Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TAW4YM7XHY64JPKK4AWZZOV.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe
|
"C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
crisiwarny.store
|
|||
scriptyprefej.store
|
|||
navygenerayk.store
|
|||
thumbystriw.store
|
|||
https://crisiwarny.store/_
|
unknown
|
||
https://presticitpo.store:443/apia
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://crisiwarny.store/a
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://crisiwarny.store/h
|
unknown
|
||
http://185.215.113.16/off/def.exeDa
|
unknown
|
||
https://crisiwarny.store/apiV4I
|
unknown
|
||
https://crisiwarny.store/apig1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://crisiwarny.store:443/apiohrz.default-release/key4.dbPK
|
unknown
|
||
https://crisiwarny.store/apipw
|
unknown
|
||
https://crisiwarny.store:443/api
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://crisiwarny.store/apia5
|
unknown
|
||
http://185.215.113.16:80/off/def.exerosoft
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://crisiwarny.store/apit
|
unknown
|
||
https://crisiwarny.store:443/apitxtPK
|
unknown
|
||
https://crisiwarny.store/api.
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://presticitpo.store:443/api
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://crisiwarny.store/fijngjgc
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://crisiwarny.store/aping
|
unknown
|
There are 43 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5E71000
|
trusted library allocation
|
page read and write
|
||
D81000
|
unkown
|
page execute and read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
F33000
|
unkown
|
page execute and read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
63FF000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute and write copy
|
||
177F000
|
stack
|
page read and write
|
||
EE8000
|
unkown
|
page execute and read and write
|
||
1938000
|
heap
|
page read and write
|
||
192A000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
6474000
|
trusted library allocation
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
5EA4000
|
trusted library allocation
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
6443000
|
trusted library allocation
|
page read and write
|
||
189E000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
5E8F000
|
trusted library allocation
|
page read and write
|
||
1945000
|
heap
|
page read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
F65000
|
unkown
|
page execute and read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
E8C000
|
unkown
|
page execute and write copy
|
||
18D6000
|
heap
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
18EF000
|
heap
|
page read and write
|
||
1883000
|
heap
|
page read and write
|
||
6401000
|
trusted library allocation
|
page read and write
|
||
63C5000
|
trusted library allocation
|
page read and write
|
||
5F4A000
|
trusted library allocation
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
64A2000
|
trusted library allocation
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
1947000
|
heap
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1932000
|
heap
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
6458000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
F6F000
|
unkown
|
page execute and read and write
|
||
1001000
|
unkown
|
page execute and write copy
|
||
644E000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
unkown
|
page execute and read and write
|
||
619E000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
193F000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
F12000
|
unkown
|
page execute and write copy
|
||
10FE000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
194C000
|
heap
|
page read and write
|
||
1947000
|
heap
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
5E8D000
|
trusted library allocation
|
page read and write
|
||
5F48000
|
trusted library allocation
|
page read and write
|
||
6321000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
189E000
|
heap
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
4C42000
|
heap
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
CEA000
|
unkown
|
page execute and read and write
|
||
1888000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
193F000
|
heap
|
page read and write
|
||
F57000
|
unkown
|
page execute and read and write
|
||
1102000
|
heap
|
page read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
5F1E000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
63D2000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
unkown
|
page execute and write copy
|
||
F6F000
|
unkown
|
page execute and write copy
|
||
CBE000
|
stack
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
6312000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
EE3000
|
unkown
|
page execute and read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
F03000
|
unkown
|
page execute and write copy
|
||
1926000
|
heap
|
page read and write
|
||
6173000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
DDB000
|
unkown
|
page execute and write copy
|
||
1888000
|
heap
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
2BD7000
|
heap
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
193D000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
61B6000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
1947000
|
heap
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
6403000
|
trusted library allocation
|
page read and write
|
||
5380000
|
remote allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
5000000
|
heap
|
page execute and read and write
|
||
332E000
|
stack
|
page read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
641A000
|
trusted library allocation
|
page read and write
|
||
1899000
|
heap
|
page read and write
|
||
63B6000
|
trusted library allocation
|
page read and write
|
||
E70000
|
unkown
|
page execute and read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
unkown
|
page execute and read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
1949000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
33B7000
|
heap
|
page read and write
|
||
192E000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
F69000
|
unkown
|
page execute and write copy
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
185A000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
64DD000
|
trusted library allocation
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
EA2000
|
unkown
|
page execute and write copy
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
5E89000
|
trusted library allocation
|
