Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
fLNzmBM9hR.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmp7751.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
|
ISO-8859 text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_f553dd681214908324f05d7ad9ebff8e6dc2a494_1623435c_b407573d-7935-418a-89b8-f36dbc0c1682\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4924.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4963.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6F3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu May 23 13:49:04 2024, 0x1205a4 type
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dgKDUvhlvCiVpa.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dnshost.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fLNzmBM9hR.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bxf515li.ghq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hz5jt5ps.pz5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oiyaziqw.sfh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgufgmvk.ob1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp802A.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\catalog.dat
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\storage.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\fLNzmBM9hR.exe
|
"C:\Users\user\Desktop\fLNzmBM9hR.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dgKDUvhlvCiVpa" /XML "C:\Users\user\AppData\Local\Temp\tmp7751.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
|
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dgKDUvhlvCiVpa" /XML "C:\Users\user\AppData\Local\Temp\tmp802A.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
"C:\Program Files (x86)\DNS Host\dnshost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7012 -s 1416
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
maxlogs.webhop.me
|
|||
newsddawork.3utilities.com
|
|||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://google.com
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://www.monotype.
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
newsddawork.3utilities.com
|
104.243.242.165
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.243.242.165
|
newsddawork.3utilities.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
DNS Host
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProgramId
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
FileId
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LowerCaseLongPath
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LongPathHash
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Name
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
OriginalFileName
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Publisher
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Version
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinFileVersion
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinaryType
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProductName
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProductVersion
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LinkDate
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinProductVersion
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
AppxPackageFullName
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Size
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Language
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
IsOsComponent
|
||
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3241000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3D2F000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3F09000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library section
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
7567000
|
heap
|
page read and write
|
||
6D50000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
17CC000
|
stack
|
page read and write
|
||
8BD8000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
7F7000
|
stack
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
717F000
|
stack
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
CAD000
|
trusted library allocation
|
page execute and read and write
|
||
62FE000
|
stack
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
A54F000
|
stack
|
page read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
trusted library allocation
|
page execute and read and write
|
||
5480000
|
heap
|
page read and write
|
||
5F20000
|
trusted library section
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
770D000
|
stack
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
9CA0000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page execute and read and write
|
||
5400000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
3CF1000
|
trusted library allocation
|
page read and write
|
||
746E000
|
heap
|
page read and write
|
||
675C000
|
stack
|
page read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
1145000
|
trusted library allocation
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
10AB000
|
stack
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
A2ED000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7D0C000
|
stack
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page execute and read and write
|
||
6860000
|
heap
|
page read and write
|
||
1256000
|
trusted library allocation
|
page execute and read and write
|
||
775F000
|
stack
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
A8BE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
CB3000
|
trusted library allocation
|
page read and write
|
||
F87000
|
trusted library allocation
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
4543000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
171A000
|
trusted library allocation
|
page execute and read and write
|
||
D13000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
384E000
|
trusted library allocation
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
5810000
|
heap
|
page execute and read and write
|
||
FF090000
|
trusted library allocation
|
page execute and read and write
|
||
5393000
|
heap
|
page read and write
|
||
685C000
|
stack
|
page read and write
|
||
5240000
|
heap
|
page execute and read and write
|
||
FD0000
|
trusted library allocation
|
page execute and read and write
|
||
759C000
|
heap
|
page read and write
|
||
6E30000
|
heap
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library section
|
page readonly
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
4A8D000
|
stack
|
page read and write
|
||
46CB000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
367C000
|
trusted library allocation
|
page read and write
|
||
5043000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
75B7000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
unkown
|
page read and write
|
||
36CA000
|
trusted library allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
7760000
|
trusted library section
|
page read and write
|
||
4436000
|
trusted library allocation
|
page read and write
|
||
157D000
|
stack
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
35FC000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
A1CB000
|
stack
|
page read and write
|
||
CA3000
|
trusted library allocation
|
page execute and read and write
|
||
C62000
|
trusted library allocation
|
page read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
5E5E000
|
stack
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page execute and read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library section
|
page read and write
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
3716000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
377E000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
7710000
|
trusted library section
|
page read and write
|
||
32AD000
|
trusted library allocation
|
page read and write
|
||
B22000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
1133000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page execute and read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
