Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PAYMENT COPY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmp525.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\4jm-6-hL7
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5mebfolc.liw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uzprlt2.ptq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqhej52h.2qy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sfot3gfl.h2a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtxbro3o.ale.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl53tnli.vg4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z55jwqv5.y2t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztmcufib.3lt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp1D60.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PAYMENT COPY.exe
|
"C:\Users\user\Desktop\PAYMENT COPY.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PAYMENT
COPY.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bQrgcvrrXfGN" /XML "C:\Users\user\AppData\Local\Temp\tmp525.tmp"
|
||
C:\Users\user\Desktop\PAYMENT COPY.exe
|
"C:\Users\user\Desktop\PAYMENT COPY.exe"
|
||
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
|
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
|
||
C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe
|
"C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe"
|
||
C:\Windows\SysWOW64\gpresult.exe
|
"C:\Windows\SysWOW64\gpresult.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bQrgcvrrXfGN" /XML "C:\Users\user\AppData\Local\Temp\tmp1D60.tmp"
|
||
C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe
|
"C:\Users\user\AppData\Roaming\bQrgcvrrXfGN.exe"
|
||
C:\Windows\SysWOW64\gpresult.exe
|
"C:\Windows\SysWOW64\gpresult.exe"
|
||
C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe
|
"C:\Program Files (x86)\lhlKfbBrCNJtLacqlySgiUreWsByYCTRhIHrJeYqohmCdFGofInggsKQElh\JBOkmqufMEGwlAXNwkIjNoQeH.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.mediciconstanta.ro/jaeg/
|
89.42.218.92
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://www.knockdubai.ae/s5gg/
|
103.120.178.210
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.instagram.com/hover_domains
|
unknown
|
||
http://celluslim.com.br/y8lu/?VlEHDVvh=mWlJviWR5LwtuCLZCQRXGA
|
unknown
|
||
http://www.skinut-ves.ru/pf45/?VlEHDVvh=+FYLzbf4tuJqmfBE/IGOfF0r+MHgP4o87eLDAHdmTpq2bw1UrUMWUoU66GOKJ7n5AfomTNLEJ4yDFS4nbynVDFN+PHUTvroy3xH/fpiwWIz3Kb5ThfITUHU=&BHPD=o2nt
|
31.31.198.106
|
||
https://www.zoho.com/sites/images/professionally-crafted-themes.png
|
unknown
|
||
http://www.shy-models.ru/spev/?VlEHDVvh=tbEztHv7aRBF16/vS4ReUtdihzrMDj2O7MCPG/vC1Jml0QkKRnSSU8sUdUNE92nxSgZvf0qXlo0KJW6hnlqWydczzuvw5M1cQ8Ki08JizjbM/1/wqRnw39c=&BHPD=o2nt
|
185.215.4.44
|
||
http://www.arsenjev.fun/oqq6/
|
217.107.219.102
|
||
https://tilda.cc
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
|
unknown
|
||
http://www.embrace-counselor.com/5xhc/?VlEHDVvh=MlmeOAVABHl7V7JWE669wIJbTLHKaUkhN9NjdS3PgsP7eMcTlCivolpOMqUU2YL5bEhebrvuWwjxxfDDk/ZIeLQ1wF+hSOQ+omIdi18JN7A0f8vC6TD737s=&BHPD=o2nt
|
202.233.67.46
|
||
https://www.reg.ru/support/#request
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://www.drdavidglassman.com/rydx/?VlEHDVvh=yFQmHiiKcR7mSVWuRw8RQpo4LJVZTLcWi6hJF+Rn4pNF9HaZnauVsiHAA7JcJP010hHBzc/zc7n9tAOpAjixnZqk0gAODdt0gSRPUe/o9m+q8oWrf5RESRg=&BHPD=o2nt
|
199.59.243.225
|
||
https://files.reg.ru/fonts/inter/Inter-Regular.woff)
|
unknown
|
||
https://server5.hosting.reg.ru/manager
|
unknown
|
||
https://www.hover.com/domains/results
|
unknown
|
||
http://www.pinpointopia.com/w8kk/
|
216.40.34.41
|
||
http://help.yahoo.com/help/us/ysearch/slurp)
|
unknown
|
||
https://www.zoho.com/sites/?src=parkeddomain&dr=www.topscaleservices.com
|
unknown
|
||
http://www.supermontage.com/9i8t/
|
13.248.169.48
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.pinpointopia.com/w8kk/?VlEHDVvh=xApCedPshlFqhM+jKZfmvnpl71z0cBQVdhsyYTPYXO8jvxnjhAjWxt0ri1XYL1kB/lDsxIYle23q9eZueg3dcjYKciZZWPOZx8TMcQAQa9bvKBBzdKnYGI4=&BHPD=o2nt
|
216.40.34.41
|
||
http://www.celluslim.com.br/y8lu/?VlEHDVvh=mWlJviWR5LwtuCLZCQRXGA+vQb38eHFgRBz6unIHe4HBIxzvdSvdhO03jK4wsowAz3gHYbTW35gnt1fPF07v4JZ2cMipkMMw/S8lqxq9gNP1PGwmWBqthC4=&BHPD=o2nt
|
50.116.86.54
|
||
http://arsenjev.fun/oqq6/?VlEHDVvh=rwgwPlALEUzYU2aVnuvDPIeIRMF/prMxeEAjcX/DBUkDQJY
|
unknown
|
||
http://www.spotgush.top/ni9v/?VlEHDVvh=1qDi8Q0JYC/+jowmm6vhnz1nUg+FzSnwkBEF+9sZfgdAuqPr9wV9FjKgoqnVlqm9IHxz/wQEEdcJ3vr/ooFd412OQCGzSxMe6/jXu+QS8SjFcrOZORUu8fo=&BHPD=o2nt
|
66.29.149.46
|
||
http://www.spotgush.top/ni9v/
|
66.29.149.46
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.topscaleservices.com/uyud/
|
136.143.186.12
|
||
https://twitter.com/hover
|
unknown
|
||
