Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_91e76ee78e1f204b45c73efb41d5deb2f3e72f7_22e76915_6d55beea-221e-4aa1-acde-4424e739a9d1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD76D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Oct 27 19:15:35 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8B6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8E6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\R2L4HOH3ABPEWSR51AXUR0XR.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe
|
"C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 1880
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
crisiwarny.store
|
|||
scriptyprefej.store
|
|||
navygenerayk.store
|
|||
thumbystriw.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://crisiwarny.store/h
|
unknown
|
||
http://185.215.113.16/mine/random.exeM
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://crisiwarny.store/O
|
unknown
|
||
http://185.215.113.16/mine/random.exe
|
unknown
|
||
http://185.215.113.16/P
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://crisiwarny.store/api6Co~
|
unknown
|
||
https://crisiwarny.store/apire1
|
unknown
|
||
http://185.215.113.16/K
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://crisiwarny.store/o
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://crisiwarny.store/r
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://185.215.113.16/off/def.exest
|
unknown
|
||
https://crisiwarny.store/apixe
|
unknown
|
||
https://crisiwarny.store/0v
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://crisiwarny.store/?
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://crisiwarny.store
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://crisiwarny.store/apiny
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://crisiwarny.store/7
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 43 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
461E000
|
stack
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5CA4000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
5EF3000
|
trusted library allocation
|
page read and write
|
||
5F4F000
|
trusted library allocation
|
page read and write
|
||
610F000
|
trusted library allocation
|
page read and write
|
||
2BDB000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
50BC000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
5A03000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
unkown
|
page execute and write copy
|
||
1178000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5F6B000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5F74000
|
trusted library allocation
|
page read and write
|
||
59FA000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
unkown
|
page execute and write copy
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
trusted library allocation
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5EEF000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library allocation
|
page execute and read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5A0E000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5F4F000
|
trusted library allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
5A0E000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5EE7000
|
trusted library allocation
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5F08000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
unkown
|
page execute and write copy
|
||
5F0F000
|
trusted library allocation
|
page read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
5CA5000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5EF2000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
unkown
|
page execute and write copy
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
5CA0000
|
trusted library allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
A65000
|
unkown
|
page execute and write copy
|
||
114C000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
5FAD000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
A27000
|
unkown
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
A72000
|
unkown
|
page execute and write copy
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
5F3C000
|
trusted library allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
84A000
|
unkown
|
page execute and read and write
|
||
59F5000
|
trusted library allocation
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
842000
|
unkown
|
page execute and read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
59F1000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
unkown
|
page execute and read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
5540000
|
remote allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
5E0F000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
A97000
|
unkown
|
page execute and write copy
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5F3C000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5540000
|
remote allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
A08000
|
unkown
|
page execute and write copy
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5EE9000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
5A11000
|
trusted library allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
A52000
|
unkown
|
page execute and read and write
|
||
117A000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
846000
|
unkown
|
page write copy
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
846000
|
unkown
|
page write copy
|
||
5F02000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
unkown
|
page execute and write copy
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
unkown
|
page execute and write copy
|
||
840000
|
unkown
|
page readonly
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
4E53000
|
trusted library allocation
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page execute and read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5CA6000
|
trusted library allocation
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5EE5000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
59FE000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5EEE000
|
trusted library allocation
|
page read and write
|
||
116E000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
5A0F000
|
trusted library allocation
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
9F7000
|
unkown
|
page execute and read and write
|
||
5540000
|
remote allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
trusted library allocation
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5F02000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
5F08000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
unkown
|
page execute and read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
A26000
|
unkown
|
page execute and write copy
|
||
115C000
|
heap
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
1150000
|
heap
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
63B9000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
BBA000
|
unkown
|
page execute and write copy
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5CA3000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5CAB000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
direct allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
A5A000
|
unkown
|
page execute and write copy
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
A4C000
|
unkown
|
