Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\V6JTG9Z5Z4ZAMITLFW.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe
|
"C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/9
|
unknown
|
||
https://necklacedmny.store:443/apiicrosoft
|
unknown
|
||
presticitpo.store
|
|||
https://necklacedmny.store/1
|
unknown
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
founpiuer.store
|
|||
https://necklacedmny.store:443/api
|
unknown
|
||
crisiwarny.store
|
|||
https://necklacedmny.store/api
|
188.114.97.3
|
||
scriptyprefej.store
|
|||
https://necklacedmny.store/o
|
unknown
|
||
https://necklacedmny.store/l
|
unknown
|
||
https://necklacedmny.store/apie
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
navygenerayk.store
|
|||
https://necklacedmny.store/I
|
unknown
|
||
thumbystriw.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://185.215.113.16/R
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://185.215.113.16/off/def.exeH
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exePPGm
|
unknown
|
||
http://185.215.113.16/off/def.exes
|
unknown
|
||
http://185.215.113.16/off/def.exeRqmZ5
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe$
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
http://185.215.113.16/9
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D21000
|
unkown
|
page execute and read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
B38000
|
unkown
|
page execute and write copy
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
637B000
|
trusted library allocation
|
page read and write
|
||
168F000
|
heap
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page execute and read and write
|
||
1685000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
B29000
|
unkown
|
page execute and write copy
|
||
319E000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
63EA000
|
trusted library allocation
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
B65000
|
unkown
|
page execute and read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
935000
|
unkown
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
6B27000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
F14000
|
unkown
|
page execute and read and write
|
||
3B4000
|
heap
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
63B9000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
6384000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
F79000
|
unkown
|
page execute and write copy
|
||
63F3000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
61C1000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
unkown
|
page execute and read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
637D000
|
trusted library allocation
|
page read and write
|
||
1692000
|
heap
|
page read and write
|
||
1013000
|
unkown
|
page execute and write copy
|
||
3A5E000
|
stack
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
unkown
|
page execute and read and write
|
||
644E000
|
trusted library allocation
|
page read and write
|
||
B50000
|
unkown
|
page execute and read and write
|
||
F86000
|
unkown
|
page execute and read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
1688000
|
heap
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
641E000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
101D000
|
unkown
|
page execute and write copy
|
||
EDC000
|
unkown
|
page execute and write copy
|
||
4770000
|
direct allocation
|
page read and write
|
||
F9B000
|
unkown
|
page execute and write copy
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
F6F000
|
unkown
|
page execute and read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
63BC000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
926000
|
unkown
|
page write copy
|
||
6E3E000
|
stack
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
unkown
|
page execute and read and write
|
||
63AC000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
934000
|
unkown
|
page execute and write copy
|
||
4A0F000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
6408000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
16A3000
|
heap
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page execute and read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
6353000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
63D2000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
trusted library allocation
|
page read and write
|
||
F9F000
|
unkown
|
page execute and write copy
|
||
3B4000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
FA8000
|
unkown
|
page execute and read and write
|
||
6391000
|
trusted library allocation
|
page read and write
|
||
101D000
|
unkown
|
page execute and write copy
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
563D000
|
stack
|
page read and write
|
||
6395000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
936000
|
unkown
|
page execute and write copy
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
unkown
|
page execute and read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
B03000
|
unkown
|
page execute and read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
922000
|
unkown
|
page execute and read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
6355000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
661C000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
63D2000
|
trusted library allocation
|
page read and write
|
||
573D000
|
stack
|
page read and write
|
||
48B4000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
unkown
|
page execute and read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
EFF000
|
unkown
|
page execute and read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
5ECB000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
48BD000
|
trusted library allocation
|
page execute and read and write
|
||
5EC2000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
64A1000
|
trusted library allocation
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
640F000
|
trusted library allocation
|
page read and write
|
||
A99000
|
unkown
|
page execute and read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
639B000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
BC3000
|
unkown
|
page execute and read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
6367000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
F1D000
|
unkown
|
page execute and write copy
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
16AA000
|
heap
|
page read and write
|
||
B3D000
|
unkown
|
page execute and read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
6526000
|
trusted library allocation
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
644D000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
5EDC000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
unkown
|
page execute and write copy
|
||
1684000
|
heap
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5F3F000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page execute and write copy
|
||
F66000
|
unkown
|
page execute and write copy
|
||
1454000
|
heap
|
page read and write
|
||
30ED000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
63D4000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
6362000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
unkown
|
page execute and read and write
|
||
EF8000
|
unkown
|
page execute and write copy
|
||
2700000
|
direct allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5F4B000
|
trusted library allocation