page read and write
|
||
D80000
|
unkown
|
page read and write
|
||
192F000
|
heap
|
page read and write
|
||
657F000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
F46000
|
unkown
|
page execute and read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
E69000
|
unkown
|
page execute and read and write
|
||
311E000
|
stack
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
FF6000
|
unkown
|
page execute and write copy
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
2C1B000
|
stack
|
page read and write
|
||
5E8D000
|
trusted library allocation
|
page read and write
|
||
6468000
|
trusted library allocation
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
64DF000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
18D6000
|
heap
|
page read and write
|
||
63CC000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
FC8000
|
unkown
|
page execute and write copy
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
4DCB000
|
stack
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
1932000
|
heap
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
1926000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
10AA000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page execute and write copy
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
EB6000
|
unkown
|
page execute and read and write
|
||
192E000
|
heap
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
63D7000
|
trusted library allocation
|
page read and write
|
||
641D000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
189E000
|
heap
|
page read and write
|
||
FD4000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
6427000
|
trusted library allocation
|
page read and write
|
||
63D4000
|
trusted library allocation
|
page read and write
|
||
5EEE000
|
trusted library allocation
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
DE5000
|
unkown
|
page execute and write copy
|
||
F81000
|
unkown
|
page execute and write copy
|
||
5EAC000
|
trusted library allocation
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
100D000
|
unkown
|
page execute and read and write
|
||
11EE000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
5F3F000
|
trusted library allocation
|
page read and write
|
||
18EF000
|
heap
|
page read and write
|
||
CE2000
|
unkown
|
page execute and write copy
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
72AD000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
1927000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
641B000
|
trusted library allocation
|
page read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
F15000
|
unkown
|
page execute and write copy
|
||
451E000
|
stack
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
5EC3000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
64DB000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
4EF7000
|
trusted library allocation
|
page execute and read and write
|
||
104A000
|
unkown
|
page execute and read and write
|
||
63C3000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
642D000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
6441000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
6590000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
stack
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
5CCF000
|
stack
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
6529000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
65B3000
|
trusted library allocation
|
page read and write
|
||
F70000
|
unkown
|
page execute and read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
108C000
|
unkown
|
page execute and write copy
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
E66000
|
unkown
|
page execute and write copy
|
||
F82000
|
unkown
|
page execute and read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
640C000
|
trusted library allocation
|
page read and write
|
||
63CF000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
193C000
|
heap
|
page read and write
|
||
64FE000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
6444000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
17BB000
|
stack
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
FE3000
|
unkown
|
page execute and read and write
|
||
F80000
|
unkown
|
page execute and write copy
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
E54000
|
unkown
|
page execute and read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
193D000
|
heap
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
6581000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
unkown
|
page execute and read and write
|
||
F3B000
|
unkown
|
page execute and write copy
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page execute and read and write
|
||
194B000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
FCC000
|
unkown
|
page execute and read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
5F4C000
|
trusted library allocation
|
page read and write
|
||
658E000
|
trusted library allocation
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
unkown
|
page execute and write copy
|
||
35DF000
|
stack
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
652B000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
63CA000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
111B000
|
stack
|
page read and write
|
||
F90000
|
unkown
|
page execute and write copy
|
||
DDB000
|
unkown
|
page execute and read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
640A000
|
trusted library allocation
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
100B000
|
unkown
|
page execute and write copy
|
||
642D000
|
trusted library allocation
|
page read and write
|
||
6226000
|
trusted library allocation
|
page read and write
|
||
4D73000
|
trusted library allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
F8E000
|
unkown
|
page execute and write copy
|
||
37BF000
|
stack
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
D81000
|
unkown
|
page execute and write copy
|
||
5EA3000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
unkown
|
page execute and read and write
|
||
1949000
|
heap
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
63DA000
|
trusted library allocation
|
page read and write
|
||
6677000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6466000
|
trusted library allocation
|
page read and write
|
||
6442000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
18D4000
|
heap
|
page read and write
|
||
6476000
|
trusted library allocation
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
1935000
|
heap
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
648B000
|