page execute and read and write
|
||
A76000
|
unkown
|
page execute and read and write
|
||
115C000
|
heap
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
59F2000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
840000
|
unkown
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
5CA5000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5A15000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5FD5000
|
trusted library allocation
|
page read and write
|
||
5F04000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
59F5000
|
trusted library allocation
|
page read and write
|
||
5EE4000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
heap
|
page execute and read and write
|
||
A00000
|
unkown
|
page execute and read and write
|
||
1150000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
5A03000
|
trusted library allocation
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
5A24000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5CAD000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
9A8000
|
unkown
|
page execute and read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
5ED6000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
A14000
|
unkown
|
page execute and write copy
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
63AB000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
52F1000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
63BC000
|
trusted library allocation
|
page read and write
|
||
A42000
|
unkown
|
page execute and read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
66B3000
|
trusted library allocation
|
page read and write
|
||
856000
|
unkown
|
page execute and write copy
|
||
5FB1000
|
trusted library allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
B93000
|
unkown
|
page execute and write copy
|
||
4A40000
|
direct allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5CA9000
|
trusted library allocation
|
page read and write
|
||
5FB7000
|
trusted library allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
5EF4000
|
trusted library allocation
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
9AA000
|
unkown
|
page execute and write copy
|
||
114B000
|
heap
|
page read and write
|
||
9CA000
|
unkown
|
page execute and read and write
|
||
5CA7000
|
trusted library allocation
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5F67000
|
trusted library allocation
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
9D6000
|
unkown
|
page execute and read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
116E000
|
heap
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
unkown
|
page execute and write copy
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
4D31000
|
heap
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
5FAC000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
90B000
|
unkown
|
page execute and write copy
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
5A19000
|
trusted library allocation
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
A29000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5CA7000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
unkown
|
page execute and write copy
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
59C6000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page execute and write copy
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
449F000
|
stack
|
page read and write
|
||
A34000
|
unkown
|
page execute and write copy
|
||
1171000
|
heap
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
5CA3000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
unkown
|
page execute and write copy
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
A13000
|
unkown
|
page execute and read and write
|
||
5F2E000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
unkown
|
page execute and write copy
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
AF4000
|
unkown
|
page execute and write copy
|
||
113E000
|
heap
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
B97000
|
unkown
|
page execute and write copy
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
512C000
|
stack
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
5EEA000
|
trusted library allocation
|
page read and write
|
||
A16000
|
unkown
|
page execute and read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
AE4000
|
unkown
|
page execute and write copy
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
A39000
|
unkown
|
page execute and read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5EF2000
|
trusted library allocation
|
page read and write
|
||
62F1000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
AF7000
|
unkown
|
page execute and write copy
|
||
1144000
|
heap
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
116E000
|
heap
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5F35000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
1170000
|
heap
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
9CA000
|
unkown
|
page execute and write copy
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
unkown
|
page execute and write copy
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5F35000
|
trusted library allocation
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
610D000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
4E54000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
4ED7000
|
trusted library allocation
|
page execute and read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
59D8000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
unkown
|
page execute and write copy
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
84A000
|
unkown
|
page execute and write copy
|
||
5F09000
|
trusted library allocation
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
A81000
|
unkown
|
page execute and read and write
|
||
9E6000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
5FD3000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
73ED000
|
stack
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
A4D000
|
unkown
|
page execute and write copy
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
5F9D000
|
trusted library allocation
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
A94000
|
unkown
|
page execute and read and write
|
||
5EE7000
|
trusted library allocation
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
5F01000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
5EE9000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
5CAD000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
heap
|
page execute and read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
4EAC000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
5F33000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page execute and read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
unkown
|
page execute and read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
2C97000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
5EEA000
|
trusted library allocation
|
page read and write
|
||
59F3000
|
trusted library allocation
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
842000
|
unkown
|
page execute and write copy
|
||
A2A000
|
unkown
|
page execute and read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page execute and read and write
|
||
5F04000
|
trusted library allocation
|
page read and write
|
There are 873 hidden memdumps, click here to show them.