Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4LSU4O6YQKPDF8R94WQ6K0Z23.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe
|
"C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/api
|
172.67.170.64
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/a
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://crisiwarny.store/apie
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://185.215.113.16/off/def.exeki
|
unknown
|
||
https://crisiwarny.store/apial
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://crisiwarny.store/h(g
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://crisiwarny.store/Y
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://crisiwarny.store/k:0
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://crisiwarny.store/k6lv
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://185.215.113.16/D
|
unknown
|
||
https://crisiwarny.store:443/api
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16/x
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
http://185.215.113.16:80/off/def.exerosoft
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://185.215.113.16/off/def.exek
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
172.67.170.64
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.170.64
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D31000
|
unkown
|
page execute and read and write
|
||
1650000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
A76000
|
unkown
|
page execute and write copy
|
||
2E3E000
|
stack
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
297D000
|
heap
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
58A5000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
C8E000
|
unkown
|
page execute and write copy
|
||
51E1000
|
heap
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
D0F000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
F82000
|
unkown
|
page execute and write copy
|
||
51E2000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
FE7000
|
unkown
|
page execute and read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
FE6000
|
unkown
|
page execute and write copy
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
79B0000
|
heap
|
page execute and read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
unkown
|
page execute and read and write
|
||
C48000
|
unkown
|
page execute and read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
F96000
|
unkown
|
page execute and write copy
|
||
C10000
|
direct allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5688000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
A6A000
|
unkown
|
page execute and read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
536B000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
C99000
|
unkown
|
page execute and write copy
|
||
2F7E000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
C87000
|
unkown
|
page execute and read and write
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
C45000
|
unkown
|
page execute and write copy
|
||
165A000
|
heap
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
6751000
|
trusted library allocation
|
page read and write
|
||
C57000
|
unkown
|
page execute and write copy
|
||
C61000
|
unkown
|
page execute and write copy
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
F92000
|
unkown
|
page execute and write copy
|
||
64C3000
|
trusted library allocation
|
page read and write
|
||
568B000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page execute and read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
5ECE000
|
trusted library allocation
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
548A000
|
trusted library allocation
|
page execute and read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
1046000
|
unkown
|
page execute and write copy
|
||
532D000
|
stack
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
5497000
|
trusted library allocation
|
page execute and read and write
|
||
D1D000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
FC3000
|
unkown
|
page execute and read and write
|
||
114F000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
5D28000
|
trusted library allocation
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
F55000
|
unkown
|
page execute and read and write
|
||
5685000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
unkown
|
page execute and write copy
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
5777000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
5773000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5C68000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
C91000
|
unkown
|
page execute and read and write
|
||
531D000
|
trusted library allocation
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
169E000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
D8B000
|
unkown
|
page execute and read and write
|
||
BE9000
|
unkown
|
page execute and read and write
|
||
423E000
|
stack
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
6483000
|
trusted library allocation
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
D97000
|
unkown
|
page execute and write copy
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
FD9000
|
unkown
|
page execute and write copy
|
||
168F000
|
heap
|
page read and write
|
||
5677000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
102F000
|
unkown
|
page execute and write copy
|
||
51D0000
|
direct allocation
|
page read and write
|
||
D31000
|
unkown
|
page execute and write copy
|
||
FB5000
|
unkown
|
page execute and read and write
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
784D000
|
stack
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
C6E000
|
heap
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
D09000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
5E9F000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
F18000
|
unkown
|
page execute and read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
5C65000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5022000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
5B63000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
5DB6000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
C11000
|
unkown
|
page execute and write copy
|
||
CFD000
|
unkown
|
page execute and write copy
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
5C68000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5DB4000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
575A000
|
trusted library allocation
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
4BBC000
|
stack
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
101E000
|
unkown
|
page execute and write copy
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
1038000
|
unkown
|
page execute and write copy
|
||
D19000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
C5A000
|
unkown
|
page execute and read and write
|
||
F81000
|
unkown
|
page execute and read and write
|
||
C82000
|
unkown
|
page execute and write copy
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
C37000
|
unkown
|
page execute and write copy
|
||
D07000
|
heap
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
remote allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
6474000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5778000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
remote allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
5B8B000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
unkown
|
page execute and write copy
|
||
C9A000
|
unkown
|
page execute and read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
5777000
|
trusted library allocation
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
A66000
|
unkown
|
page write copy
|
||
CF7000
|
unkown
|
page execute and write copy
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
5D21000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
1038000
|
unkown
|
page execute and write copy
|
||
CF9000
|
heap
|
page read and write
|
||
D0E000
|
unkown
|
page execute and write copy
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
5751000
|
trusted library allocation
|
page read and write
|
||
5D27000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
EFB000
|
unkown
|
page execute and read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
