Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\02FQBW3AYVFKS8DMY3O.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe
|
"C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://crl.microP
|
unknown
|
||
https://crisiwarny.store/a
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://185.215.113.16/off/def.exeM
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://crisiwarny.store/apiP-
|
unknown
|
||
https://crisiwarny.store/Y
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://crisiwarny.store/5e9f
|
unknown
|
||
https://crisiwarny.store:443/apiLE=user-PCUSERNAME=userUSERPROFILE=C:
|
unknown
|
||
http://185.215.113.16/B
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exev
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://crisiwarny.store/0
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://crisiwarny.store/alt-
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://crisiwarny.store/api3
|
unknown
|
||
https://crisiwarny.store/apiu
|
unknown
|
||
https://crisiwarny.store/r
|
unknown
|
||
https://crisiwarny.store/t
|
unknown
|
There are 35 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
821000
|
unkown
|
page execute and read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
A8C000
|
unkown
|
page execute and read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
4B8B000
|
trusted library allocation
|
page execute and read and write
|
||
5CD000
|
unkown
|
page execute and write copy
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
55FD000
|
stack
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
B1D000
|
unkown
|
page execute and write copy
|
||
1504000
|
heap
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
64C2000
|
trusted library allocation
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page execute and write copy
|
||
6461000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
56E000
|
unkown
|
page execute and write copy
|
||
17EB000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
54A000
|
unkown
|
page execute and read and write
|
||
365F000
|
stack
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
820000
|
unkown
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
59BD000
|
stack
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
6374000
|
trusted library allocation
|
page read and write
|
||
5E3000
|
unkown
|
page execute and read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
636A000
|
trusted library allocation
|
page read and write
|
||
55BD000
|
stack
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
6358000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
4A4C000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
49F4000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
A96000
|
unkown
|
page execute and read and write
|
||
5EBF000
|
trusted library allocation
|
page read and write
|
||
623C000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
538000
|
unkown
|
page execute and read and write
|
||
62CD000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
5755000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6F2D000
|
stack
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
unkown
|
page execute and write copy
|
||
632F000
|
trusted library allocation
|
page read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
60BC000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
unkown
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
597F000
|
stack
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
AE6000
|
unkown
|
page execute and read and write
|
||
4E51000
|
heap
|
page read and write
|
||
60D4000
|
trusted library allocation
|
page read and write
|
||
573B000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
634D000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
unkown
|
page execute and write copy
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
unkown
|
page execute and write copy
|
||
1504000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and write copy
|
||
305E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
B15000
|
unkown
|
page execute and write copy
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
6098000
|
trusted library allocation
|
page read and write
|
||
635B000
|
trusted library allocation
|
page read and write
|
||
633C000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
6A04000
|
trusted library allocation
|
page read and write
|
||
5DB3000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
56C000
|
unkown
|
page execute and read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
637A000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
A13000
|
unkown
|
page execute and read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
17F6000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
636E000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
4B87000
|
trusted library allocation
|
page execute and read and write
|
||
311E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4B7A000
|
trusted library allocation
|
page execute and read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
6302000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
AB8000
|
unkown
|
page execute and write copy
|
||
56FC000
|
stack
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
B17000
|
unkown
|
page execute and write copy
|
||
C34000
|
heap
|
page read and write
|
||
62CB000
|
trusted library allocation
|
page read and write
|
||
623C000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
62E4000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
40CE000
|
stack
|
page read and write
|
||
A70000
|
unkown
|
page execute and read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
49F3000
|
trusted library allocation
|
page execute and read and write
|
||
48C0000
|
heap
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
3160000
|
direct allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page execute and read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
6316000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
5FCD000
|
trusted library allocation
|
page read and write
|
||
62EF000
|
trusted library allocation
|
page read and write
|
||
6092000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
6306000
|
trusted library allocation
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
6398000
|
trusted library allocation
|
page read and write
|
||
68FB000
|
trusted library allocation
|
page read and write
|
||
55D000
|
unkown
|
page execute and write copy
|
||
4B4E000
|
stack
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
634F000
|
trusted library allocation
|
page read and write
|
||
5F9B000
|
trusted library allocation
|
page read and write
|
||
725F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
17F9000
|
heap
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
62E7000
|
trusted library allocation
|
page read and write
|
||
887000
|
unkown
|
page execute and write copy
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5EAF000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
63C1000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