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
48C4000
|
trusted library allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
71FF000
|
stack
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
64F5000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
FA2000
|
unkown
|
page execute and write copy
|
||
486F000
|
stack
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5EEB000
|
trusted library allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
B7C000
|
unkown
|
page execute and write copy
|
||
5F63000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
4A2A000
|
trusted library allocation
|
page execute and read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
ED9000
|
unkown
|
page execute and read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
BDA000
|
unkown
|
page execute and read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
1004000
|
unkown
|
page execute and write copy
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
63B2000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
643E000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
30E7000
|
heap
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
638F000
|
trusted library allocation
|
page read and write
|
||
D87000
|
unkown
|
page execute and write copy
|
||
1014000
|
unkown
|
page execute and read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
6357000
|
trusted library allocation
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
922000
|
unkown
|
page execute and write copy
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
920000
|
unkown
|
page readonly
|
||
6372000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
167C000
|
heap
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
unkown
|
page execute and read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
63C7000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
637D000
|
trusted library allocation
|
page read and write
|
||
5320000
|
remote allocation
|
page read and write
|
||
ADA000
|
unkown
|
page execute and write copy
|
||
1686000
|
heap
|
page read and write
|
||
267B000
|
stack
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5320000
|
remote allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
638B000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
unkown
|
page execute and write copy
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
6411000
|
trusted library allocation
|
page read and write
|
||
1681000
|
heap
|
page read and write
|
||
B1E000
|
unkown
|
page execute and write copy
|
||
6457000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
BCC000
|
unkown
|
page execute and write copy
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
63AE000
|
trusted library allocation
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
B13000
|
unkown
|
page execute and write copy
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
640A000
|
trusted library allocation
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
640A000
|
trusted library allocation
|
page read and write
|
||
6382000
|
trusted library allocation
|
page read and write
|
||
ADB000
|
unkown
|
page execute and read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
64EB000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
6528000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
unkown
|
page execute and read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
F0B000
|
unkown
|
page execute and write copy
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
B6F000
|
unkown
|
page execute and read and write
|
||
16A2000
|
heap
|
page read and write
|
||
F7C000
|
unkown
|
page execute and read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
F13000
|
unkown
|
page execute and write copy
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
heap
|
page execute and read and write
|
||
15EF000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
unkown
|
page execute and read and write
|
||
BCC000
|
unkown
|
page execute and write copy
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
635B000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
636C000
|
trusted library allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
B6D000
|
unkown
|
page execute and write copy
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
6393000
|
trusted library allocation
|
page read and write
|
||
64C2000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page execute and read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
6364000
|
trusted library allocation
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
63AE000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
63CD000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
16AC000
|
heap
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
63E2000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
63B7000
|
trusted library allocation
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
6384000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
unkown
|
page execute and read and write
|
||
36EF000
|
stack
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
B34000
|
unkown
|
page execute and write copy
|
||
1007000
|
unkown
|
page execute and write copy
|
||
536B000
|
stack
|
page read and write
|
||
653A000
|
trusted library allocation
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
F48000
|
unkown
|
page execute and read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
167D000
|
heap
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
16A2000
|
heap
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
EFF000
|
unkown
|
page execute and write copy
|
||
15FA000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
5320000
|
remote allocation
|
page read and write
|
||
490B000
|
stack
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
322C000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
167C000
|
heap
|
page read and write
|
||
64ED000
|
trusted library allocation
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
unkown
|
page execute and read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
1015000
|
unkown
|
page execute and write copy
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
102B000
|
unkown
|
page execute and write copy
|
||
636E000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
6353000
|
trusted library allocation
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
B4A000
|
unkown
|
page execute and write copy
|
||
5E8F000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
6478000
|
trusted library allocation
|
page read and write
|
||
63EB000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
FC9000
|
unkown
|
page execute and write copy
|
||
F70000
|
unkown
|
page execute and write copy
|
||
472F000
|
stack
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5C6F000
|
stack
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
FFE000
|
unkown
|
page execute and write copy
|
||
6420000
|
trusted library allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
63CF000
|
trusted library allocation
|
page read and write
|
||
63ED000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
639D000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
655C000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
63A4000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
647A000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
92A000
|
unkown
|
page execute and read and write
|
||