trusted library allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
192F000
|
heap
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
63CB000
|
trusted library allocation
|
page read and write
|
||
EAA000
|
unkown
|
page execute and write copy
|
||
617F000
|
trusted library allocation
|
page read and write
|
||
18D7000
|
heap
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
E57000
|
unkown
|
page execute and write copy
|
||
6B81000
|
trusted library allocation
|
page read and write
|
||
5F0E000
|
trusted library allocation
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
5FA2000
|
trusted library allocation
|
page read and write
|
||
5F2C000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5EC2000
|
trusted library allocation
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
6441000
|
trusted library allocation
|
page read and write
|
||
648D000
|
trusted library allocation
|
page read and write
|
||
5EC3000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
107C000
|
unkown
|
page execute and write copy
|
||
18CB000
|
heap
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
FDF000
|
unkown
|
page execute and read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
6176000
|
trusted library allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
5F2E000
|
trusted library allocation
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
F2D000
|
unkown
|
page execute and write copy
|
||
18D5000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
unkown
|
page execute and write copy
|
||
10F0000
|
heap
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
stack
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
5E82000
|
trusted library allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
579D000
|
stack
|
page read and write
|
||
5A1F000
|
stack
|
page read and write
|
||
101A000
|
unkown
|
page execute and write copy
|
||
4EFF000
|
stack
|
page read and write
|
||
1933000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
5E2F000
|
stack
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
64FA000
|
trusted library allocation
|
page read and write
|
||
CE6000
|
unkown
|
page write copy
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
63BB000
|
trusted library allocation
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
63BD000
|
trusted library allocation
|
page read and write
|
||
64A5000
|
trusted library allocation
|
page read and write
|
||
4EFB000
|
trusted library allocation
|
page execute and read and write
|
||
1949000
|
heap
|
page read and write
|
||
6172000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
6425000
|
trusted library allocation
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
644C000
|
trusted library allocation
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
192A000
|
heap
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
194B000
|
heap
|
page read and write
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
18D5000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
DE6000
|
unkown
|
page execute and read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
CE2000
|
unkown
|
page execute and read and write
|
||
EC6000
|
unkown
|
page execute and read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
643F000
|
trusted library allocation
|
page read and write
|
||
6428000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
1075000
|
unkown
|
page execute and write copy
|
||
1927000
|
heap
|
page read and write
|
||
14FA000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
1944000
|
heap
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
E70000
|
unkown
|
page execute and write copy
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
625E000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
1934000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
E65000
|
unkown
|
page execute and read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
64A3000
|
trusted library allocation
|
page read and write
|
||
1947000
|
heap
|
page read and write
|
||
18DC000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
F79000
|
unkown
|
page execute and write copy
|
||
18D6000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
64CA000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
unkown
|
page execute and read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5FA4000
|
trusted library allocation
|
page read and write
|
||
63B9000
|
trusted library allocation
|
page read and write
|
||
193F000
|
heap
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
FEC000
|
unkown
|
page execute and write copy
|
||
BA4000
|
heap
|
page read and write
|
||
64CC000
|
trusted library allocation
|
page read and write
|
||
F90000
|
unkown
|
page execute and write copy
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
6411000
|
trusted library allocation
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
631F000
|
trusted library allocation
|
page read and write
|
||
CE6000
|
unkown
|
page write copy
|
||
4EEA000
|
trusted library allocation
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
FEE000
|
unkown
|
page execute and read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
193D000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
569D000
|
stack
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
1943000
|
heap
|
page read and write
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
61D6000
|
trusted library allocation
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
644E000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
unkown
|
page execute and write copy
|
||
185E000
|
heap
|
page read and write
|
||
EA3000
|
unkown
|
page execute and read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
6434000
|
trusted library allocation
|
page read and write
|
||
F99000
|
unkown
|
page execute and write copy
|
||
5E88000
|
trusted library allocation
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
1946000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page read and write
|
||
EB5000
|
unkown
|
page execute and write copy
|
||
1938000
|
heap
|
page read and write
|
||
1947000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
18DC000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
1003000
|
unkown
|
page execute and read and write
|
||
194E000
|
heap
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
6456000
|
trusted library allocation
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
6413000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
642B000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
1922000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
