Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MMS43LFVAQOG1OXT3FFOALII.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe
|
"C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
crisiwarny.store
|
|||
https://necklacedmny.store/api
|
188.114.97.3
|
||
scriptyprefej.store
|
|||
navygenerayk.store
|
|||
thumbystriw.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/off/def.exeeh
|
unknown
|
||
https://necklacedmny.store/=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://necklacedmny.store/E2
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://185.215.113.16/off/def.exee
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
||
https://necklacedmny.store/X/ztlxfXsIh/
|
unknown
|
||
https://necklacedmny.store/apie6
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://necklacedmny.store/api:
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://necklacedmny.store/apin3
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://necklacedmny.stoF
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://go.mic
|
unknown
|
||
https://necklacedmny.store/apiG
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://necklacedmny.store/apib
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://necklacedmny.store/apis
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://necklacedmny.store/E
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 40 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B51000
|
unkown
|
page execute and read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
BAB000
|
unkown
|
page execute and read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
825000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
D9B000
|
unkown
|
page execute and read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
unkown
|
page execute and write copy
|
||
864000
|
heap
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
A77000
|
unkown
|
page execute and read and write
|
||
834000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
DBB000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
59FF000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
AEC000
|
unkown
|
page execute and write copy
|
||
485E000
|
stack
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
DA6000
|
unkown
|
page execute and read and write
|
||
341F000
|
stack
|
page read and write
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
unkown
|
page execute and read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
unkown
|
page execute and read and write
|
||
AA7000
|
unkown
|
page execute and write copy
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
B8A000
|
unkown
|
page execute and write copy
|
||
3E3F000
|
stack
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
B03000
|
unkown
|
page execute and read and write
|
||
4BFC000
|
stack
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
5965000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
5952000
|
trusted library allocation
|
page read and write
|
||
B66000
|
unkown
|
page execute and write copy
|
||
807000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
5984000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
BB7000
|
unkown
|
page execute and write copy
|
||
864000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
E44000
|
unkown
|
page execute and write copy
|
||
2A3F000
|
stack
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
4E3D000
|
trusted library allocation
|
page execute and read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
5983000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
723C000
|
stack
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
unkown
|
page execute and write copy
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
unkown
|
page execute and read and write
|
||
BAB000
|
unkown
|
page execute and write copy
|
||
420F000
|
stack
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
unkown
|
page execute and write copy
|
||
44A1000
|
heap
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
770E000
|
stack
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
7D3000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
B4C000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
B8A000
|
unkown
|
page execute and write copy
|
||
4490000
|
direct allocation
|
page read and write
|
||
ADD000
|
unkown
|
page execute and read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
59B9000
|
trusted library allocation
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
DCB000
|
unkown
|
page execute and write copy
|
||
309F000
|
stack
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
unkown
|
page execute and read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
A76000
|
unkown
|
page execute and write copy
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
46DF000
|
stack
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
4920000
|
remote allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
DB7000
|
unkown
|
page execute and write copy
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
5983000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
D97000
|
unkown
|
page execute and write copy
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
unkown
|
page execute and write copy
|
||
393F000
|
stack
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
59FE000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
104D000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
D28000
|
unkown
|
page execute and read and write
|
||
5A27000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
5459000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
D7D000
|
unkown
|
page execute and read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
heap
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
ADB000
|
unkown
|
page execute and write copy
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
B1B000
|
unkown
|
page execute and read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
115D000
|
heap
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
5429000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
unkown
|
page execute and read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
B88000
|
unkown
|
page execute and read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5556000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page execute and read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
596E000
|
trusted library allocation
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
4930000
|
direct allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
7B3000
|
heap
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
543F000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
B0E000
|
unkown
|
page execute and read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
unkown
|
page execute and write copy
|
||
3F8F000
|
stack
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
3AB000
|
stack
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
DED000
|
unkown
|
page execute and read and write
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
826000
|
heap
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
unkown
|
page execute and read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
4DCB000
|
trusted library allocation
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
unkown
|
page execute and write copy
|
||
74FE000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
E5B000
|
unkown
|
page execute and write copy
|
||
834000
|
heap
|
page read and write
|
||
110C000
|
stack
|
page read and write
|
||
595B000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
545E000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
B2D000
|
unkown
|
page execute and write copy
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
59F1000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute and write copy
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