http://www.arsenjev.fun/oqq6/?VlEHDVvh=rwgwPlALEUzYU2aVnuvDPIeIRMF/prMxeEAjcX/DBUkDQJY+y8rHCEXmR7eGsa/wgYTHR39WGVXgcrNwnNHcmkfubB89b8ls2WhHljXtxKg/z1p/kKzkfHY=&BHPD=o2nt
|
217.107.219.102
|
||
http://www.drdavidglassman.com/rydx/
|
199.59.243.225
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
|
unknown
|
||
http://www.chooceseafood.ca/ru1k/
|
199.59.243.225
|
||
http://www.shy-models.ru/spev/
|
185.215.4.44
|
||
https://2domains.ru
|
unknown
|
||
http://embrace-counselor.com/5xhc/?VlEHDVvh=MlmeOAVABHl7V7JWE669wIJbTLHKaUkhN9NjdS3PgsP7eMcTlCivolpO
|
unknown
|
||
http://www.drednents.es
|
unknown
|
||
https://ovipanel.in/tutorials
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
|
unknown
|
||
http://www.knockdubai.ae/s5gg/?VlEHDVvh=Lex3y3SP4nMuJeMgNnltykKJrtse07Leq1Ynk5nBUbN+LWWMQkpVzy+EMOTic1Ks5WEW61I3b9noLb4lZz3/VBahdTtzKpjYDK5Fm2hl+YH8rBOlCQe91Nk=&BHPD=o2nt
|
103.120.178.210
|
||
http://www.drednents.es/9bwj/
|
172.67.137.210
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://mediciconstanta.ro/jaeg/?VlEHDVvh=9Opn4WO2xZgxxNDkNGsIia6GoKuxBfXh3HU6nJUJOovQ2Daq2EsR8T6osHZ
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://www.drednents.es/9bwj/?VlEHDVvh=+7XJqbUQcguxa/KcUhsZdHSIPDv12M145Gf+kZkuNm6BJEH5M4YG3TEKS2nGgF42YhScJBjRA7U3xzFEvpUC1m9E0lF3kGvEoHdRMqPZgXJQjJurfTYwuhc=&BHPD=o2nt
|
172.67.137.210
|
||
https://files.reg.ru/fonts/inter/Inter-Medium.woff)
|
unknown
|
||
https://codepen.io/uzcho_/pens/popular/?grid_type=list
|
unknown
|
||
https://ovipanel.in/
|
unknown
|
||
https://codepen.io/uzcho_/pen/eYdmdXw.css
|
unknown
|
||
http://www.mediciconstanta.ro/jaeg/?VlEHDVvh=9Opn4WO2xZgxxNDkNGsIia6GoKuxBfXh3HU6nJUJOovQ2Daq2EsR8T6osHZN6Oos26YiOKjRaUape58pdui5fF9pfPUX5VWYS5msIkgnGD14mtGY1feIQ7U=&BHPD=o2nt
|
89.42.218.92
|
||
http://www.celluslim.com.br/y8lu/
|
50.116.86.54
|
||
https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
|
unknown
|
||
https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
|
unknown
|
||
http://www.supermontage.com/9i8t/?VlEHDVvh=2T5+pGPdigXxZZx8gY/OSLODLjvvwj0MjlV7S+1Ldbgia1Gm71jO+3C1ccfYbIwVvCUgnk/aeboESokRLTli2QWqQswZxn4Hxw0zC18njeajG3czp+Bsx3U=&BHPD=o2nt
|
13.248.169.48
|
||
https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://www.topscaleservices.com/uyud/?VlEHDVvh=a4DuWa1aWcmJH21/SNxRR+JRQb1v/kzaj3WKu4zLUxUUlKGTu9D1sWAogGI9gEZiY1gr5T6O35XBnrIr/I/ZCy9af/SljyarCQCdkJfuLPpdjFvVaxfdqpU=&BHPD=o2nt
|
136.143.186.12
|
||
http://www.embrace-counselor.com/5xhc/
|
202.233.67.46
|
||
https://reg.ru?target=_blank
|
unknown
|
There are 55 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.digishieldu.online
|
unknown
|
||
www.mediciconstanta.ro
|
unknown
|
||
www.knockdubai.ae
|
unknown
|
||
www.shy-models.ru
|
unknown
|
||
www.celluslim.com.br
|
unknown
|
||
www.topscaleservices.com
|
unknown
|
||
www.onitango-test.com
|
unknown
|
||
mediciconstanta.ro
|
89.42.218.92
|
||
www.arsenjev.fun
|
217.107.219.102
|
||
shy-models.ru
|
185.215.4.44
|
||
www.spotgush.top
|
66.29.149.46
|
||
www.chooceseafood.ca
|
199.59.243.225
|
||
www.drednents.es
|
172.67.137.210
|
||
www.pinpointopia.com
|
216.40.34.41
|
||
celluslim.com.br
|
50.116.86.54
|
||
www.supermontage.com
|
13.248.169.48
|
||
zhs.zohosites.com
|
136.143.186.12
|
||
www.drdavidglassman.com
|
199.59.243.225
|
||
www.embrace-counselor.com
|
202.233.67.46
|
||
knockdubai.ae
|
103.120.178.210
|
||
www.skinut-ves.ru
|
31.31.198.106
|
There are 11 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.248.169.48
|
www.supermontage.com
|
United States
|
||
136.143.186.12
|
zhs.zohosites.com
|
United States
|
||
103.120.178.210
|
knockdubai.ae
|
India
|
||
89.42.218.92
|
mediciconstanta.ro
|
Romania
|
||
172.67.137.210
|
www.drednents.es
|
United States
|
||
66.29.149.46
|
www.spotgush.top
|
United States
|
||
199.59.243.225
|
www.chooceseafood.ca
|
United States
|
||
50.116.86.54
|
celluslim.com.br
|
United States
|
||
217.107.219.102
|
www.arsenjev.fun
|
Russian Federation
|
||
202.233.67.46
|
www.embrace-counselor.com
|
Japan
|
||
185.215.4.44
|
shy-models.ru
|
Denmark
|
||
31.31.198.106
|
www.skinut-ves.ru
|
Russian Federation
|
||
216.40.34.41
|
www.pinpointopia.com
|
Canada
|
There are 3 hidden IPs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C60000
|
system
|
page execute and read and write
|
||
13F0000
|
unclassified section
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
4630000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
unclassified section
|
page execute and read and write
|
||
38F0000
|
unkown
|
page execute and read and write
|
||
860000
|
system
|
page execute and read and write
|
||
4B20000
|
system
|
page execute and read and write
|
||
5CB0000
|
system
|
page execute and read and write
|
||