1024000
|
unkown
|
page execute and write copy
|
||
3F7F000
|
stack
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
16AC000
|
heap
|
page read and write
|
||
5CB000
|
stack
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
5313000
|
trusted library allocation
|
page execute and read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
F54000
|
unkown
|
page execute and write copy
|
||
51D0000
|
direct allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
A62000
|
unkown
|
page execute and read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
F57000
|
unkown
|
page execute and write copy
|
||
C81000
|
heap
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
BF4000
|
unkown
|
page execute and read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
5011000
|
trusted library allocation
|
page read and write
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
A60000
|
unkown
|
page readonly
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
A6A000
|
unkown
|
page execute and write copy
|
||
AE0000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
502B000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
5D9F000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
trusted library allocation
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
D12000
|
heap
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
579D000
|
trusted library allocation
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
6775000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
unkown
|
page execute and read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
5772000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
1359000
|
stack
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
5778000
|
trusted library allocation
|
page read and write
|
||
636C000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
C64000
|
unkown
|
page execute and read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
F22000
|
unkown
|
page execute and read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
5D11000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
51CF000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
FDA000
|
unkown
|
page execute and read and write
|
||
A60000
|
unkown
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
5C65000
|
trusted library allocation
|
page read and write
|
||
A66000
|
unkown
|
page write copy
|
||
554C000
|
stack
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
5778000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
577A000
|
trusted library allocation
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
1046000
|
unkown
|
page execute and read and write
|
||
1005000
|
unkown
|
page execute and read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
F16000
|
unkown
|
page execute and read and write
|
||
38FF000
|
stack
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
unkown
|
page execute and read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
F9A000
|
unkown
|
page execute and read and write
|
||
D14000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute and write copy
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
5D23000
|
trusted library allocation
|
page read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4B7D000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
5C6F000
|
trusted library allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
EFD000
|
unkown
|
page execute and write copy
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
BCF000
|
unkown
|
page execute and read and write
|
||
306E000
|
stack
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
4D0D000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
5C6F000
|
trusted library allocation
|
page read and write
|
||
F2D000
|
unkown
|
page execute and read and write
|
||
CF1000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
C65000
|
unkown
|
page execute and write copy
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
D8B000
|
unkown
|
page execute and write copy
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
CFD000
|
unkown
|
page execute and write copy
|
||
5740000
|
heap
|
page execute and read and write
|
||
4701000
|
heap
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
5C6F000
|
trusted library allocation
|
page read and write
|
||
5672000
|
trusted library allocation
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
1031000
|
unkown
|
page execute and write copy
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
C12000
|
unkown
|
page execute and read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
5677000
|
trusted library allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
remote allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
5697000
|
trusted library allocation
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
F2A000
|
unkown
|
page execute and read and write
|
||
5C6F000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
unkown
|
page execute and read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
D17000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
5D3D000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
4F14000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
16E1000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
30AC000
|
stack
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
C6E000
|
heap
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
D0F000
|
heap
|
page read and write
|
||
FB6000
|
unkown
|
page execute and write copy
|
||
8FA000
|
stack
|
page read and write
|
||
FBB000
|
unkown
|
page execute and write copy
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
5778000
|
trusted library allocation
|
page read and write
|
||
5EA1000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
5038000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
F21000
|
unkown
|
page execute and write copy
|
||
5017000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page execute and write copy
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5685000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
5D89000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
7C3E000
|
stack
|
page read and write
|
||
6754000
|
trusted library allocation
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
F17000
|
unkown
|
page execute and write copy
|
||
BF4000
|
unkown
|
page execute and write copy
|
||
D0C000
|
unkown
|
page execute and write copy
|
||
2BBE000
|
stack
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
443F000
|
stack
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
F95000
|
unkown
|
page execute and read and write
|
||
31FE000
|
stack
|
page read and write
|
||
568B000
|
trusted library allocation
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5B93000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5782000
|
trusted library allocation
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
BD1000
|
unkown
|
page execute and write copy
|
||
D0F000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
1047000
|
unkown
|
page execute and write copy
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
F26000
|
unkown
|
page execute and write copy
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
D0C000
|
unkown
|
page execute and read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
1030000
|
unkown
|
page execute and read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
522D000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
unkown
|
page execute and write copy
|
||
D0C000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
F2C000
|
unkown
|
page execute and write copy
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
102F000
|
unkown
|
page execute and write copy
|
||
549B000
|
trusted library allocation
|
page execute and read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page read and write
|
||
C35000
|
unkown
|
page execute and read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
A62000
|
unkown
|
page execute and write copy
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
571D000
|
trusted library allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
569E000
|
stack
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
There are 950 hidden memdumps, click here to show them.