|
||
1CE81629000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
250C89A4000
|
trusted library allocation
|
page read and write
|
||
1DA10D7B000
|
heap
|
page read and write
|
||
1DA10290000
|
heap
|
page read and write
|
||
1DA10D84000
|
heap
|
page read and write
|
||
1CE8167F000
|
heap
|
page read and write
|
There are 978 hidden memdumps, click here to show them.