33E0000
|
unclassified section
|
page execute and read and write
|
||
22E0000
|
unclassified section
|
page execute and read and write
|
||
40AE000
|
trusted library allocation
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
70D0000
|
trusted library section
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
4A2E000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7AD0000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
A4AB000
|
stack
|
page read and write
|
||
470A000
|
trusted library allocation
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4B5D000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page execute and read and write
|
||
53A0000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
7ABB000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
unclassified section
|
page read and write
|
||
22CE0645000
|
system
|
page execute and read and write
|
||
670E000
|
unclassified section
|
page read and write
|
||
812F000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
17D8000
|
direct allocation
|
page execute and read and write
|
||
AA5000
|
heap
|
page read and write
|
||
26AA000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4FF5000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
22CE2421000
|
trusted library allocation
|
page read and write
|
||
4B61000
|
direct allocation
|
page execute and read and write
|
||
8466000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
453A000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
EF64BFF000
|
stack
|
page read and write
|
||
7510000
|
heap
|
page read and write
|
||
C67000
|
unkown
|
page readonly
|
||
8CBF000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
4E09000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7A56000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
22CE085C000
|
heap
|
page read and write
|
||
252C000
|
unkown
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
4883000
|
heap
|
page read and write
|
||
A5EE000
|
stack
|
page read and write
|
||
8ED0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
90BE000
|
stack
|
page read and write
|
||
20C24000
|
system
|
page read and write
|
||
10DA000
|
trusted library allocation
|
page execute and read and write
|
||
3106000
|
heap
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
7DE000
|
unkown
|
page readonly
|
||
26EC000
|
unkown
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
6A32000
|
unclassified section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5022000
|
direct allocation
|
page execute and read and write
|
||
9DBE000
|
stack
|
page read and write
|
||
2EF0000
|
unkown
|
page execute and read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
942C000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2F5000
|
unkown
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
7A61000
|
heap
|
page read and write
|
||
4B5A000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
96B1000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
20622000
|
system
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4FCD000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
A7A000
|
stack
|
page read and write
|
||
4B5B000
|
stack
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
87A6000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
6C1000
|
unkown
|
page readonly
|
||
92EE000
|
stack
|
page read and write
|
||
5670000
|
trusted library allocation
|
page execute and read and write
|
||
B5C000
|
heap
|
page read and write
|
||
6DA6000
|
trusted library allocation
|
page read and write
|
||
4E0D000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3DCF000
|
trusted library allocation
|
page read and write
|
||
7AC6000
|
heap
|
page read and write
|
||
F09000
|
system
|
page execute and read and write
|
||
86EF000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
4BE3000
|
system
|
page execute and read and write
|
||
720000
|
heap
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
10E7000
|
trusted library allocation
|
page execute and read and write
|
||
23DF000
|
unkown
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
15B9000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3D91000
|
trusted library allocation
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
EF633FB000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
1030000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4812000
|
heap
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2F28000
|
trusted library allocation
|
page read and write
|
||
A1FE000
|
stack
|
page read and write
|
||
22CE0847000
|
heap
|
page read and write
|
||
1261000
|
direct allocation
|
page execute and read and write
|
||
8EBD000
|
stack
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
