Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NUEVA ORDEN DE COMPRAsxlx..exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_NUEVA ORDEN DE C_f7bac2445179e8f2c312d8977cbf32c417e6_15c0ca2f_f5328e29-51a0-46c5-8335-48b5900a66c4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EB3.tmp.dmp
|
Mini DuMP crash report, 16 streams, Mon May 27 10:20:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4645.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4675.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xiw1g43.whz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34dbr0qw.55s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqoqxckf.01r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fnabt4oe.n5g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqvkcwwr.tfw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmuhjihw.amo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NUEVA ORDEN DE COMPRAsxlx..exe
|
"C:\Users\user\Desktop\NUEVA ORDEN DE COMPRAsxlx..exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\NUEVA ORDEN
DE COMPRAsxlx..exe" -Force
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\.exe'
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7596 -s 1620
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.175H
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.175
|
188.114.96.3
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://scratchdreams.tk
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://scratchdreams.tk/_send_.php?TS
|
188.114.97.3
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.175x
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.micro7
|
unknown
|
||
http://scratchdreams.tk
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.org
|
unknown
|
||
scratchdreams.tk
|
188.114.97.3
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
188.114.97.3
|
scratchdreams.tk
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
|
Enabled
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
ProgramId
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
FileId
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
LongPathHash
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Name
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
OriginalFileName
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Publisher
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Version
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
BinFileVersion
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
BinaryType
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
ProductName
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
ProductVersion
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
LinkDate
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
BinProductVersion
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
AppxPackageFullName
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Size
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Language
|
||
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
FileDirectory
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A61000
|
trusted library allocation
|
page read and write
|
||
3AE7000
|
trusted library allocation
|
page read and write
|
||
14F00044000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
42EC000
|
stack
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FFB114F8000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
F97000
|
trusted library allocation
|
page execute and read and write
|
||
84B0000
|
trusted library allocation
|
page execute and read and write
|
||
75CD000
|
trusted library allocation
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
41B5000
|
trusted library allocation
|
page execute and read and write
|
||
5240000
|
trusted library allocation
|
page execute and read and write
|
||
D4C000
|
heap
|
page read and write
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
4E2E000
|
stack
|
page read and write
|
||
81A0000
|
trusted library allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page execute and read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
807E000
|
stack
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
455C000
|
trusted library allocation
|
page read and write
|
||
38ACBFB000
|
stack
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
8430000
|
trusted library allocation
|
page execute and read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
5136000
|
trusted library allocation
|
page read and write
|
||
5E7F000
|
stack
|
page read and write
|
||
7FFB11670000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
E67000
|
trusted library allocation
|
page read and write
|
||
74AC000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page execute and read and write
|
||
DE0000
|
trusted library allocation
|
page execute and read and write
|
||
8540000
|
trusted library allocation
|
page read and write
|
||
7FFB11350000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
51DE000
|
trusted library allocation
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB116C0000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
2CD6000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
7FFB115F0000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
7F70000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
671D000
|
stack
|
page read and write
|
||
14F7C7F0000
|
heap
|
page read and write
|
||
38AC1FD000
|
stack
|
page read and write
|
||
27E4000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page execute and read and write
|
||
280A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB115C5000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library section
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
281B000
|
trusted library allocation
|
page execute and read and write
|
||
14F7C6BD000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
690F000
|
stack
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFB116A0000
|
trusted library allocation
|
page execute and read and write
|
||
8290000
|
trusted library allocation
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
