Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4EIXPY3PJ1MHC0SHPSNPXSN.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe
|
"C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://crisiwarny.store/apif
|
unknown
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/apiFami
|
unknown
|
||
https://crisiwarny.store/Y
|
unknown
|
||
https://crisiwarny.store/api
|
172.67.170.64
|
||
necklacedmny.store
|
|||
https://crisiwarny.store/j9P
|
unknown
|
||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
https://crisiwarny.store/apiB9
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://crisiwarny.store/-
|
unknown
|
||
thumbystriw.store
|
|||
https://crisiwarny.store/apiob$
|
unknown
|
||
https://crisiwarny.store/s
|
unknown
|
||
crisiwarny.store
|
|||
https://crisiwarny.store/5
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://185.215.113.16/off/def.exeL
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://185.215.113.16/off/def.exe0J
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://185.215.113.16/off/def.exe3f
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
172.67.170.64
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.170.64
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
591000
|
unkown
|
page execute and read and write
|
||
44FE000
|
stack
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
7D9000
|
unkown
|
page execute and write copy
|
||
4B00000
|
direct allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
81D000
|
unkown
|
page execute and read and write
|
||
15DF000
|
stack
|
page read and write
|
||
5FCC000
|
trusted library allocation
|
page read and write
|
||
B4C000
|
unkown
|
page execute and read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5FFD000
|
trusted library allocation
|
page read and write
|
||
709F000
|
stack
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5FDF000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
unkown
|
page execute and read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
61A1000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
AE7000
|
unkown
|
page execute and write copy
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
49F7000
|
trusted library allocation
|
page execute and read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
149F000
|
heap
|
page read and write
|
||
4874000
|
trusted library allocation
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
44BF000
|
stack
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
768000
|
unkown
|
page execute and write copy
|
||
5B55000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
49EA000
|
trusted library allocation
|
page execute and read and write
|
||
14C4000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
B0D000
|
unkown
|
page execute and write copy
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
767000
|
unkown
|
page execute and read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
77C000
|
unkown
|
page execute and write copy
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
7EC000
|
unkown
|
page execute and write copy
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
962000
|
unkown
|
page execute and write copy
|
||
3B3F000
|
stack
|
page read and write
|
||
78D000
|
unkown
|
page execute and read and write
|
||
13EE000
|
heap
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
4FDB000
|
stack
|
page read and write
|
||
88E000
|
unkown
|
page execute and write copy
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
789000
|
unkown
|
page execute and write copy
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
5FB1000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
4BAC000
|
stack
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
537D000
|
stack
|
page read and write
|
||
7E6000
|
unkown
|
page execute and read and write
|
||
14BA000
|
heap
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
B88000
|
unkown
|
page execute and read and write
|
||
5FFB000
|
trusted library allocation
|
page read and write
|
||
5FD1000
|
trusted library allocation
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
14B9000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
BA6000
|
unkown
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
775000
|
unkown
|
page execute and write copy
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
4DE1000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
14B9000
|
heap
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
14AD000
|
heap
|
page read and write
|
||
B36000
|
unkown
|
page execute and read and write
|
||
5A8E000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
74C000
|
unkown
|
page execute and write copy
|
||
B4D000
|
unkown
|
page execute and write copy
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
966000
|
unkown
|
page write copy
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
811000
|
unkown
|
page execute and write copy
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
5610000
|
remote allocation
|
page read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
27A0000
|
direct allocation
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
6E10000
|
heap
|
page execute and read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
802000
|
unkown
|
page execute and write copy
|
||
BA3000
|
unkown
|
page execute and write copy
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5B75000
|
trusted library allocation
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page execute and read and write
|
||
AF3000
|
unkown
|
page execute and write copy
|
||
57CE000
|
stack
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
B24000
|
unkown
|
page execute and write copy
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page execute and read and write
|
||
14C2000
|
heap
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5FDD000
|
trusted library allocation
|
page read and write
|
||
4D7D000
|
stack
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page execute and read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
stack
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
7DC000
|
unkown
|
page execute and write copy
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
60BC000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5B72000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
812000
|
unkown
|
page execute and read and write
|
||
B4B000
|
unkown
|
page execute and write copy
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
C14000
|
unkown
|
page execute and write copy
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
60FD000
|
trusted library allocation
|
page read and write
|
||
50DF000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
769000
|
unkown
|
page execute and read and write
|
||
29BF000
|
stack
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
5FDD000
|
trusted library allocation
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
5A81000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
7B0000
|
unkown
|
page execute and write copy
|
||
6005000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5FCA000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
unkown
|
page execute and write copy
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
5FFB000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
6018000
|
trusted library allocation
|
page read and write
|
||
5188000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
unkown
|
page execute and write copy
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
601C000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
60FD000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
4746000
|
heap
|
page read and write
|
||
5610000
|
remote allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
5FB4000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
unkown
|
page execute and read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
808000
|
unkown
|
page execute and read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5F7000
|
unkown
|
page execute and write copy
|
||
14C4000
|
heap
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
C16000
|
unkown
|
page execute and write copy
|
||
144E000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
AFB000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
C16000
|
unkown
|
page execute and write copy
|
||
5B72000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
unkown
|
page execute and read and write
|
||
527E000
|
stack
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
B68000
|
unkown
|
page execute and write copy
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5FC2000
|
trusted library allocation
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
96A000
|
unkown
|
page execute and write copy
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute and read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
5A89000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
785000
|
unkown
|
page execute and read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
806000
|
unkown
|
page execute and write copy
|
||
B6F000
|
unkown
|
page execute and read and write
|
||
333F000
|
stack