838000
|
stack
|
page read and write
|
||
26EC000
|
unkown
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
3440000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4B8F000
|
system
|
page execute and read and write
|
||
A23E000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
31A0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
12FE000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2E76000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page read and write
|
||
22CE240A000
|
trusted library allocation
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page execute and read and write
|
||
B37000
|
heap
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
2083C000
|
system
|
page read and write
|
||
4BE2000
|
unclassified section
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
721E000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
63EA000
|
unclassified section
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
7375000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
22CE25CE000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
F00000
|
system
|
page execute and read and write
|
||
22CE2200000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
heap
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
35D2000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
30F5000
|
heap
|
page read and write
|
||
40D0000
|
unkown
|
page read and write
|
||
8BBF000
|
stack
|
page read and write
|
||
601000
|
unkown
|
page readonly
|
||
22CE2300000
|
trusted library allocation
|
page read and write
|
||
719E000
|
stack
|
page read and write
|
||
7ACB000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
EF643FE000
|
stack
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
7AC1000
|
heap
|
page read and write
|
||
7999000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
E1D000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5D45000
|
heap
|
page read and write
|
||
22CE0840000
|
heap
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
49BD000
|
direct allocation
|
page execute and read and write
|
||
B7A000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
18DF000
|
stack
|
page read and write
|
||
A5AC000
|
stack
|
page read and write
|
||
162E000
|
direct allocation
|
page execute and read and write
|
||
43A000
|
stack
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
EF63BFD000
|
stack
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
F28000
|
system
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
4B38000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
BF0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
2400000
|
unkown
|
page readonly
|
||
44D7000
|
unclassified section
|
page execute and read and write
|
||
8E4000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
6BC000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
732000
|
unkown
|
page readonly
|
||
5725000
|
heap
|
page read and write
|
||
22CE2020000
|
trusted library allocation
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4659000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
73A1000
|
heap
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
A700000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
unclassified section
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page execute and read and write
|
||
4262000
|
unkown
|
page read and write
|
||
A6F0000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2F0F000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
750000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
15BD000
|
direct allocation
|
page execute and read and write
|
||
4CA2000
|
unclassified section
|
page read and write
|
||
1301000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5B5E000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
15E0000
|
unclassified section
|
page execute and read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
7A93000
|
heap
|
page read and write
|
||
22CE0872000
|
heap
|
page read and write
|
||
2AD4000
|
unkown
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
4989000
|
heap
|
page read and write
|
||
5EB000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
480E000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
5410000
|
trusted library section
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
22CE2020000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
5DA2000
|
unclassified section
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
231F000
|
stack
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2E79000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
60C6000
|
unclassified section
|
page read and write
|
||
10EB000
|
trusted library allocation
