Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe
|
"C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.96.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://necklacedmny.store/x
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://185.215.113.16/off/def.exeX
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://necklacedmny.store:443/apix
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://necklacedmny.store/r
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://necklacedmny.store/X
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://necklacedmny.store/apiG4
|
unknown
|
||
http://185.215.113.16/fg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://necklacedmny.store/apiI4
|
unknown
|
||
http://185.215.113.16/Pg
|
unknown
|
||
http://185.215.113.16//
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://necklacedmny.store/R
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
http://185.215.113.16/off/def.exee
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
||
http://185.215.113.16/off/def.exeik1
|
unknown
|
There are 37 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.96.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D1000
|
unkown
|
page execute and read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
53C000
|
unkown
|
page execute and read and write
|
||
C11000
|
heap
|
page read and write
|
||
12DB000
|
stack
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
unkown
|
page execute and write copy
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
96A000
|
stack
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
F55000
|
unkown
|
page execute and read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
unkown
|
page execute and read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
4F5000
|
unkown
|
page execute and read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
5A52000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
520000
|
unkown
|
page execute and read and write
|
||
C19000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
335000
|
unkown
|
page execute and write copy
|
||
B77000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
4BAD000
|
stack
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
48A000
|
unkown
|
page execute and read and write
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
F19000
|
unkown
|
page execute and read and write
|
||
167E000
|
stack
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
336000
|
unkown
|
page execute and read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
565000
|
unkown
|
page execute and read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4FAD000
|
stack
|
page read and write
|
||
518000
|
unkown
|
page execute and write copy
|
||
48D0000
|
remote allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
trusted library allocation
|
page read and write
|
||
7580000
|
heap
|
page execute and read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5607000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
279C000
|
stack
|
page read and write
|
||
5AC000
|
unkown
|
page execute and write copy
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
59A2000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
5A89000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
F5D000
|
unkown
|
page execute and read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
750D000
|
stack
|
page read and write
|
||
F18000
|
unkown
|
page execute and write copy
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
59A2000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
780E000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
5177000
|
trusted library allocation
|
page execute and read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
4D71000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
337000
|
unkown
|
page execute and write copy
|
||
13C8000
|
heap
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
unkown
|
page execute and write copy
|
||
F09000
|
unkown
|
page execute and read and write
|
||
584000
|
unkown
|
page execute and read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
4C6000
|
unkown
|
page execute and write copy
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
48C000
|
unkown
|
page execute and write copy
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
D46000
|
unkown
|
page execute and write copy
|
||
9B4000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
unkown
|
page execute and write copy
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
5D3000
|
unkown
|
page execute and write copy
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
D3F000
|
stack
|
page read and write
|
||
51B000
|
unkown
|
page execute and read and write
|
||
526000
|
unkown
|
page execute and read and write
|
||
52F000
|
unkown
|
page execute and write copy
|
||
9B0000
|
heap
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
6355000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
F82000
|
unkown
|
page execute and read and write
|
||
511E000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5619000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
D36000
|
unkown
|
page write copy
|
||
3D8F000
|
stack
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
F67000
|
unkown
|
page execute and read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
58F000
|
unkown
|
page execute and read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
13E2000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
D3A000
|
unkown
|
page execute and read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
4E3000
|
unkown
|
page execute and write copy
|
||
FE0000
|
unkown
|
page execute and write copy
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
138A000
|
heap
|
page read and write
|
||
F31000
|
unkown
|
page execute and read and write
|
||
39CF000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
unkown
|
page execute and write copy
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
54D000
|
unkown
|
page execute and write copy
|
||
C31000
|
heap
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
280D000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page execute and write copy
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
512000
|
unkown
|
page execute and read and write
|
||
1294000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5A46000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
remote allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
567000
|
unkown
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
FD3000
|
unkown
|
page execute and write copy
|
||
2F0F000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
C07000
|
heap
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
FCB000
|
unkown
|
page execute and write copy
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page execute and read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and write copy
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
F64000
|
unkown
|
page execute and write copy
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
5A49000
|
trusted library allocation
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page execute and write copy
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
563000
|
unkown
|
page execute and write copy
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and write copy
|
||
13D0000
|
heap
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
48D0000
|
remote allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5619000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
F46000