65E1000
|
stack
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
1807000
|
heap
|
page read and write
|
||
5361000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
E03000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
heap
|
page read and write
|
||
34F4000
|
trusted library allocation
|
page read and write
|
||
1128000
|
trusted library allocation
|
page read and write
|
||
9DED000
|
stack
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
FE4000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
3552000
|
trusted library allocation
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
A2F0000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3E45000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
trusted library allocation
|
page execute and read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page execute and read and write
|
||
107F000
|
stack
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
AB3D000
|
stack
|
page read and write
|
||
3774000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
C3D000
|
trusted library allocation
|
page execute and read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
671F000
|
stack
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
7F200000
|
trusted library allocation
|
page execute and read and write
|
||
547E000
|
stack
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
533D000
|
stack
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page read and write
|
||
FE6000
|
trusted library allocation
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
E3A000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
760C000
|
stack
|
page read and write
|
||
757E000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
29BE000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
2B1A000
|
trusted library allocation
|
page read and write
|
||
3BB9000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
30D6000
|
trusted library allocation
|
page read and write
|
||
3707000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
7560000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
4639000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library section
|
page readonly
|
||
1540000
|
heap
|
page read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
2ACD000
|
stack
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
79F0000
|
trusted library section
|
page read and write
|
||
A4EE000
|
stack
|
page read and write
|
||
3BDE000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
4FFD000
|
stack
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
C34000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
4B7B000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page execute and read and write
|
||
5C50000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
172B000
|
trusted library allocation
|
page execute and read and write
|
||
4723000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
17F4000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
7E0C000
|
stack
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
10E6000
|
trusted library allocation
|
page read and write
|
||
44AD000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
heap
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
4FF3000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
77F0000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
FE9000
|
stack
|
page read and write
|
||
5A90000
|
heap
|
page execute and read and write
|
||
6E2000
|
unkown
|
page readonly
|
||
3A09000
|
trusted library allocation
|
page read and write
|
||
1682000
|
heap
|
page read and write
|
||
3F01000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
trusted library section
|
page read and write
|
||
F38000
|
stack
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
5210000
|
heap
|
page execute and read and write
|
||
B2A000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
C52000
|
trusted library allocation
|
page read and write
|
||
E17000
|
trusted library allocation
|
page execute and read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
A44E000
|
stack
|
page read and write
|
||
6AD0000
|
trusted library section
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
7A30000
|
trusted library section
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page execute and read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
734D000
|
stack
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
5FA7000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page execute and read and write
|
||
3756000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
151B000
|
stack
|
page read and write
|
||
E2B000
|
trusted library allocation
|
page execute and read and write
|
||
30F5000
|
trusted library allocation
|
page read and write
|
||
4A46000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
305C000
|
trusted library allocation
|
page read and write
|
||
6A0D000
|
stack
|
page read and write
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
CC6000
|
trusted library allocation
|
page execute and read and write
|
||
4289000
|
trusted library allocation
|
page read and write
|
||
A72E000
|
stack
|
page read and write
|
||
3A57000
|
trusted library allocation
|
page read and write
|
||
373A000
|
trusted library allocation
|
page read and write
|
||
35DA000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page execute and read and write
|
||
A9BE000
|
stack
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
6A4F000
|
unkown
|
page read and write
|
||
5E5E000
|
stack
|
page read and write
|
||
5420000
|
trusted library allocation
|
page execute and read and write
|
||
E8E000
|
stack
|
page read and write
|
||
1126000
|
trusted library allocation
|
page read and write
|
||
AC3E000
|
stack
|
page read and write
|
||
C4D000
|
trusted library allocation
|
page execute and read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
5AA0000
|
heap
|
page execute and read and write
|
||
E27000
|
trusted library allocation
|
page execute and read and write
|
||
35F5000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
15BA000
|
heap
|
page read and write
|
||
724C000
|
stack
|
page read and write
|
||
A02F000
|
stack
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
8E7F000
|
stack
|
page read and write
|
||
7BCC000
|
stack
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
748D000
|
stack
|
page read and write
|
||
1234000
|
trusted library allocation
|
page read and write
|
||
79F8000
|
trusted library section
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
77E0000
|
trusted library section
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
377C000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
trusted library section
|
page readonly
|
||
A9FC000
|
stack
|
page read and write
|
||
A2CC000
|
stack
|
page read and write
|
||
5495000
|
heap
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1267000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
trusted library allocation
|
page execute and read and write
|
||
E1A000
|
trusted library allocation
|
page execute and read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
123D000
|
trusted library allocation
|
page execute and read and write
|
||
16F3000
|
trusted library allocation
|
page execute and read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
523D000
|
stack
|
page read and write
|
||
371F000
|
trusted library allocation
|
page read and write
|
||
7770000
|
trusted library section
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
15F5000
|
heap
|
page read and write
|
||
7A28000
|
trusted library section
|
page read and write
|
||
36A5000
|
trusted library allocation
|
page read and write
|
||
CD7000
|
trusted library allocation
|
page execute and read and write
|
||
4F1B000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page execute and read and write
|
||
AF8000
|
stack
|
page read and write
|
||
