Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JJZGOUTRQA0HU75NUH14KKL5I2.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe
|
"C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
crisiwarny.store
|
|||
https://necklacedmny.store/api
|
188.114.96.3
|
||
scriptyprefej.store
|
|||
navygenerayk.store
|
|||
thumbystriw.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://185.215.113.16/off/def.exee~
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://185.215.113.16/off/def.exeL
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://185.215.113.16/Q
|
unknown
|
||
http://185.215.113.16/off/def.exex
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://necklacedmny.store/apitey.
|
unknown
|
||
http://185.215.113.16/off/def.exeh
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
||
https://necklacedmny.store/44
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://necklacedmny.store/~
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://necklacedmny.store/apiL
|
unknown
|
||
https://necklacedmny.store/n
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://necklacedmny.store/apib
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exey.
|
unknown
|
||
https://necklacedmny.store/F
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://necklacedmny.store/N
|
unknown
|
There are 40 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.96.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
81000
|
unkown
|
page execute and read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
108C000
|
unkown
|
page execute and read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
2F5000
|
unkown
|
page execute and read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
553F000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
unkown
|
page execute and write copy
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
4AAB000
|
stack
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1001000
|
unkown
|
page execute and read and write
|
||
36BF000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2D8000
|
unkown
|
page execute and write copy
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
E5000
|
unkown
|
page execute and write copy
|
||
277000
|
unkown
|
page execute and read and write
|
||
3267000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
1742000
|
heap
|
page read and write
|
||
271000
|
unkown
|
page execute and write copy
|
||
27E0000
|
direct allocation
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
E6A000
|
unkown
|
page execute and read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
55EA000
|
trusted library allocation
|
page execute and read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
C53000
|
heap
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
67F1000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
5B1D000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
25C000
|
unkown
|
page execute and write copy
|
||
40FE000
|
stack
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
111C000
|
unkown
|
page execute and write copy
|
||
56AE000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
100B000
|
unkown
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
2BD000
|
unkown
|
page execute and read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
555C000
|
trusted library allocation
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
1092000
|
unkown
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
557C000
|
trusted library allocation
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
23C000
|
unkown
|
page execute and write copy
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
261000
|
unkown
|
page execute and write copy
|
||
C7E000
|
heap
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
11AC000
|
stack
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1048000
|
unkown
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5A8E000
|
trusted library allocation
|
page read and write
|
||
C71000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
E66000
|
unkown
|
page write copy
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
E76000
|
unkown
|
page execute and write copy
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
5567000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
293B000
|
stack
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
FF3000
|
unkown
|
page execute and read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
553F000
|
trusted library allocation
|
page read and write
|
||
79CD000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
2B9000
|
unkown
|
page execute and write copy
|
||
173E000
|
heap
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page execute and read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5B8A000
|
trusted library allocation
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
4EE4000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
110B000
|
unkown
|
page execute and write copy
|
||
321C000
|
stack
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
555C000
|
trusted library allocation
|
page read and write
|
||
5321000
|
heap
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
1103000
|
unkown
|
page execute and write copy
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
302000
|
unkown
|
page execute and write copy
|
||
3F7F000
|
stack
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
1014000
|
unkown
|
page execute and read and write
|
||
C7D000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
268000
|
unkown
|
page execute and read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
175C000
|
heap
|
page read and write
|
||
2A0000
|
unkown
|
page execute and read and write
|
||
5567000
|
trusted library allocation
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
E7000
|
unkown
|
page execute and write copy
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
5A9E000
|
trusted library allocation
|
page read and write
|
||
108B000
|
unkown
|
page execute and write copy
|
||
C58000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
511D000
|
stack
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
111C000
|
unkown
|
page execute and write copy
|
||
296000
|
unkown
|
page execute and write copy
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page execute and read and write
|
||
35D000
|
unkown
|
page execute and write copy
|
||
373000
|
unkown
|
page execute and write copy
|
||
5F44000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
55E3000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
446F000
|
stack
|
page read and write
|
||
25C000
|
unkown
|
page execute and write copy
|
||
554C000
|
trusted library allocation
|
page read and write
|
||
2BE000
|
unkown
|
page execute and write copy
|
||
5310000
|
direct allocation
|
page read and write
|
||
1008000
|
unkown
|
page execute and write copy
|
||
106E000
|
unkown
|
page execute and write copy
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page execute and read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
1079000
|
unkown
|
page execute and write copy
|
||
170E000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
1070000
|
unkown
|
page execute and read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
5558000
|
trusted library allocation
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
364000
|
unkown
|
page execute and write copy
|
||
6815000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
5B69000
|
trusted library allocation
|
page read and write
|
||
1077000
|
unkown
|
page execute and write copy
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
1078000
|
unkown
|
page execute and read and write
|
||
35BE000
|
stack
|
page read and write
|
||
2C6000
|
unkown
|
page execute and read and write
|
||
BCE000
|
heap
|
page read and write
|
||
373000
|
unkown
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
10AD000
|
unkown
|
page execute and read and write
|
||
346F000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
2D6000
|
unkown
|
page execute and write copy
|
||
557C000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
unkown
|
page execute and read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
stack
|
page read and write
|
||
55E4000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
34D000
|
unkown
|
page execute and write copy
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
4A5D000
|
stack
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
554F000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
2D7000
|
unkown
|
page execute and read and write
|
||
55DC000
|
trusted library allocation
|
page read and write
|
||
5569000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
287000
|
unkown
|
page execute and write copy
|
||
14F9000
|
stack
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5321000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
55C2000
|