|
unkown
|
page execute and write copy
|
||
1414000
|
heap
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
unkown
|
page execute and read and write
|
||
5320000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
86B000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
5033000
|
trusted library allocation
|
page execute and read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
32B000
|
unkown
|
page execute and write copy
|
||
1294000
|
heap
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
52ED000
|
stack
|
page read and write
|
||
32B000
|
unkown
|
page execute and read and write
|
||
FE0000
|
unkown
|
page execute and read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
5423000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
4AB7000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
F56000
|
unkown
|
page execute and write copy
|
||
5F09000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
59AF000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
5BC000
|
unkown
|
page execute and read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
4C66000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
53B000
|
unkown
|
page execute and write copy
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
unkown
|
page execute and write copy
|
||
4A4E000
|
stack
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
F32000
|
unkown
|
page execute and write copy
|
||
515E000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page execute and read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5423000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
F36000
|
unkown
|
page execute and read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
503D000
|
trusted library allocation
|
page execute and read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
517B000
|
trusted library allocation
|
page execute and read and write
|
||
C21000
|
heap
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
5629000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
EC3000
|
unkown
|
page execute and read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
6334000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
EF6000
|
unkown
|
page execute and write copy
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
265E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
ECD000
|
unkown
|
page execute and write copy
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
4BED000
|
stack
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
491C000
|
stack
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
ECF000
|
unkown
|
page execute and read and write
|
||
740C000
|
stack
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
4D65000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
EC3000
|
unkown
|
page execute and write copy
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
560D000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
516A000
|
trusted library allocation
|
page execute and read and write
|
||
C19000
|
heap
|
page read and write
|
||
5BD000
|
unkown
|
page execute and write copy
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
EB7000
|
unkown
|
page execute and read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
D32000
|
unkown
|
page execute and write copy
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
D32000
|
unkown
|
page execute and read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
D36000
|
unkown
|
page write copy
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4D78000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
F1E000
|
unkown
|
page execute and read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
F3F000
|
unkown
|
page execute and read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and write copy
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
F8D000
|
unkown
|
page execute and write copy
|
||
31CE000
|
stack
|
page read and write
|
||
10E9000
|
stack
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
5C3000
|
unkown
|
page execute and write copy
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
546C000
|
trusted library allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
F48000
|
unkown
|
page execute and read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
51C000
|
unkown
|
page execute and write copy
|
||
C1A000
|
heap
|
page read and write
|
||
5423000
|
trusted library allocation
|
page read and write
|
||
59A2000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
EA8000
|
unkown
|
page execute and write copy
|
||
350F000
|
stack
|
page read and write
|
||
5837000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
54E000
|
unkown
|
page execute and read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute and write copy
|
||
27F0000
|
direct allocation
|
page read and write
|
||
545E000
|
trusted library allocation
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
534000
|
unkown
|
page execute and read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
6224000
|
trusted library allocation
|
page read and write
|
||
5D2000
|
unkown
|
page execute and read and write
|
||
4451000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and write copy
|
||
4451000
|
heap
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
unkown
|
page execute and read and write
|
||
F1A000
|
unkown
|
page execute and write copy
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
FD3000
|
unkown
|
page execute and write copy
|
||
C2A000
|
heap
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
unkown
|
page execute and write copy
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page execute and read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
561F000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
F68000
|
unkown
|
page execute and write copy
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
562F000
|
trusted library allocation
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
F70000
|
unkown
|
page execute and read and write
|
||
51DE000
|
stack
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
5423000
|
trusted library allocation
|
page read and write
|
||
4C7000
|
unkown
|
page execute and read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
B9F000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
F53000
|
unkown
|
page execute and write copy
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
59A2000
|
trusted library allocation
|
page read and write
|
||
F80000
|
unkown
|
page execute and write copy
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5034000
|
trusted library allocation
|
page read and write
|
||
5D2000
|
unkown
|
page execute and write copy
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
596F000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
521000
|
unkown
|
page execute and write copy
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5B6F000
|
trusted library allocation
|
page read and write
|
||
583000
|
unkown
|
page execute and write copy
|
||
390F000
|
stack
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
unkown
|
page execute and read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
501B000
|
stack
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
unkown
|
page execute and write copy
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
589E000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
F3D000
|
unkown
|
page execute and write copy
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
5607000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
There are 934 hidden memdumps, click here to show them.