36FC000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
9F2E000
|
stack
|
page read and write
|
||
F0C000
|
stack
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
A30D000
|
stack
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
75BF000
|
heap
|
page read and write
|
||
7589000
|
heap
|
page read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
7A7C000
|
stack
|
page read and write
|
||
30E2000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
125A000
|
trusted library allocation
|
page execute and read and write
|
||
CC6000
|
heap
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
3612000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
AAFC000
|
stack
|
page read and write
|
||
6F53000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
36B9000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
C0D000
|
stack
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
5540000
|
trusted library allocation
|
page execute and read and write
|
||
4A48000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
7082000
|
trusted library allocation
|
page read and write
|
||
3EB9000
|
trusted library allocation
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
7750000
|
trusted library section
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1712000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
trusted library allocation
|
page read and write
|
||
4321000
|
trusted library allocation
|
page read and write
|
||
103A000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page execute and read and write
|
||
AF7000
|
stack
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
1727000
|
trusted library allocation
|
page execute and read and write
|
||
529E000
|
stack
|
page read and write
|
||
CDB000
|
trusted library allocation
|
page execute and read and write
|
||
10DE000
|
trusted library allocation
|
page read and write
|
||
5EDD000
|
stack
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
35C6000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
7790000
|
trusted library section
|
page read and write
|
||
C56000
|
trusted library allocation
|
page execute and read and write
|
||
1564000
|
trusted library allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
1233000
|
trusted library allocation
|
page execute and read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
10E1000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
4508000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
77A0000
|
trusted library section
|
page read and write
|
||
C5A000
|
trusted library allocation
|
page execute and read and write
|
||
707E000
|
stack
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page execute and read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
29CD000
|
trusted library allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
30DD000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
C6B000
|
trusted library allocation
|
page execute and read and write
|
||
6F71000
|
heap
|
page read and write
|
||
F85000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
A62E000
|
stack
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
9EEE000
|
stack
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
3618000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
FF2A0000
|
trusted library allocation
|
page execute and read and write
|
||
C67000
|
trusted library allocation
|
page execute and read and write
|
||
5490000
|
heap
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
C33000
|
trusted library allocation
|
page execute and read and write
|
||
AAE000
|
stack
|
page read and write
|
||
3680000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
25DA000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
5130000
|
heap
|
page execute and read and write
|
||
71B0000
|
trusted library allocation
|
page execute and read and write
|
||
2B0A000
|
stack
|
page read and write
|
||
CC2000
|
trusted library allocation
|
page read and write
|
||
288E000
|
unkown
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
3C5E000
|
trusted library allocation
|
page read and write
|
||
4B9B000
|
stack
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
477B000
|
trusted library allocation
|
page read and write
|
||
126B000
|
trusted library allocation
|
page execute and read and write
|
||
5FAB000
|
heap
|
page read and write
|
||
36F0000
|
trusted library allocation
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
7A3E000
|
trusted library section
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
28CF000
|
unkown
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4FEB000
|
stack
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library section
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
trusted library allocation
|
page read and write
|
||
3CDD000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
36DC000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
3AA5000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
710C000
|
stack
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
369C000
|
trusted library allocation
|
page read and write
|
||
3728000
|
trusted library allocation
|
page read and write
|
||
85D6000
|
trusted library allocation
|
page read and write
|
||
475B000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
642000
|
unkown
|
page readonly
|
||
6A8C000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
4ED6000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
A40E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
16F4000
|
trusted library allocation
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
4379000
|
trusted library allocation
|
page read and write
|
||
5973000
|
heap
|
page read and write
|
||
758F000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
3733000
|
trusted library allocation
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page execute and read and write
|
||
366C000
|
trusted library allocation
|
page read and write
|
||
3B73000
|
trusted library allocation
|
page read and write
|
||
7F560000
|
trusted library allocation
|
page execute and read and write
|
||
371A000
|
trusted library allocation
|
page read and write
|
||
75CA000
|
heap
|
page read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
259D000
|
stack
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
7780000
|
trusted library section
|
page read and write
|
||
4472000
|
trusted library allocation
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
heap
|
page execute and read and write
|
||
102E000
|
heap
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
29D2000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
112B000
|
trusted library allocation
|
page read and write
|
||
9C9D000
|
stack
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
6D49000
|
stack
|
page read and write
|
||
3644000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library section
|
page read and write
|
||
77A000
|
stack
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
trusted library allocation
|
page read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
trusted library allocation
|
page execute and read and write
|
||
1716000
|
trusted library allocation
|
page execute and read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
heap
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
35B8000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
1685000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
C43000
|
trusted library allocation
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
7B40000
|
trusted library section
|
page read and write
|
||
2A0B000
|
heap
|
page read and write
|
||
A5EE000
|
stack
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
trusted library allocation
|
page execute and read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
FCD000
|
stack
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
170D000
|
trusted library allocation
|
page execute and read and write
|
There are 665 hidden memdumps, click here to show them.