Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\0L9V49BGE9BOE4IYXIIV26RZIS7RT6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UK2346Q4E08RPNV0H.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe
|
"C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.97.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://necklacedmny.store:443/apiK
|
unknown
|
||
http://185.215.113.16/off/def.exeIN
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://necklacedmny.store/r_
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://necklacedmny.store/apiV
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://185.215.113.16:80/off/def.exet7
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://necklacedmny.store/:_
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://necklacedmny.store/apiH
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://necklacedmny.store/apif
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
There are 37 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6164000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
630D000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
CBA000
|
unkown
|
page execute and read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
E59000
|
unkown
|
page execute and read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
61BA000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
616A000
|
trusted library allocation
|
page read and write
|
||
5CB8000
|
trusted library allocation
|
page read and write
|
||
61BB000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6146000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
E56000
|
unkown
|
page execute and write copy
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5C24000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
5BB7000
|
trusted library allocation
|
page read and write
|
||
60F4000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
E93000
|
unkown
|
page execute and write copy
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
6103000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
30E000
|
unkown
|
page execute and write copy
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
F12000
|
unkown
|
page execute and write copy
|
||
60F2000
|
trusted library allocation
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
61A4000
|
trusted library allocation
|
page read and write
|
||
6CEC000
|
stack
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
41E000
|
unkown
|
page execute and write copy
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
60F2000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
unkown
|
page write copy
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
E45000
|
unkown
|
page execute and write copy
|
||
14E8000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
ED8000
|
unkown
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
61BD000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
61A2000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
unkown
|
page execute and read and write
|
||
488D000
|
trusted library allocation
|
page execute and read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
610B000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
66C1000
|
trusted library allocation
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page execute and write copy
|
||
CB2000
|
unkown
|
page execute and read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
18B000
|
unkown
|
page execute and write copy
|
||
6323000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
610A000
|
trusted library allocation
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5568000
|
trusted library allocation
|
page read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
61FB000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
6161000
|
trusted library allocation
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page execute and write copy
|
||
52AB000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
6109000
|
trusted library allocation
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
5CB2000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
direct allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
632F000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
unkown
|
page execute and write copy
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
CC6000
|
unkown
|
page execute and write copy
|
||
130000
|
unkown
|
page readonly
|
||
6145000
|
trusted library allocation
|
page read and write
|
||
61AC000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
60FC000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
14E3000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
14E3000
|
heap
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
6123000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
F42000
|
unkown
|
page execute and write copy
|
||
14D9000
|
heap
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
2690000
|
direct allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
5C1C000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
unkown
|
page execute and write copy
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
614D000
|
trusted library allocation
|
page read and write
|
||
5BCB000
|
trusted library allocation
|
page read and write
|
||
5CB0000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
6125000
|
trusted library allocation
|
page read and write
|
||
E4C000
|
unkown
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
6306000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
6147000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
CB2000
|
unkown
|
page execute and write copy
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page execute and write copy
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
F56000
|
unkown
|
page execute and write copy
|
||
48A0000
|
direct allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
E5D000
|
unkown
|
page execute and read and write
|
||
F15000
|
unkown
|
page execute and read and write
|
||
1459000
|
heap
|
page read and write
|
||
E43000
|
unkown
|
page execute and read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
4907000
|
trusted library allocation
|
page execute and read and write
|
||
60F4000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
61BF000
|
trusted library allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
F66000
|
unkown
|
page execute and read and write
|
||
884000
|
heap
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
14F1000
|
heap
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
189000
|
unkown
|
page write copy
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
48DC000
|
stack
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
F50000
|
unkown
|
page execute and write copy
|
||
60FA000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
heap
|
page execute and read and write
|
||
5C1C000
|
trusted library allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
remote allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
26C7000
|
heap
|
page read and write
|
||
E88000
|
unkown
|
page execute and read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
61BF000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
unkown
|
page write copy
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
unkown
|
page readonly
|
||
60F8000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
EF2000
|
unkown
|
page execute and write copy
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute and write copy
|
||
E42000
|
unkown
|
page execute and write copy
|
||
5CB7000
|
trusted library allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
E98000
|
unkown
|
page execute and write copy
|
||
4C61000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page execute and read and write
|
||
6321000
|
trusted library allocation
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page execute and write copy
|
||
EB3000
|
unkown
|
page execute and write copy
|
||
61C1000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
unkown
|
page execute and write copy
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
5BF4000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
625F000
|
trusted library allocation
|
page read and write
|
||
6108000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
14DE000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
6128000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
264B000
|
stack
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
61AD000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
EB6000
|
unkown
|
page execute and read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
ED3000
|
unkown
|
page execute and write copy
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
4894000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
EE2000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
14E8000
|
heap
|
page read and write
|
||
6DED000
|
stack
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
48FA000
|
trusted library allocation
|
page execute and read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
6148000
|
trusted library allocation
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
E24000
|
unkown
|
page execute and read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
5BCC000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
E35000
|
unkown
|
page execute and read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
unkown
|
page execute and write copy
|
||
4960000
|
heap
|
page execute and read and write
|
||
EF5000
|
unkown
|
page execute and read and write
|
||
14E1000
|
heap
|
page read and write
|
||
5CB3000
|
trusted library allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
61C1000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
F68000
|
unkown
|
page execute and write copy
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
6147000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
5CD5000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
131000
|
unkown
|
page execute and write copy
|
||
1463000
|
heap
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
884000
|
heap
|
page read and write
|
||
6126000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
61A5000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
61FB000
|
trusted library allocation
|
page read and write
|
||
E96000
|
unkown
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
61BD000
|
trusted library allocation
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
31C000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5CBC000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
60F6000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
621E000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
remote allocation
|
page read and write
|
||
F56000
|
unkown
|
page execute and write copy
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
61C7000
|
trusted library allocation
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
14F1000
|
heap
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
61BF000
|
trusted library allocation
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
14F3000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
EB7000
|
unkown
|
page execute and write copy
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
60F3000
|
trusted library allocation
|
page read and write
|
||
60FC000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
4930000
|
trusted library allocation
|
page execute and read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BCE000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
60FC000
|
trusted library allocation
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
627F000
|
trusted library allocation
|
page read and write
|
||
14D6000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
6145000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
E75000
|
unkown
|
page execute and write copy
|
||
F66000
|
unkown
|
page execute and write copy
|
||
884000
|
heap
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
E39000
|
unkown
|
page execute and read and write
|
||
6308000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
18B000
|
unkown
|
page execute and write copy
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
61B7000
|
trusted library allocation
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
E26000
|
unkown
|
page execute and write copy
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
6143000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
6143000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
F43000
|
unkown
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
E9B000
|
unkown
|
page execute and read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
remote allocation
|
page read and write
|
||
F68000
|
unkown
|
page execute and write copy
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
EC6000
|
unkown
|
page execute and write copy
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
4883000
|
trusted library allocation
|
page execute and read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
61BB000
|
trusted library allocation
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
6281000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
trusted library allocation
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
unkown
|
page execute and read and write
|
||
60FA000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
61A7000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
490B000
|
trusted library allocation
|
page execute and read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
14E8000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
There are 891 hidden memdumps, click here to show them.