8220000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
75D3000
|
trusted library allocation
|
page read and write
|
||
8380000
|
trusted library allocation
|
page read and write
|
||
7FFB11519000
|
trusted library allocation
|
page read and write
|
||
7634000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
14F7A323000
|
trusted library allocation
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
7434000
|
heap
|
page read and write
|
||
14F7A0EA000
|
heap
|
page read and write
|
||
7FFB11590000
|
trusted library allocation
|
page read and write
|
||
7FFB11638000
|
trusted library allocation
|
page read and write
|
||
7FFB115C0000
|
trusted library allocation
|
page read and write
|
||
7FFB115B0000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page execute and read and write
|
||
5EBD000
|
stack
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page execute and read and write
|
||
FB8000
|
heap
|
page read and write
|
||
4F4D000
|
trusted library allocation
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
23CC000
|
stack
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
29DD000
|
stack
|
page read and write
|
||
5013000
|
heap
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
38AC0FB000
|
stack
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
trusted library allocation
|
page execute and read and write
|
||
F95000
|
trusted library allocation
|
page execute and read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
38AC3FD000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
565F000
|
stack
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
82F0000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
3AE9000
|
trusted library allocation
|
page read and write
|
||
14F7A365000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
14F1000C000
|
trusted library allocation
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
14F7A12D000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
14F7C5F0000
|
heap
|
page read and write
|
||
4AC000
|
stack
|
page read and write
|
||
14F7A0BF000
|
heap
|
page read and write
|
||
14F000C7000
|
trusted library allocation
|
page read and write
|
||
4D09000
|
heap
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
81F0000
|
trusted library allocation
|
page read and write
|
||
8470000
|
trusted library allocation
|
page execute and read and write
|
||
83F0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page execute and read and write
|
||
28CE000
|
stack
|
page read and write
|
||
8490000
|
trusted library allocation
|
page execute and read and write
|
||
14F7A000000
|
heap
|
page read and write
|
||
80BC000
|
stack
|
page read and write
|
||
7FFB11460000
|
trusted library allocation
|
page execute and read and write
|
||
5160000
|
trusted library section
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
14F7C609000
|
heap
|
page read and write
|
||
5133000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
5E0F000
|
stack
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page execute and read and write
|
||
38AB9E2000
|
stack
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page execute and read and write
|
||
E9F000
|
stack
|
page read and write
|
||
7FFB1136B000
|
trusted library allocation
|
page execute and read and write
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
heap
|
page execute and read and write
|
||
45C2000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
14F7C69A000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
288C000
|
heap
|
page read and write
|
||
3A45000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page execute and read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
7FFB1150C000
|
trusted library allocation
|
page read and write
|
||
7FFB11640000
|
trusted library allocation
|
page read and write
|
||
14F10011000
|
trusted library allocation
|
page read and write
|
||
14F7A3A0000
|
heap
|
page read and write
|
||
7FFB11532000
|
trusted library allocation
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page execute and read and write
|
||
4F50000
|
heap
|
page read and write
|
||
38ABFFE000
|
stack
|
page read and write
|
||
8410000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB11400000
|
trusted library allocation
|
page execute and read and write
|
||
14F7A080000
|
heap
|
page read and write
|
||
38AC6FE000
|
stack
|
page read and write
|
||
7FFB116B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
7FFB115A1000
|
trusted library allocation
|
page read and write
|
||
8350000
|
trusted library allocation
|
page read and write
|
||
8610000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB11364000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
7FFB115F3000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
14F7A2A0000
|
heap
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
14F7BCC0000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
8280000
|
trusted library allocation
|
page execute and read and write
|
||
73DD000
|
heap
|
page read and write
|
||
7FFB11610000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
8100000
|
trusted library allocation
|
page execute and read and write
|
||
90FE000
|
heap
|
page read and write
|
||
BDD000
|
trusted library allocation
|
page execute and read and write
|
||
FFE000
|
stack
|
page read and write
|
||
E10000
|
trusted library allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page execute and read and write
|
||
684E000
|
stack
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
7AF2000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
14F7A08C000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
90EA000
|
heap
|
page read and write
|
||
7FFB114F3000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
trusted library allocation
|
page read and write
|
||
432D000
|
stack
|
page read and write
|
||
8190000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
heap
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
14F7A3E0000
|
heap
|
page execute and read and write
|
||
14F7A4E0000
|
heap
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
803E000
|
stack
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
