Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AU963ROPSBOYUMXP3FF.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe
|
"C:\Users\user~1\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://crisiwarny.store/95hEL9zzrqbevk/6
|
unknown
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
https://crisiwarny.store/apiV
|
unknown
|
||
navygenerayk.store
|
|||
founpiuer.store
|
|||
https://crisiwarny.store/p
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
thumbystriw.store
|
|||
https://crisiwarny.store/s
|
unknown
|
||
crisiwarny.store
|
|||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://185.215.113.16/off/def.exe8T
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://185.215.113.16/sOc
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
http://185.215.113.16/xOX
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://185.215.113.16/off/def.exe.
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 34 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
741000
|
unkown
|
page execute and read and write
|
||
7BAD000
|
stack
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
517D000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
131D000
|
heap
|
page read and write
|
||
100A000
|
unkown
|
page execute and read and write
|
||
1864000
|
heap
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
126F000
|
unkown
|
page execute and read and write
|
||
484E000
|
stack
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
131C000
|
stack
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
A49000
|
unkown
|
page execute and read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
94F000
|
unkown
|
page execute and write copy
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
FFA000
|
stack
|
page read and write
|
||
1174000
|
unkown
|
page execute and read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5D3F000
|
trusted library allocation
|
page read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
925000
|
unkown
|
page execute and read and write
|
||
61FA000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
6AB1000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
5644000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
remote allocation
|
page read and write
|
||
9B8000
|
unkown
|
page execute and read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
11B3000
|
unkown
|
page execute and read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
130E000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
unkown
|
page execute and read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
62FC000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
11AE000
|
unkown
|
page execute and read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
498F000
|
stack
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page execute and read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
91C000
|
unkown
|
page execute and write copy
|
||
995000
|
unkown
|
page execute and write copy
|
||
1326000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
9B9000
|
unkown
|
page execute and write copy
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
97D000
|
unkown
|
page execute and write copy
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
634F000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
12A2000
|
unkown
|
page execute and write copy
|
||
1AEE000
|
stack
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page execute and read and write
|
||
61D8000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
6203000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
61F8000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
1231000
|
unkown
|
page execute and write copy
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
6218000
|
trusted library allocation
|
page read and write
|
||
93A000
|
unkown
|
page execute and read and write
|
||
1015000
|
unkown
|
page execute and read and write
|
||
61F2000
|
trusted library allocation
|
page read and write
|
||
123F000
|
unkown
|
page execute and read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
1206000
|
unkown
|
page execute and read and write
|
||
1864000
|
heap
|
page read and write
|
||
11FD000
|
unkown
|
page execute and read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page execute and read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
6A19000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
120D000
|
unkown
|
page execute and read and write
|
||
438E000
|
stack
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
926000
|
unkown
|
page execute and write copy
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
unkown
|
page execute and write copy
|
||
180E000
|
stack
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
61D1000
|
trusted library allocation
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
3DFE000
|
stack
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
7DEE000
|
stack
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
1176000
|
unkown
|
page execute and write copy
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
stack
|
page read and write
|
||
61CF000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
51CC000
|
stack
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
8FE000
|
unkown
|
page execute and write copy
|
||
420F000
|
stack
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
1207000
|
unkown
|
page execute and write copy
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
950000
|
unkown
|
page execute and read and write
|
||
8FC000
|
unkown
|
page execute and read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
982000
|
unkown
|
page execute and read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
unkown
|
page execute and write copy
|
||
131B000
|
heap
|
page read and write
|
||
6007000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
562F000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
192F000
|
heap
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
1002000
|
unkown
|
page execute and write copy
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
126D000
|
unkown
|
page execute and write copy
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
60D9000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page execute and read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
18AE000
|
stack
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
9D5000
|
unkown
|
page execute and read and write
|
||
5491000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
11BF000
|
unkown
|
page execute and write copy
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
5D2F000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
stack
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
1186000
|
unkown
|
page execute and read and write
|
||
407E000
|
stack
|
page read and write
|
||
61D9000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
622C000
|
trusted library allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
583D000
|
stack
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
A34000
|
unkown
|
page execute and write copy
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
91A000
|
unkown
|
page execute and write copy
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
1BEE000
|
stack
|
page read and write
|
||
913000
|
unkown
|
page execute and read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
11C6000
|
unkown
|
page execute and write copy
|
||
57DF000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page execute and read and write
|
||
42FD000
|
stack
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
620B000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
9C1000
|
unkown
|
page execute and read and write
|
||
11C0000
|
unkown
|
page execute and read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
6AD5000
|
trusted library allocation
|
page read and write
|
||
637A000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
57F0000
|
remote allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
938000
|
unkown
|
page execute and read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
6222000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
A24000
|
unkown
|
page execute and write copy
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
635C000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
7EEF000
|
stack
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
unkown
|
page execute and write copy
|
||
61D6000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page read and write
|
||
625E000
|
trusted library allocation
|
page read and write
|
||
6212000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
52CF000
|
stack
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
6340000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
1329000
|
heap
|
page read and write
|
||
1290000
|
unkown
|
page execute and read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
18EC000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
A33000
|
unkown
|
page execute and read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
912000
|
unkown
|
page execute and write copy
|
||
629E000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
12B0000
|
unkown
|
page execute and write copy
