Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe
|
"C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://crisiwarny.store/apiAE
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://crisiwarny.store/api/
|
unknown
|
||
http://185.215.113.16/U
|
unknown
|
||
https://crisiwarny.store/e
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://185.215.113.16/off/def.exeR
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://crisiwarny.store/au
|
unknown
|
||
https://crisiwarny.store/Hy
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
http://185.215.113.16/off/def.exe0
|
unknown
|
||
https://crisiwarny.store/o
|
unknown
|
||
http://185.215.113.16/off/def.exe2
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://185.215.113.16/j
|
unknown
|
||
https://crisiwarny.s
|
unknown
|
||
https://crisiwarny.store/apit
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
871000
|
unkown
|
page execute and read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
56A6000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
722F000
|
stack
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
E27000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute and read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
7FB000
|
unkown
|
page execute and write copy
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
stack
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
5B3A000
|
trusted library allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
A44000
|
unkown
|
page execute and read and write
|
||
E22000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
DF2000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
568C000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
5912000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
5609000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
B4F000
|
unkown
|
page execute and write copy
|
||
E20000
|
heap
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
705000
|
unkown
|
page execute and read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
556000
|
unkown
|
page write copy
|
||
5C9D000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
A65000
|
unkown
|
page execute and write copy
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
56F3000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
unkown
|
page execute and write copy
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
D63000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
46A2000
|
heap
|
page read and write
|
||
4AF0000
|
remote allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
2A87000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
803000
|
unkown
|
page execute and write copy
|
||
4BAB000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5B1D000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
5B82000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
5B1D000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page execute and read and write
|
||
E23000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
E03000
|
heap
|
page read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
B72000
|
unkown
|
page execute and read and write
|
||
55D3000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
55F3000
|
trusted library allocation
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
5613000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
unkown
|
page execute and read and write
|
||
5C4000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
55F9000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
unkown
|
page execute and write copy
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
55EF000
|
trusted library allocation
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
71C000
|
unkown
|
page execute and write copy
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
AE7000
|
unkown
|
page execute and write copy
|
||
5B3C000
|
trusted library allocation
|
page read and write
|
||
5609000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
796000
|
unkown
|
page execute and read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
4F9B000
|
trusted library allocation
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2887000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5CC1000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
5B64000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
5D23000
|
trusted library allocation
|
page read and write
|
||
5A4A000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
5695000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
unkown
|
page execute and read and write
|
||
74FE000
|
stack
|
page read and write
|
||
5B98000
|
trusted library allocation
|
page read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
566000
|
unkown
|
page execute and write copy
|
||
5A81000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
5B3C000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
5603000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
78B000
|
unkown
|
page execute and read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
4CD3000
|
trusted library allocation
|
page execute and read and write
|
||
4B20000
|
heap
|
page read and write
|
||
6F5000
|
unkown
|
page execute and read and write
|
||
5C4000
|
heap
|
page read and write
|
||
B02000
|
unkown
|
page execute and read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page execute and write copy
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
743000
|
unkown
|
page execute and read and write
|
||
5C4000
|
heap
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5629000
|
trusted library allocation
|
page read and write
|
||
2A0C000
|
stack
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
56F3000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
73E000
|
unkown
|
page execute and write copy
|
||
3F0F000
|
stack
|
page read and write
|
||
B5D000
|
unkown
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
E2E000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5C7E000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
A98000
|
unkown
|
page execute and read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
5619000
|
trusted library allocation
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
8CB000
|
unkown
|
page execute and write copy
|
||
4E7B000
|
trusted library allocation
|
page read and write
|
||
870000
|
unkown
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
remote allocation
|
page read and write
|
||
4E20000
|
heap
|
page execute and read and write
|
||
354E000
|
stack
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
72F0000
|
heap
|
page execute and read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
5BCB000
|
trusted library allocation
|
page read and write
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
5965000
|
trusted library allocation
|
page read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page execute and write copy
|
||
E2E000
|
heap
|
page read and write
|
||
5609000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
direct allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
remote allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5B72000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
5673000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
unkown
|
page execute and write copy
|
||
4A21000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
4CD4000
|
trusted library allocation
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
803000
|
unkown
|
page execute and write copy
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
793000
|
unkown
|
page execute and write copy
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
A8C000
|
unkown
|
page execute and read and write
|
||
E23000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
812000
|
unkown
|
page execute and write copy
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
ABF000
|
unkown
|
page execute and read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
5BB7000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
5B64000
|
trusted library allocation
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
6C6000
|
unkown
|
page execute and read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
B47000
|
unkown
|
page execute and write copy
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
4B4B000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