638D000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
1681000
|
heap
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
B15000
|
unkown
|
page execute and read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute and write copy
|
||
1685000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
unkown
|
page execute and write copy
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
291F000
|
stack
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
B7E000
|
unkown
|
page execute and read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
F84000
|
unkown
|
page execute and write copy
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
64A3000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5FCB000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
unkown
|
page execute and read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
F68000
|
unkown
|
page execute and write copy
|
||
3EAE000
|
stack
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
4BEC000
|
stack
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
926000
|
unkown
|
page write copy
|
||
45EE000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
heap
|
page read and write
|
||
FBC000
|
unkown
|
page execute and read and write
|
||
48B3000
|
trusted library allocation
|
page execute and read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
640B000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
F8A000
|
unkown
|
page execute and read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5F41000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
64FE000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
1682000
|
heap
|
page read and write
|
||
63C8000
|
trusted library allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
ABF000
|
unkown
|
page execute and write copy
|
||
B5B000
|
unkown
|
page execute and write copy
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
unkown
|
page execute and write copy
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
6382000
|
trusted library allocation
|
page read and write
|
||
1013000
|
unkown
|
page execute and write copy
|
||
D7B000
|
unkown
|
page execute and read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
64F7000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
unkown
|
page execute and write copy
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5EAA000
|
trusted library allocation
|
page read and write
|
||
55FD000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
63EF000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
unkown
|
page execute and read and write
|
||
DA8000
|
heap
|
page read and write
|
||
BDA000
|
unkown
|
page execute and write copy
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
5F4A000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
5E56000
|
trusted library allocation
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
F5D000
|
unkown
|
page execute and write copy
|
||
44AF000
|
stack
|
page read and write
|
||
10BB000
|
stack
|
page read and write
|
||
6365000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
BC2000
|
unkown
|
page execute and write copy
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
6DFD000
|
stack
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
4A3B000
|
trusted library allocation
|
page execute and read and write
|
||
B37000
|
unkown
|
page execute and read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
15F3000
|
heap
|
page read and write
|
||
F0C000
|
unkown
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
63A6000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
F87000
|
unkown
|
page execute and write copy
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
15BA000
|
heap
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
11BA000
|
stack
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
6359000
|
trusted library allocation
|
page read and write
|
||
6409000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
16AB000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
63EC000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
92A000
|
unkown
|
page execute and write copy
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
63C4000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
636E000
|
trusted library allocation
|
page read and write
|
||
102C000
|
unkown
|
page execute and write copy
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
unkown
|
page execute and read and write
|
||
102B000
|
unkown
|
page execute and read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
63BA000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
5EE9000
|
trusted library allocation
|
page read and write
|
||
5E5A000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1692000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
63A3000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
6459000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
63C6000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
315F000
|
stack
|
page read and write
|
||
167C000
|
heap
|
page read and write
|
||
BDC000
|
unkown
|
page execute and write copy
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
unkown
|
page execute and write copy
|
||
6FFE000
|
stack
|
page read and write
|
||
16AC000
|
heap
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
640C000
|
trusted library allocation
|
page read and write
|
||
5EAD000
|
trusted library allocation
|
page read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
F78000
|
unkown
|
page execute and read and write
|
||
58BE000
|
stack
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
5EF6000
|
trusted library allocation
|
page read and write
|
||
6569000
|
trusted library allocation
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
5C85000
|
trusted library allocation
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
1681000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
F07000
|
unkown
|
page execute and write copy
|
||
70FF000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
4A37000
|
trusted library allocation
|
page execute and read and write
|
||
1692000
|
heap
|
page read and write
|
||
F67000
|
unkown
|
page execute and read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
unkown
|
page execute and write copy
|
||
15B0000
|
heap
|
page read and write
|
||
63DB000
|
trusted library allocation
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
38DF000
|
stack
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
61A7000
|
trusted library allocation
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
unkown
|
page execute and read and write
|
||
F92000
|
unkown
|
page execute and write copy
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
16AB000
|
heap
|
page read and write
|
||
BDC000
|
unkown
|
page execute and write copy
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
6171000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
61F9000
|
trusted library allocation
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
A9C000
|
unkown
|
page execute and write copy
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
unkown
|
page execute and read and write
|
||
168E000
|
heap
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
6538000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
6374000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
635B000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
There are 969 hidden memdumps, click here to show them.