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
633E000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page read and write
|
||
1235000
|
unkown
|
page execute and read and write
|
||
38FE000
|
stack
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
127F000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
1931000
|
heap
|
page read and write
|
||
967000
|
unkown
|
page execute and read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
79B000
|
unkown
|
page execute and read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
564B000
|
trusted library allocation
|
page execute and read and write
|
||
403F000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
128F000
|
unkown
|
page execute and write copy
|
||
6924000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
heap
|
page read and write
|
||
6347000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
unkown
|
page execute and read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
direct allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
heap
|
page execute and read and write
|
||
620D000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
94D000
|
unkown
|
page execute and read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
1014000
|
unkown
|
page execute and write copy
|
||
531D000
|
stack
|
page read and write
|
||
741000
|
unkown
|
page execute and write copy
|
||
1864000
|
heap
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
9AD000
|
unkown
|
page execute and write copy
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
936000
|
unkown
|
page execute and write copy
|
||
1864000
|
heap
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
5623000
|
trusted library allocation
|
page read and write
|
||
5D32000
|
trusted library allocation
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
12A2000
|
unkown
|
page execute and write copy
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
443E000
|
stack
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
1193000
|
unkown
|
page execute and write copy
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
6689000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page execute and read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
1942000
|
heap
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
18FA000
|
heap
|
page read and write
|
||
9A3000
|
unkown
|
page execute and write copy
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
124E000
|
unkown
|
page execute and write copy
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
121D000
|
unkown
|
page execute and read and write
|
||
12F3000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
A33000
|
unkown
|
page execute and write copy
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
9E4000
|
unkown
|
page execute and read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
1323000
|
heap
|
page read and write
|
||
131D000
|
heap
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
120E000
|
unkown
|
page execute and write copy
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
61D7000
|
trusted library allocation
|
page read and write
|
||
1319000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
6244000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
927000
|
unkown
|
page execute and read and write
|
||
A49000
|
unkown
|
page execute and write copy
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
unkown
|
page execute and write copy
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
79B000
|
unkown
|
page execute and write copy
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
95A000
|
unkown
|
page execute and write copy
|
||
42BF000
|
stack
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
9B0000
|
unkown
|
page execute and write copy
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
unkown
|
page execute and write copy
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
11B1000
|
unkown
|
page execute and write copy
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
62A0000
|
trusted library allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
122A000
|
unkown
|
page execute and write copy
|
||
490F000
|
stack
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
910000
|
unkown
|
page execute and read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
61F6000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
5647000
|
trusted library allocation
|
page execute and read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
921000
|
unkown
|
page execute and write copy
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
1016000
|
unkown
|
page execute and write copy
|
||
1250000
|
unkown
|
page execute and read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
unkown
|
page execute and read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
11E6000
|
unkown
|
page execute and read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
621A000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
unkown
|
page execute and write copy
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
990000
|
unkown
|
page execute and write copy
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
5D37000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
1193000
|
unkown
|
page execute and read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
1205000
|
unkown
|
page execute and write copy
|
||
600A000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
939000
|
unkown
|
page execute and write copy
|
||
1380000
|
heap
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
6358000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
1830000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
561C000
|
stack
|
page read and write
|
||
1299000
|
unkown
|
page execute and write copy
|
||
4CCF000
|
stack
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
997000
|
unkown
|
page execute and read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
remote allocation
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
123D000
|
unkown
|
page execute and write copy
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
6931000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
62FA000
|
trusted library allocation
|
page read and write
|
||
6356000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
6AB4000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
127F000
|
heap
|
page read and write
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
994000
|
unkown
|
page execute and read and write
|
||
12B0000
|
unkown
|
page execute and read and write
|
||
1864000
|
heap
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
197D000
|
heap
|
page read and write
|
||
634D000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
unkown
|
page execute and write copy
|
||
9A6000
|
unkown
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
9E2000
|
unkown
|
page execute and write copy
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
1006000
|
unkown
|
page write copy
|
||
668B000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
6815000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
stack
|
page read and write
|
||
61F4000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
5D37000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
heap
|
page read and write
|
||
A27000
|
unkown
|
page execute and write copy
|
||
60B1000
|
trusted library allocation
|
page read and write
|
||
61F3000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
unkown
|
page execute and write copy
|
||
3D0F000
|
stack
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
1837000
|
heap
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
1219000
|
unkown
|
page execute and write copy
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
1211000
|
unkown
|
page execute and read and write
|
||
100A000
|
unkown
|
page execute and write copy
|
||
370E000
|
stack
|
page read and write
|
||
5491000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
A01000
|
unkown
|
page execute and read and write
|
||
5D37000
|
trusted library allocation
|
page read and write
|
||
635E000
|
trusted library allocation
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
1000000
|
unkown
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
2F37000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
1864000
|
heap
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
16F9000
|
stack
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
6229000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
5770000
|
direct allocation
|
page execute and read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
1006000
|
unkown
|
page write copy
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
5D19000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
563A000
|
trusted library allocation
|
page execute and read and write
|
||
94C000
|
unkown
|
page execute and write copy
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
61D7000
|
trusted library allocation
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
6349000
|
trusted library allocation
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
unkown
|
page execute and write copy
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
There are 962 hidden memdumps, click here to show them.