|
page execute and read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
B17000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2320000
|
unkown
|
page readonly
|
||
4530000
|
trusted library allocation
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
1276000
|
direct allocation
|
page execute and read and write
|
||
720000
|
heap
|
page read and write
|
||
5D30000
|
trusted library section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2412000
|
unkown
|
page read and write
|
||
E11000
|
unkown
|
page readonly
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
22CE2414000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
trusted library allocation
|
page read and write
|
||
2FDD000
|
trusted library allocation
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
2F87000
|
unclassified section
|
page execute and read and write
|
||
B03000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page execute read
|
||
7A66000
|
heap
|
page read and write
|
||
22CE2403000
|
trusted library allocation
|
page read and write
|
||
C65000
|
unkown
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
932C000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
FB7000
|
direct allocation
|
page execute and read and write
|
||
C67000
|
unkown
|
page readonly
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
B20000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
70BE000
|
stack
|
page read and write
|
||
52A4000
|
unclassified section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7A68000
|
heap
|
page read and write
|
||
7A51000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
6DA7000
|
system
|
page execute and read and write
|
||
F5E000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3B97000
|
unkown
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
22CE086F000
|
heap
|
page read and write
|
||
7364000
|
heap
|
page read and write
|
||
956E000
|
stack
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
95AE000
|
stack
|
page read and write
|
||
5D00000
|
trusted library section
|
page read and write
|
||
22CE06E0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2412000
|
unkown
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
48B0000
|
system
|
page execute and read and write
|
||
4B70000
|
system
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
22CE2020000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
FAD000
|
trusted library allocation
|
page execute and read and write
|
||
1036000
|
direct allocation
|
page execute and read and write
|
||
C51000
|
unkown
|
page execute read
|
||
3106000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
2DF8000
|
unkown
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
9EBD000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
5B50000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
22CE086B000
|
heap
|
page read and write
|
||
B77000
|
stack
|
page read and write
|
||
22CE25BE000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
900000
|
unkown
|
page readonly
|
||
EFA000
|
stack
|
page read and write
|
||
C51000
|
unkown
|
page execute read
|
||
7AD9000
|
heap
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
946E000
|
stack
|
page read and write
|
||
484D000
|
stack
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
9EC0000
|
heap
|
page read and write
|
||
7D60000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
3DAC000
|
unkown
|
page read and write
|
||
7A5B000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
2400000
|
unkown
|
page readonly
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
FB0000
|
heap
|
page read and write
|
||
5A7E000
|
unclassified section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
6339000
|
system
|
page execute and read and write
|
||
4AAC000
|
heap
|
page read and write
|
||
41E1000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
1312000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
5072000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1756000
|
direct allocation
|
page execute and read and write
|
||
540B000
|
stack
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
22CE240E000
|
trusted library allocation
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page readonly
|
||
601000
|
unkown
|
page readonly
|
||
BFC000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
CB9000
|
direct allocation
|
page read and write
|
||
4FE3000
|
heap
|
page read and write
|
||
4B80000
|
system
|
page execute and read and write
|
||
79AB000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
7A62000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
91EE000
|
stack
|
page read and write
|
||
C3D000
|
stack
|
page read and write
|
||
58EC000
|