unkown
|
page execute and write copy
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
59F4000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
8E6000
|
unkown
|
page write copy
|
||
AA9000
|
unkown
|
page execute and write copy
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5977000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
5986000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
747F000
|
stack
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
5A03000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
unkown
|
page execute and write copy
|
||
5953000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
4DD9000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
ABC000
|
unkown
|
page execute and read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
B51000
|
unkown
|
page execute and write copy
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
4ABD000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page execute and read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
6185000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
unkown
|
page write copy
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
B0B000
|
unkown
|
page execute and write copy
|
||
864000
|
heap
|
page read and write
|
||
B67000
|
unkown
|
page execute and read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
83F000
|
heap
|
page read and write
|
||
44B2000
|
heap
|
page read and write
|
||
4930000
|
direct allocation
|
page read and write
|
||
4CB4000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
unkown
|
page execute and write copy
|
||
2D97000
|
heap
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
59D8000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
596C000
|
trusted library allocation
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4F9A000
|
trusted library allocation
|
page execute and read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
E45000
|
unkown
|
page execute and write copy
|
||
A6E000
|
unkown
|
page execute and read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
unkown
|
page execute and write copy
|
||
E34000
|
unkown
|
page execute and write copy
|
||
4EBE000
|
stack
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
6161000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
unkown
|
page execute and write copy
|
||
35BE000
|
stack
|
page read and write
|
||
D34000
|
unkown
|
page execute and write copy
|
||
B88000
|
unkown
|
page execute and write copy
|
||
793000
|
heap
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
E18000
|
unkown
|
page execute and read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
unkown
|
page execute and read and write
|
||
F5E000
|
stack
|
page read and write
|
||
D40000
|
unkown
|
page execute and read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
unkown
|
page execute and read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
DD6000
|
unkown
|
page execute and write copy
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
DA1000
|
unkown
|
page execute and write copy
|
||
AF6000
|
unkown
|
page execute and read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
7500000
|
heap
|
page execute and read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
unkown
|
page execute and write copy
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4DC4000
|
trusted library allocation
|
page read and write
|
||
547D000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
A50000
|
unkown
|
page execute and read and write
|
||
496C000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
E44000
|
unkown
|
page execute and read and write
|
||
82E000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
5955000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
568E000
|
trusted library allocation
|
page read and write
|
||
598A000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
4920000
|
remote allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
A6D000
|
unkown
|
page execute and write copy
|
||
495F000
|
stack
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
4920000
|
remote allocation
|
page read and write
|
||
4E44000
|
trusted library allocation
|
page read and write
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
6164000
|
trusted library allocation
|
page read and write
|
||
546C000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
546C000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
B13000
|
unkown
|
page execute and write copy
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
5A05000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
5B6C000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
5A41000
|
trusted library allocation
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4FA7000
|
trusted library allocation
|
page execute and read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
AA8000
|
unkown
|
page execute and read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
unkown
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5A01000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
unkown
|
page execute and write copy
|
||
319F000
|
stack
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
D10000
|
unkown
|
page execute and write copy
|
||
D72000
|
unkown
|
page execute and write copy
|
||
AEB000
|
unkown
|
page execute and read and write
|
||
4E00000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
E37000
|
unkown
|
page execute and write copy
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
AF3000
|
unkown
|
page execute and read and write
|
||
845000
|
heap
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
D34000
|
unkown
|
page execute and read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
5978000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
3E40000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
A52000
|
unkown
|
page execute and write copy
|
||
4FFD000
|
stack
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
59FF000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
4E34000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
A6C000
|
unkown
|
page execute and read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
4E33000
|
trusted library allocation
|
page execute and read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
unkown
|
page execute and write copy
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
59EF000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
AB5000
|
unkown
|
page execute and write copy
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
DCA000
|
unkown
|
page execute and read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
808000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
B0F000
|
unkown
|
page execute and write copy
|
||
DCE000
|
unkown
|
page execute and read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
E5A000
|
unkown
|
page execute and write copy
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
834000
|
heap
|
page read and write
|
||
4C3D000
|
stack
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
DD8000
|
unkown
|
page execute and read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
DB5000
|
unkown
|
page execute and write copy
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
trusted library allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
58C1000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
59F6000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
B72000
|
unkown
|
page execute and write copy
|
||
4E8C000
|
stack
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
4930000
|
direct allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
55BD000
|
trusted library allocation
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
AAF000
|
unkown
|
page execute and read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
There are 966 hidden memdumps, click here to show them.