640E000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
3D6000
|
unkown
|
page write copy
|
||
170E000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page execute and write copy
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
6174000
|
trusted library allocation
|
page read and write
|
||
6332000
|
trusted library allocation
|
page read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
unkown
|
page execute and read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
heap
|
page read and write
|
||
62E8000
|
trusted library allocation
|
page read and write
|
||
645F000
|
trusted library allocation
|
page read and write
|
||
6365000
|
trusted library allocation
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
A4C000
|
unkown
|
page execute and read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
633E000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
5DB5000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
65E000
|
unkown
|
page execute and write copy
|
||
5CC000
|
unkown
|
page execute and read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
561000
|
unkown
|
page execute and write copy
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
170A000
|
heap
|
page read and write
|
||
28C0000
|
direct allocation
|
page read and write
|
||
574C000
|
trusted library allocation
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
17EF000
|
heap
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
642F000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
5A8000
|
unkown
|
page execute and write copy
|
||
A6C000
|
unkown
|
page execute and write copy
|
||
A9D000
|
unkown
|
page execute and write copy
|
||
1504000
|
heap
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
6344000
|
trusted library allocation
|
page read and write
|
||
640C000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5D6000
|
unkown
|
page execute and read and write
|
||
17FB000
|
heap
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
64A6000
|
trusted library allocation
|
page read and write
|
||
17FD000
|
heap
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
635B000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
6241000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
17DE000
|
heap
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
A8D000
|
unkown
|
page execute and write copy
|
||
3F1F000
|
stack
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
B04000
|
unkown
|
page execute and write copy
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
643E000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
62F2000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5EBF000
|
trusted library allocation
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
63BF000
|
trusted library allocation
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
6333000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
54B000
|
unkown
|
page execute and write copy
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
A12000
|
unkown
|
page execute and write copy
|
||
3CDE000
|
stack
|
page read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
555000
|
unkown
|
page execute and read and write
|
||
17EB000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
B2E000
|
unkown
|
page execute and write copy
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
6378000
|
trusted library allocation
|
page read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
53A000
|
unkown
|
page execute and write copy
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
unkown
|
page execute and read and write
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
612D000
|
trusted library allocation
|
page read and write
|
||
63DF000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
6346000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
B16000
|
unkown
|
page execute and read and write
|
||
E10000
|
heap
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
A08000
|
unkown
|
page execute and read and write
|
||
5EB000
|
unkown
|
page execute and read and write
|
||
5E4000
|
unkown
|
page execute and write copy
|
||
3A8E000
|
stack
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
17FD000
|
heap
|
page read and write
|
||
9E9000
|
unkown
|
page execute and write copy
|
||
642D000
|
trusted library allocation
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
573D000
|
stack
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
63A3000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
5DB5000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
620C000
|
trusted library allocation
|
page read and write
|
||
62F1000
|
trusted library allocation
|
page read and write
|
||
3160000
|
direct allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page execute and write copy
|
||
E60000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page execute and write copy
|
||
6363000
|
trusted library allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
6095000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
unkown
|
page execute and write copy
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
62E2000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
A11000
|
unkown
|
page execute and read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5BE000
|
unkown
|
page execute and read and write
|
||
4C60000
|
heap
|
page execute and read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
A27000
|
unkown
|
page execute and write copy
|
||
1504000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
6372000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
1738000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
3D2000
|
unkown
|
page execute and write copy
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
A28000
|
unkown
|
page execute and read and write
|
||
5FC000
|
unkown
|
page execute and write copy
|
||
87B000
|
unkown
|
page execute and read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
A08000
|
unkown
|
page execute and write copy
|
||
3E6000
|
unkown
|
page execute and write copy
|
||
5EC7000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
62D9000
|
trusted library allocation
|
page read and write
|
||
5DB5000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
677F000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
6362000
|
trusted library allocation
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
6353000
|
trusted library allocation
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
62F8000
|
trusted library allocation
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
17C8000
|
heap
|
page read and write
|
||
6356000
|
trusted library allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
63E1000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
56A000
|
unkown
|
page execute and write copy
|
||
380E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
62E5000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
A2A000
|
unkown
|
page execute and read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
3187000
|
heap
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
14DD000
|
stack
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
