Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\T4SWNFFH9VCKTA3D54ZZ0K.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe
|
"C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
crisiwarny.store
|
|||
https://necklacedmny.store/api
|
188.114.97.3
|
||
scriptyprefej.store
|
|||
navygenerayk.store
|
|||
thumbystriw.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://185.215.113.16/off/def.exeS
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://185.215.113.16/off/def.exeI
|
unknown
|
||
http://185.215.113.16/off/def.exeA4T:
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://necklacedmny.store/~dJ
|
unknown
|
||
https://necklacedmny.store/api-
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://185.215.113.16/off/def.exe&nT
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
http://185.215.113.16/off/def.exee
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
||
http://185.215.113.16/k
|
unknown
|
||
https://necklacedmny.store/apiE
|
unknown
|
||
https://necklacedmny.store:443/apiK
|
unknown
|
||
http://185.215.113.16/off/def.exeeXn
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://necklacedmny.store/apiA4T:
|
unknown
|
||
http://185.215.113.16:80/off/def.exeYw
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://necklacedmny.store/apiV
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://necklacedmny.store/apia
|
unknown
|
||
http://185.215.113.16/lg;
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://necklacedmny.store/apim
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://necklacedmny.store/0914k
|
unknown
|
There are 48 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
191000
|
unkown
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
543F000
|
trusted library allocation
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
560A000
|
trusted library allocation
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
664000
|
heap
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
3D4000
|
unkown
|
page execute and write copy
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page execute and read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
8EC000
|
unkown
|
page execute and read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
unkown
|
page execute and read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
5C16000
|
trusted library allocation
|
page read and write
|
||
2790000
|
direct allocation
|
page read and write
|
||
377000
|
unkown
|
page execute and read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
91F000
|
unkown
|
page execute and read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
889000
|
unkown
|
page execute and write copy
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
4D2D000
|
stack
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
48E0000
|
remote allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page execute and read and write
|
||
4ABC000
|
trusted library allocation
|
page read and write
|
||
888000
|
unkown
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
4482000
|
heap
|
page read and write
|
||
3D3000
|
unkown
|
page execute and read and write
|
||
901000
|
unkown
|
page execute and write copy
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
4AC000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
4A6B000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
430000
|
unkown
|
page execute and read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
stack
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
992000
|
unkown
|
page execute and write copy
|
||
864000
|
unkown
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
47D000
|
unkown
|
page execute and write copy
|
||
4C4C000
|
stack
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
374000
|
unkown
|
page execute and write copy
|
||
2800000
|
direct allocation
|
page read and write
|
||
27FB000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
5DB4000
|
trusted library allocation
|
page read and write
|
||
2817000
|
heap
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
4D76000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
494000
|
unkown
|
page execute and write copy
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
907000
|
unkown
|
page execute and read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
900000
|
unkown
|
page execute and read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
3E8000
|
unkown
|
page execute and read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
885000
|
unkown
|
page execute and write copy
|
||
38B000
|
unkown
|
page execute and read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
992000
|
unkown
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
C93000
|
heap
|
page read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
8C3000
|
unkown
|
page execute and read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
441000
|
unkown
|
page execute and write copy
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
4B9B000
|
trusted library allocation
|
page execute and read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page execute and read and write
|
||
887000
|
unkown
|
page execute and write copy
|
||
8E6000
|
unkown
|
page execute and read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
unkown
|
page execute and write copy
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
48E1000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5612000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
3B5000
|
unkown
|
page execute and read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
8A4000
|
unkown
|
page execute and read and write
|
||
AC5000
|
heap
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4471000
|
heap
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
remote allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
5572000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
4A1D000
|
trusted library allocation
|
page execute and read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
90F000
|
unkown
|
page execute and write copy
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
unkown
|
page execute and write copy
|
||
6E6000
|
unkown
|
page write copy
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
46C000
|
unkown
|
page execute and write copy
|
||
8CD000
|
unkown
|
page execute and read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
5459000
|
trusted library allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
493000
|
unkown
|
page execute and write copy
|
||
32EF000
|
stack
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
913000
|
unkown
|
page execute and read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
3FD000
|
unkown
|
page execute and read and write
|
||
664000
|
heap
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
3F2000
|
unkown
|
page execute and read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
93C000
|
unkown
|
page execute and write copy
|
||
3A2000
|
unkown
|
page execute and read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
47C000
|
unkown
|
page execute and read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
48E1000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
191000
|
unkown
|
page execute and write copy
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
8C2000
|
unkown
|
page execute and write copy
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
37A000
|
unkown
|
page execute and write copy
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
8AB000
|
unkown
|
page execute and write copy
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
3DF000
|
unkown
|
page execute and read and write
|
||
A26000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page execute and read and write
|
||
994000
|
unkown
|
page execute and write copy
|
||
70DF000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5B74000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
8E7000
|
unkown
|
page execute and write copy
|
||
3E2F000
|
stack
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
6F4D000
|
stack
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
389000
|
unkown
|
page execute and read and write
|