|
page read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
383F000
|
stack
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
770000
|
unkown
|
page execute and write copy
|
||
43FF000
|
stack
|
page read and write
|
||
B0E000
|
unkown
|
page execute and read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
4873000
|
trusted library allocation
|
page execute and read and write
|
||
40FF000
|
stack
|
page read and write
|
||
88E000
|
unkown
|
page execute and write copy
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5EB000
|
unkown
|
page execute and write copy
|
||
60AE000
|
trusted library allocation
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
AFA000
|
unkown
|
page execute and write copy
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5FFA000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
6148000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
AF3000
|
unkown
|
page execute and read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
14B5000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
609F000
|
trusted library allocation
|
page read and write
|
||
771000
|
unkown
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
600E000
|
trusted library allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page execute and read and write
|
||
592E000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
55FF000
|
stack
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
786000
|
unkown
|
page execute and write copy
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
5FFC000
|
trusted library allocation
|
page read and write
|
||
966000
|
unkown
|
page write copy
|
||
473F000
|
stack
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5FFD000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
487D000
|
trusted library allocation
|
page execute and read and write
|
||
60AC000
|
trusted library allocation
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5A89000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
877000
|
unkown
|
page execute and write copy
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
B9A000
|
unkown
|
page execute and read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
778000
|
unkown
|
page execute and write copy
|
||
576E000
|
stack
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
C14000
|
unkown
|
page execute and read and write
|
||
5F1E000
|
trusted library allocation
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page execute and write copy
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
4B11000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
6011000
|
trusted library allocation
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
61D3000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
B85000
|
unkown
|
page execute and read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
888000
|
unkown
|
page execute and read and write
|
||
7F1000
|
unkown
|
page execute and read and write
|
||
5FFE000
|
trusted library allocation
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
direct allocation
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
81B000
|
unkown
|
page execute and write copy
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
unkown
|
page execute and read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
784000
|
unkown
|
page execute and write copy
|
||
B86000
|
unkown
|
page execute and write copy
|
||
5FBA000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
C04000
|
unkown
|
page execute and write copy
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
604B000
|
trusted library allocation
|
page read and write
|
||
5FB2000
|
trusted library allocation
|
page read and write
|
||
5FD2000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page execute and read and write
|
||
C04000
|
unkown
|
page execute and write copy
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
B82000
|
unkown
|
page execute and write copy
|
||
4B00000
|
direct allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
5FFC000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
7EB000
|
unkown
|
page execute and read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
89E000
|
unkown
|
page execute and write copy
|
||
B98000
|
unkown
|
page execute and write copy
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
14AD000
|
heap
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
765000
|
unkown
|
page execute and read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
74A000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
6003000
|
trusted library allocation
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
87B000
|
unkown
|
page execute and write copy
|
||
4890000
|
direct allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
BFE000
|
unkown
|
page execute and write copy
|
||
14C4000
|
heap
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
B67000
|
unkown
|
page execute and read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
14B7000
|
heap
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
14A1000
|
heap
|
page read and write
|
||
601A000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
unkown
|
page execute and read and write
|
||
777000
|
unkown
|
page execute and read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
27B7000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
14AD000
|
heap
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
7F9000
|
unkown
|
page execute and write copy
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
14B9000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
889000
|
unkown
|
page execute and write copy
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
5F5000
|
unkown
|
page execute and write copy
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
14BE000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
609D000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
14AD000
|
heap
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5610000
|
remote allocation
|
page read and write
|
||
77D000
|
unkown
|
page execute and read and write
|
||
89F000
|
unkown
|
page execute and write copy
|
||
4B11000
|
heap
|
page read and write
|
||
7B2000
|
unkown
|
page execute and write copy
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
77A000
|
unkown
|
page execute and read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
unkown
|
page execute and read and write
|
||
14BE000
|
heap
|
page read and write
|
||
5FB8000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
6587000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
48CC000
|
stack
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
5FD8000
|
trusted library allocation
|
page read and write
|
||
788000
|
unkown
|
page execute and read and write
|
||
14B8000
|
heap
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
887000
|
unkown
|
page execute and write copy
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
887000
|
unkown
|
page execute and write copy
|
||
859000
|
unkown
|
page execute and read and write
|
||
14CA000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page execute and write copy
|
||
814000
|
heap
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
1210000
|
heap
|
page read and write
|
||
976000
|
unkown
|
page execute and write copy
|
||
34BE000
|
stack
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
4768000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
5FF8000
|
trusted library allocation
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
B5D000
|
unkown
|
page execute and write copy
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
7A3000
|
unkown
|
page execute and write copy
|
||
647F000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5FDA000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
606C000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
5FFA000
|
trusted library allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
unkown
|
page execute and read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
803000
|
unkown
|
page execute and read and write
|
||
7B1000
|
unkown
|
page execute and read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
7DB000
|
unkown
|
page execute and read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
unkown
|
page execute and write copy
|
||
120E000
|
stack
|
page read and write
|
||
60FB000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
89E000
|
unkown
|
page execute and read and write
|
||
313F000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5FC6000
|
trusted library allocation
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
766000
|
unkown
|
page execute and write copy
|
||
6E5E000
|
stack
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
BBD000
|
unkown
|
page execute and write copy
|
||
6012000
|
trusted library allocation
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
600C000
|
trusted library allocation
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
80D000
|
stack
|
page read and write
|
||
603A000
|
trusted library allocation
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
There are 941 hidden memdumps, click here to show them.