552000
|
unkown
|
page execute and read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
7AD000
|
unkown
|
page execute and write copy
|
||
4A21000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
55A000
|
unkown
|
page execute and read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
9A9000
|
stack
|
page read and write
|
||
B72000
|
unkown
|
page execute and write copy
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
B64000
|
unkown
|
page execute and write copy
|
||
4DFD000
|
stack
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
5B69000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
direct allocation
|
page execute and read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
55F9000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
79E000
|
unkown
|
page execute and write copy
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
814000
|
unkown
|
page execute and write copy
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
ABA000
|
unkown
|
page execute and write copy
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
AD0000
|
unkown
|
page execute and read and write
|
||
552000
|
unkown
|
page execute and write copy
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
A5C000
|
unkown
|
page execute and read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
871000
|
unkown
|
page execute and write copy
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
580F000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
5603000
|
trusted library allocation
|
page read and write
|
||
4CDD000
|
trusted library allocation
|
page execute and read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
4D0B000
|
trusted library allocation
|
page execute and read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
unkown
|
page execute and read and write
|
||
314F000
|
stack
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page execute and read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
B73000
|
unkown
|
page execute and write copy
|
||
287F000
|
stack
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5A81000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
5629000
|
trusted library allocation
|
page read and write
|
||
5B3E000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
5C86000
|
trusted library allocation
|
page read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
703000
|
unkown
|
page execute and write copy
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
785000
|
unkown
|
page execute and write copy
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
2A60000
|
direct allocation
|
page read and write
|
||
772000
|
unkown
|
page execute and write copy
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
564E000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5A81000
|
trusted library allocation
|
page read and write
|
||
767000
|
unkown
|
page execute and read and write
|
||
AAD000
|
unkown
|
page execute and write copy
|
||
4A20000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
5629000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
73F000
|
unkown
|
page execute and read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
72D000
|
unkown
|
page execute and write copy
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
8D6000
|
unkown
|
page execute and read and write
|
||
304E000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
812000
|
unkown
|
page execute and read and write
|
||
B46000
|
unkown
|
page execute and read and write
|
||
55A000
|
unkown
|
page execute and write copy
|
||
C64000
|
heap
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
B5C000
|
unkown
|
page execute and write copy
|
||
C64000
|
heap
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
AC8000
|
unkown
|
page execute and read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
A34000
|
unkown
|
page execute and read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
771000
|
unkown
|
page execute and read and write
|
||
5C4000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
55FC000
|
trusted library allocation
|
page read and write
|
||
55F5000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
5B32000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
55F9000
|
trusted library allocation
|
page read and write
|
||
A36000
|
unkown
|
page execute and write copy
|
||
E12000
|
heap
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
5B5B000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
4CE4000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
5C80000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
5C9F000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
B64000
|
unkown
|
page execute and write copy
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
764000
|
unkown
|
page execute and write copy
|
||
768000
|
unkown
|
page execute and write copy
|
||
E0F000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page execute and write copy
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
8CB000
|
unkown
|
page execute and read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
58FA000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page execute and write copy
|
||
33CF000
|
stack
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page execute and read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
5C4000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
4E3D000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page read and write
|
||
8D5000
|
unkown
|
page execute and write copy
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
62E3000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
560A000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page execute and read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
814000
|
unkown
|
page execute and write copy
|
||
D10000
|
direct allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
55EF000
|
trusted library allocation
|
page read and write
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
6C9000
|
unkown
|
page execute and write copy
|
||
B49000
|
unkown
|
page execute and read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
5623000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
5B1D000
|
trusted library allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
B2C000
|
unkown
|
page execute and read and write
|
||
430E000
|
stack
|
page read and write
|
||
75C000
|
unkown
|
page execute and read and write
|
||
ACF000
|
unkown
|
page execute and write copy
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
B42000
|
unkown
|
page execute and write copy
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
DEE000
|
heap
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
440F000
|
stack
|
page read and write
|
||
55EF000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
7B2000
|
unkown
|
page execute and read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
5BA5000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page execute and read and write
|
||
732000
|
unkown
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
75A000
|
unkown
|
page execute and write copy
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
A51000
|
unkown
|
page execute and read and write
|
||
51FD000
|
stack
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
6EB000
|
unkown
|
page execute and read and write
|
||
328F000
|
stack
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
E06000
|
heap
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
56B000
|
stack
|
page read and write
|
||
6EA000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
A59000
|
unkown
|
page execute and write copy
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5B8A000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
AD9000
|
unkown
|
page execute and write copy
|
||
72C000
|
unkown
|
page execute and read and write
|
||
10FF000
|
stack
|
page read and write
|
||
556000
|
unkown
|
page write copy
|
||
E23000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
4CCC000
|
trusted library allocation
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
55F9000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
unkown
|
page execute and write copy
|
||
A8D000
|
unkown
|
page execute and write copy
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
There are 1014 hidden memdumps, click here to show them.