5E8C000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
644C000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
63CD000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5380000
|
remote allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
5FA2000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
101E000
|
unkown
|
page execute and read and write
|
||
439F000
|
stack
|
page read and write
|
||
108B000
|
unkown
|
page execute and write copy
|
||
2BC0000
|
heap
|
page read and write
|
||
63BA000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
CF6000
|
unkown
|
page execute and write copy
|
||
1674000
|
heap
|
page read and write
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
192E000
|
heap
|
page read and write
|
||
5E7E000
|
trusted library allocation
|
page read and write
|
||
6172000
|
trusted library allocation
|
page read and write
|
||
64FC000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
1934000
|
heap
|
page read and write
|
||
63D7000
|
trusted library allocation
|
page read and write
|
||
194D000
|
heap
|
page read and write
|
||
1934000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
6256000
|
trusted library allocation
|
page read and write
|
||
F30000
|
unkown
|
page execute and write copy
|
||
6426000
|
trusted library allocation
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
63B8000
|
trusted library allocation
|
page read and write
|
||
F65000
|
unkown
|
page execute and write copy
|
||
3C1F000
|
stack
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
6312000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
107C000
|
unkown
|
page execute and write copy
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
6437000
|
trusted library allocation
|
page read and write
|
||
653B000
|
trusted library allocation
|
page read and write
|
||
63D8000
|
trusted library allocation
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
6561000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
5111000
|
trusted library allocation
|
page read and write
|
||
642F000
|
trusted library allocation
|
page read and write
|
||
5380000
|
remote allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
1932000
|
heap
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
FD9000
|
unkown
|
page execute and write copy
|
||
194E000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
5EA3000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
63EE000
|
trusted library allocation
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
5EC7000
|
trusted library allocation
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
unkown
|
page execute and write copy
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
4D7D000
|
trusted library allocation
|
page execute and read and write
|
||
63B6000
|
trusted library allocation
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
FAD000
|
unkown
|
page execute and read and write
|
||
325E000
|
stack
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
108B000
|
unkown
|
page execute and read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
6432000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
unkown
|
page execute and write copy
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
63EF000
|
trusted library allocation
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
1068000
|
unkown
|
page execute and write copy
|
||
5390000
|
direct allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
655F000
|
trusted library allocation
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
64DD000
|
trusted library allocation
|
page read and write
|
||
6539000
|
trusted library allocation
|
page read and write
|
||
631D000
|
trusted library allocation
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
1937000
|
heap
|
page read and write
|
||
F9A000
|
unkown
|
page execute and read and write
|
||
FEB000
|
unkown
|
page execute and read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
5E89000
|
trusted library allocation
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
63F3000
|
trusted library allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
5E72000
|
trusted library allocation
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
1935000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
5F64000
|
trusted library allocation
|
page read and write
|
||
63BB000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
192F000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
1075000
|
unkown
|
page execute and write copy
|
||
1674000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
F80000
|
unkown
|
page execute and write copy
|
||
73EE000
|
stack
|
page read and write
|
||
1933000
|
heap
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
5F9A000
|
trusted library allocation
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
6314000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
1927000
|
heap
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
F3E000
|
unkown
|
page execute and read and write
|
||
1895000
|
heap
|
page read and write
|
||
6435000
|
trusted library allocation
|
page read and write
|
||
F48000
|
unkown
|
page execute and write copy
|
||
BA4000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
6418000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
ED6000
|
unkown
|
page execute and write copy
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
63B6000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
193C000
|
heap
|
page read and write
|
||
1076000
|
unkown
|
page execute and read and write
|
||
6405000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
unkown
|
page execute and read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
6170000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
6407000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
18DC000
|
heap
|
page read and write
|
||
5B5D000
|
stack
|
page read and write
|
||
EDA000
|
unkown
|
page execute and read and write
|
||
1850000
|
heap
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
EDB000
|
unkown
|
page execute and write copy
|
||
6405000
|
trusted library allocation
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
1077000
|
unkown
|
page execute and write copy
|
||
465E000
|
stack
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
1949000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
EB4000
|
unkown
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
192D000
|
heap
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
6312000
|
trusted library allocation
|
page read and write
|
There are 1055 hidden memdumps, click here to show them.