586000
|
unkown
|
page execute and write copy
|
||
17E0000
|
heap
|
page read and write
|
||
6A12000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
A78000
|
unkown
|
page execute and write copy
|
||
4E60000
|
heap
|
page read and write
|
||
16CB000
|
stack
|
page read and write
|
||
54C000
|
unkown
|
page execute and read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
5F2E000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
6373000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
1781000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
647C000
|
trusted library allocation
|
page read and write
|
||
633C000
|
trusted library allocation
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6372000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
5D4000
|
unkown
|
page execute and write copy
|
||
571000
|
unkown
|
page execute and read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
17F6000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1745000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
562000
|
unkown
|
page execute and read and write
|
||
6363000
|
trusted library allocation
|
page read and write
|
||
B2D000
|
unkown
|
page execute and read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
5F9B000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page execute and read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
62D9000
|
trusted library allocation
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
63DA000
|
trusted library allocation
|
page read and write
|
||
B15000
|
unkown
|
page execute and write copy
|
||
1783000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page execute and write copy
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
6473000
|
trusted library allocation
|
page read and write
|
||
AE7000
|
unkown
|
page execute and write copy
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
3170000
|
direct allocation
|
page execute and read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
A0C000
|
unkown
|
page execute and write copy
|
||
55F000
|
unkown
|
page execute and read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
63DC000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
87B000
|
unkown
|
page execute and write copy
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
821000
|
unkown
|
page execute and write copy
|
||
28D7000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
7050000
|
heap
|
page execute and read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
609D000
|
trusted library allocation
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
17FA000
|
heap
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and read and write
|
||
379F000
|
stack
|
page read and write
|
||
17FD000
|
heap
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5F35000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
633E000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6238000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
3DA000
|
unkown
|
page execute and write copy
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
65E000
|
unkown
|
page execute and write copy
|
||
6353000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
623E000
|
trusted library allocation
|
page read and write
|
||
60A3000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
636C000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
64C4000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
60F4000
|
trusted library allocation
|
page read and write
|
||
639A000
|
trusted library allocation
|
page read and write
|
||
6093000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
3DA000
|
unkown
|
page execute and read and write
|
||
4C2C000
|
stack
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
133A000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
5CB000
|
unkown
|
page execute and write copy
|
||
48B0000
|
direct allocation
|
page read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
609D000
|
trusted library allocation
|
page read and write
|
||
64A8000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
unkown
|
page execute and read and write
|
||
62F6000
|
trusted library allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
5E67000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
623A000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
563F000
|
trusted library allocation
|
page read and write
|
||
656000
|
unkown
|
page execute and write copy
|
||
A29000
|
unkown
|
page execute and write copy
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
677D000
|
trusted library allocation
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
5DB3000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
616C000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5E0F000
|
trusted library allocation
|
page read and write
|
||
5E26000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
6598000
|
trusted library allocation
|
page read and write
|
||
3D2000
|
unkown
|
page execute and read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
17FB000
|
heap
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
530C000
|
stack
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
unkown
|
page execute and read and write
|
||
49FD000
|
trusted library allocation
|
page execute and read and write
|
||
17E3000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
B2D000
|
unkown
|
page execute and write copy
|
||
4E4F000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
17FA000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
17E2000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
A39000
|
unkown
|
page execute and write copy
|
||
A8E000
|
unkown
|
page execute and read and write
|
||
17ED000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5763000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6AA3000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5D3000
|
unkown
|
page execute and read and write
|
||
540F000
|
stack
|
page read and write
|
||
623E000
|
trusted library allocation
|
page read and write
|
||
48D2000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
647E000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
62EA000
|
trusted library allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
623F000
|
trusted library allocation
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
6232000
|
trusted library allocation
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
A64000
|
unkown
|
page execute and read and write
|
||
430F000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
6471000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
6361000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
17E7000
|
heap
|
page read and write
|
||
632C000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
17FB000
|
heap
|
page read and write
|
||
3D6000
|
unkown
|
page write copy
|
||
315E000
|
stack
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
B07000
|
unkown
|
page execute and write copy
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
There are 1000 hidden memdumps, click here to show them.