unclassified section
|
page read and write
|
||
311C000
|
unkown
|
page read and write
|
||
749D000
|
stack
|
page read and write
|
||
539D000
|
stack
|
page read and write
|
||
2EFE000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
C5E000
|
unkown
|
page readonly
|
||
269F000
|
stack
|
page read and write
|
||
10D6000
|
trusted library allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
stack
|
page read and write
|
||
7A98000
|
heap
|
page read and write
|
||
7066000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
12EB000
|
trusted library allocation
|
page read and write
|
||
7A6B000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
C32000
|
heap
|
page read and write
|
||
49B9000
|
direct allocation
|
page execute and read and write
|
||
7FCC0000
|
trusted library allocation
|
page execute and read and write
|
||
5550000
|
heap
|
page read and write
|
||
4EBC000
|
unclassified section
|
page read and write
|
||
C65000
|
unkown
|
page read and write
|
||
96AE000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
2FA000
|
stack
|
page read and write
|
||
130D000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
3F3E000
|
unkown
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
7070000
|
trusted library allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
7AB2000
|
heap
|
page read and write
|
||
739E000
|
heap
|
page read and write
|
||
127D000
|
direct allocation
|
page execute and read and write
|
||
1320000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
12DB000
|
stack
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
7A8D000
|
heap
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
9CBE000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
53A0000
|
trusted library section
|
page readonly
|
||
9BBF000
|
stack
|
page read and write
|
||
A6F2000
|
trusted library allocation
|
page read and write
|
||
735B000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1741000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
C67000
|
unkown
|
page readonly
|
||
1173000
|
heap
|
page read and write
|
||
303E000
|
unkown
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
10D3000
|
direct allocation
|
page execute and read and write
|
||
3C1A000
|
unkown
|
page read and write
|
||
239E000
|
unkown
|
page read and write
|
||
1130000
|
trusted library allocation
|
page execute and read and write
|
||
117E000
|
heap
|
page read and write
|
||
582D000
|
stack
|
page read and write
|
||
80EE000
|
stack
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
1FE0000
|
unclassified section
|
page execute and read and write
|
||
B0A000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3764000
|
unkown
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
541F000
|
trusted library section
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
D08000
|
heap
|
page read and write
|
||
3A69000
|
unclassified section
|
page execute and read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
52B0000
|
system
|
page execute and read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
2E95000
|
trusted library allocation
|
page read and write
|
||
79AB000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
E11000
|
unkown
|
page readonly
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
752E000
|
heap
|
page read and write
|
||
C65000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
22CE2400000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
10C3000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
5840000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page execute and read and write
|
||
AB6000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
778F000
|
stack
|
page read and write
|
||
1490000
|
direct allocation
|
page execute and read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
22CE25C4000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
22CE0800000
|
heap
|
page read and write
|
||
A0FD000
|
stack
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
22CE0647000
|
system
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3A88000
|
unkown
|
page read and write
|
||
2FF5000
|
unclassified section
|
page execute and read and write
|
||
265E000
|
stack
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
10D7000
|
trusted library allocation
|
page execute and read and write
|
||
22EA000
|
stack
|
page read and write
|
||
C67000
|
unkown
|
page readonly
|
||
C51000
|
unkown
|
page execute read
|
||
DC1000
|
heap
|
page read and write
|
||
5D40000
|
heap
|
page read and write
|
||
3C05000
|
unkown
|
page execute and read and write
|
||
73A5000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
24F0000
|
unkown
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