||
88C000
|
unkown
|
page execute and read and write
|
||
8A1000
|
unkown
|
page execute and write copy
|
||
445F000
|
stack
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
8C6000
|
unkown
|
page execute and read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
46E000
|
unkown
|
page execute and write copy
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
984000
|
unkown
|
page execute and write copy
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
unkown
|
page execute and write copy
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
unkown
|
page execute and write copy
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
886000
|
unkown
|
page execute and read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
3D1000
|
unkown
|
page execute and write copy
|
||
27A7000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
2790000
|
direct allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
366000
|
unkown
|
page execute and write copy
|
||
511E000
|
stack
|
page read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
59EF000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
492C000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
3E1000
|
unkown
|
page execute and write copy
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page execute and write copy
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
543F000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
AA2000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
8D8000
|
unkown
|
page execute and read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
6E6000
|
unkown
|
page write copy
|
||
4C50000
|
trusted library allocation
|
page execute and read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
1F7000
|
unkown
|
page execute and write copy
|
||
AA6000
|
heap
|
page read and write
|
||
984000
|
unkown
|
page execute and write copy
|
||
AC5000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
3EF000
|
unkown
|
page execute and write copy
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
379000
|
unkown
|
page execute and read and write
|
||
93F000
|
unkown
|
page execute and read and write
|
||
AA5000
|
heap
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page execute and write copy
|
||
AB6000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
91B000
|
unkown
|
page execute and write copy
|
||
56E3000
|
trusted library allocation
|
page read and write
|
||
37B000
|
unkown
|
page execute and read and write
|
||
5E4000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
4A6D000
|
stack
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
3F3000
|
unkown
|
page execute and write copy
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
3F6000
|
unkown
|
page execute and write copy
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
unkown
|
page execute and read and write
|
||
851000
|
unkown
|
page execute and write copy
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
8FF000
|
unkown
|
page execute and write copy
|
||
AC8000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
4D68000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
CA3000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
48E0000
|
remote allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5B27000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
4D8C000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
44D000
|
unkown
|
page execute and read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
heap
|
page execute and read and write
|
||
664000
|
heap
|
page read and write
|
||
731F000
|
stack
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
3F5000
|
unkown
|
page execute and read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
9DD000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
27AC000
|
heap
|
page read and write
|
||
34B000
|
unkown
|
page execute and read and write
|
||
27EB000
|
stack
|
page read and write
|
||
8B7000
|
unkown
|
page execute and read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page execute and write copy
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
1F6000
|
unkown
|
page execute and read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
372000
|
unkown
|
page execute and write copy
|
||
4C70000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
34D000
|
unkown
|
page execute and write copy
|
||
391F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page execute and write copy
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
38A000
|
unkown
|
page execute and write copy
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
1F5000
|
unkown
|
page execute and write copy
|
||
42E000
|
unkown
|
page execute and write copy
|
||
4DA0000
|
heap
|
page execute and read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
364000
|
unkown
|
page execute and read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
385000
|
unkown
|
page execute and write copy
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
57DE000
|
stack
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
372000
|
unkown
|
page execute and read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5A89000
|
trusted library allocation
|
page read and write
|
||
1EB000
|
unkown
|
page execute and write copy
|
||
486000
|
unkown
|
page execute and write copy
|
||
5BD5000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
unkown
|
page execute and write copy
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
52B000
|
stack
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page execute and read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
1EB000
|
unkown
|
page execute and write copy
|
||
5E4000
|
heap
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
unkown
|
page execute and write copy
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
4B8A000
|
trusted library allocation
|
page execute and read and write
|
||
A1F000
|
heap
|
page read and write
|
||
378000
|
unkown
|
page execute and write copy
|
||
3AAD000
|
stack
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
C91000
|
heap
|
page read and write
|
||
4A24000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
367000
|
unkown
|
page execute and read and write
|
||
86F000
|
unkown
|
page execute and read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5B69000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
97B000
|
unkown
|
page execute and write copy
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
48F2000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
994000
|
unkown
|
page execute and write copy
|
||
543F000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
direct allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
6E2000
|
unkown
|
page execute and write copy
|
||
84F000
|
unkown
|
page execute and read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page execute and read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
493000
|
unkown
|
page execute and read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4C6C000
|
trusted library allocation
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
52EE000
|
stack
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
486000
|
unkown
|
page execute and write copy
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
382E000
|
stack
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5BD3000
|
trusted library allocation
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
86F000
|
unkown
|
page execute and write copy
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
8C7000
|
unkown
|
page execute and write copy
|
||
A9C000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
59F1000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
2770000
|
direct allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
8D6000
|
unkown
|
page execute and write copy
|
||
3CEF000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
47C000
|
unkown
|
page execute and write copy
|
||
37EF000
|
stack
|
page read and write
|
||
291F000
|
stack
|
page read and write
|
||
4D66000
|
trusted library allocation
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
There are 999 hidden memdumps, click here to show them.