trusted library allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
E62000
|
unkown
|
page execute and write copy
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
10AA000
|
unkown
|
page execute and write copy
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
55B1000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
1747000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
4EE7000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
5567000
|
trusted library allocation
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
2EA000
|
unkown
|
page execute and write copy
|
||
5321000
|
heap
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5572000
|
trusted library allocation
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
107F000
|
unkown
|
page execute and write copy
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
111A000
|
unkown
|
page execute and read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
4F09000
|
trusted library allocation
|
page read and write
|
||
5C9F000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page execute and read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
E62000
|
unkown
|
page execute and read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
E66000
|
unkown
|
page write copy
|
||
32E000
|
unkown
|
page execute and read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
2E2000
|
unkown
|
page execute and read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
2DB000
|
unkown
|
page execute and read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
103B000
|
unkown
|
page execute and write copy
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5593000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
5574000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
E60000
|
unkown
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
55DA000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
288000
|
unkown
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
5B7D000
|
trusted library allocation
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5564000
|
trusted library allocation
|
page read and write
|
||
267000
|
unkown
|
page execute and write copy
|
||
5B7B000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
2ED000
|
unkown
|
page execute and write copy
|
||
50D0000
|
remote allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
251000
|
unkown
|
page execute and read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
557C000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
555E000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
C49000
|
heap
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
19FF000
|
stack
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
560B000
|
trusted library allocation
|
page execute and read and write
|
||
2B4000
|
unkown
|
page execute and read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
28E000
|
unkown
|
page execute and read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
35F000
|
unkown
|
page execute and write copy
|
||
35D000
|
unkown
|
page execute and write copy
|
||
C7E000
|
heap
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
1000000
|
unkown
|
page execute and write copy
|
||
67F4000
|
trusted library allocation
|
page read and write
|
||
2DC000
|
unkown
|
page execute and write copy
|
||
45E1000
|
heap
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
374000
|
unkown
|
page execute and write copy
|
||
C7E000
|
heap
|
page read and write
|
||
50D0000
|
remote allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
108D000
|
unkown
|
page execute and write copy
|
||
C53000
|
heap
|
page read and write
|
||
81000
|
unkown
|
page execute and write copy
|
||
25D000
|
unkown
|
page execute and read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
C62000
|
heap
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
27FD000
|
heap
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
5321000
|
heap
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
2B8000
|
unkown
|
page execute and read and write
|
||
383E000
|
stack
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4EFB000
|
trusted library allocation
|
page read and write
|
||
78CC000
|
stack
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
DB000
|
unkown
|
page execute and write copy
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
10BE000
|
unkown
|
page execute and write copy
|
||
2DFF000
|
stack
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
555B000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
E6000
|
unkown
|
page execute and read and write
|
||
1083000
|
unkown
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
265000
|
unkown
|
page execute and read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
170A000
|
heap
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
5470000
|
direct allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
28D000
|
unkown
|
page execute and write copy
|
||
53A0000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
5571000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5C1F000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5569000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
107E000
|
unkown
|
page execute and read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
5B26000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
1751000
|
heap
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
C71000
|
heap
|
page read and write
|
||
110B000
|
unkown
|
page execute and write copy
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
5607000
|
trusted library allocation
|
page execute and read and write
|
||
556D000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
C62000
|
heap
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
unkown
|
page execute and read and write
|
||
27CE000
|
stack
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
5470000
|
direct allocation
|
page read and write
|
||
553F000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
DB000
|
unkown
|
page execute and read and write
|
||
C55000
|
heap
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
2B3000
|
unkown
|
page execute and write copy
|
||
45E1000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
unkown
|
page execute and read and write
|
||
5660000
|
heap
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
35E000
|
unkown
|
page execute and read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
101A000
|
unkown
|
page execute and read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
23A000
|
unkown
|
page execute and read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
303000
|
unkown
|
page execute and read and write
|
||
393F000
|
stack
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
59D8000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
E6A000
|
unkown
|
page execute and write copy
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
109B000
|
unkown
|
page execute and write copy
|
||
7DAE000
|
stack
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
178F000
|
heap
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
556C000
|
trusted library allocation
|
page read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
1013000
|
unkown
|
page execute and write copy
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
45E1000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
103E000
|
unkown
|
page execute and read and write
|
||
556D000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
C48000
|
heap
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
remote allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
2B5000
|
unkown
|
page execute and write copy
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
C6B000
|
heap
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
557C000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
B8A000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
5321000
|
heap
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
350000
|
unkown
|
page execute and write copy
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
3BFD000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page execute and read and write
|
||
FCE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
555A000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
1017000
|
unkown
|
page execute and write copy
|
||
36AF000
|
stack
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
DB000
|
unkown
|
page execute and write copy
|
||
C6C000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page execute and write copy
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
103F000
|
unkown
|
page execute and write copy
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
5B31000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
364000
|
unkown
|
page execute and write copy
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
There are 912 hidden memdumps, click here to show them.