10D9000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
413D000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
2320000
|
unkown
|
page readonly
|
||
AB0000
|
heap
|
page read and write
|
||
10EB000
|
trusted library allocation
|
page execute and read and write
|
||
22CE2501000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
20562000
|
system
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
55C8000
|
unclassified section
|
page read and write
|
||
7A76000
|
heap
|
page read and write
|
||
8DBE000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
8A1E000
|
stack
|
page read and write
|
||
4E7E000
|
direct allocation
|
page execute and read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
71DD000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
10DA000
|
trusted library allocation
|
page execute and read and write
|
||
B17000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
FC0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
3ED9000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
22AD000
|
stack
|
page read and write
|
||
7AD7000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
4CFC000
|
unclassified section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
657C000
|
unclassified section
|
page read and write
|
||
A0BE000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
38F6000
|
unkown
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
FD6000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
22CE05D0000
|
system
|
page execute and read and write
|
||
CA5000
|
heap
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
3EB0000
|
system
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
4BD2000
|
direct allocation
|
page execute and read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
7A9D000
|
heap
|
page read and write
|
||
8EC0000
|
heap
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
A33E000
|
stack
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page execute and read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
22CE2410000
|
trusted library allocation
|
page read and write
|
||
6258000
|
unclassified section
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
24D2000
|
unkown
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
3AD7000
|
unclassified section
|
page execute and read and write
|
||
29E0000
|
unclassified section
|
page execute and read and write
|
||
650000
|
unkown
|
page readonly
|
||
3040000
|
heap
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
22CE07C0000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
63A7000
|
system
|
page execute and read and write
|
||
18E0000
|
unclassified section
|
page execute and read and write
|
||
C65000
|
unkown
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
5F34000
|
unclassified section
|
page read and write
|
||
175D000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
1130000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page execute and read and write
|
||
E11000
|
unkown
|
page readonly
|
||
A6EE000
|
stack
|
page read and write
|
||
5080000
|
trusted library allocation
|
page execute and read and write
|
||
628000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
22CE0872000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
225E000
|
stack
|
page read and write
|
||
4FB1000
|
direct allocation
|
page execute and read and write
|
||
1290000
|
heap
|
page execute and read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7564000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
30F5000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
10E7000
|
trusted library allocation
|
page execute and read and write
|
||
290000
|
unkown
|
page readonly
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
2FA000
|
stack
|
page read and write
|
||
4536000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4FAD000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1072000
|
direct allocation
|
page execute and read and write
|
||
32AE000
|
unkown
|
page read and write
|
||
22CE25B1000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
trusted library allocation
|
page read and write
|
||
41C1000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4D2C000
|
unkown
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
46E5000
|
heap
|
page read and write
|
||
6C1000
|
unkown
|
page readonly
|
||
11E2000
|
heap
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
4B8C000
|
system
|
page execute and read and write
|
||
3FC4000
|
trusted library allocation
|
page read and write
|
||
1306000
|
trusted library allocation
|
page read and write
|
||
5D21000
|
trusted library allocation
|
page read and write
|
There are 931 hidden memdumps, click here to show them.