7FFB115EC000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
14F7A410000
|
heap
|
page execute and read and write
|
||
428E000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
trusted library allocation
|
page execute and read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
8580000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
5012000
|
trusted library allocation
|
page read and write
|
||
519D000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
8210000
|
trusted library allocation
|
page read and write
|
||
675F000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
14F7A250000
|
heap
|
page read and write
|
||
28C9000
|
heap
|
page read and write
|
||
3A41000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
4174000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
8170000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB11650000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
83E0000
|
trusted library allocation
|
page execute and read and write
|
||
8163000
|
trusted library allocation
|
page read and write
|
||
7FFB11680000
|
trusted library allocation
|
page read and write
|
||
14F7A4E5000
|
heap
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
7FFB113F6000
|
trusted library allocation
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
28F8000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
7FFB114F0000
|
trusted library allocation
|
page read and write
|
||
4200000
|
heap
|
page execute and read and write
|
||
99A000
|
stack
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
7FFB11600000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page execute and read and write
|
||
532E000
|
stack
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
80F0000
|
trusted library allocation
|
page read and write
|
||
14F7A0F2000
|
heap
|
page read and write
|
||
773C000
|
trusted library allocation
|
page read and write
|
||
7FFB114E2000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
8360000
|
trusted library allocation
|
page execute and read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
7F40000
|
trusted library allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
7724000
|
trusted library allocation
|
page read and write
|
||
75BE000
|
stack
|
page read and write
|
||
14F7C7F3000
|
heap
|
page read and write
|
||
14F7A2F0000
|
trusted library allocation
|
page read and write
|
||
6740000
|
heap
|
page execute and read and write
|
||
F9B000
|
trusted library allocation
|
page execute and read and write
|
||
6675000
|
heap
|
page read and write
|
||
14F10008000
|
trusted library allocation
|
page read and write
|
||
86A5000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
14F10001000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
2637000
|
stack
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
B36000
|
stack
|
page read and write
|
||
512B000
|
trusted library allocation
|
page read and write
|
||
14F7A310000
|
trusted library allocation
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
14F7A0EC000
|
heap
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
75C6000
|
trusted library allocation
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
75D6000
|
trusted library allocation
|
page read and write
|
||
7FFB1151F000
|
trusted library allocation
|
page read and write
|
||
14F7A3C0000
|
trusted library section
|
page read and write
|
||
7FFB11360000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FF443190000
|
trusted library allocation
|
page execute and read and write
|
||
38ACAFE000
|
stack
|
page read and write
|
||
14F79FD2000
|
unkown
|
page readonly
|
||
429A000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
9320000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB113FC000
|
trusted library allocation
|
page execute and read and write
|
||
14F7C6E8000
|
heap
|
page read and write
|
||
2676000
|
heap
|
page read and write
|
||
4F9A000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
753F000
|
stack
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
2910000
|
trusted library allocation
|
page execute and read and write
|
||
73FE000
|
heap
|
page read and write
|
||
14F7C664000
|
heap
|
page read and write
|
||
66B6000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
38ABCFE000
|
stack
|
page read and write
|
||
14F7A360000
|
heap
|
page read and write
|
||
80C0000
|
trusted library allocation
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
7FFB1150F000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
7FFB1168B000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
90EF000
|
heap
|
page read and write
|
||
665A000
|
heap
|
page read and write
|
||
7471000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
14F7A420000
|
heap
|
page read and write
|
||
8570000
|
trusted library allocation
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
7FFB1139C000
|
trusted library allocation
|
page execute and read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page execute and read and write
|
||
C9E000
|
stack
|
page read and write
|
||
4298000
|
trusted library allocation
|
page read and write
|
||
2816000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
4186000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
772F000
|
trusted library allocation
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
2817000
|
trusted library allocation
|
page execute and read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB11537000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
4498000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
14F7C010000
|
heap
|
page read and write
|
||
7FFB11690000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
7FFB11580000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
stack
|
page read and write
|
||
4F4A000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
73B0000
|
heap
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page execute and read and write
|
||
C9C000
|
stack
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
7FFB11654000
|
trusted library allocation
|
page read and write
|
||
2CB4000
|
trusted library allocation
|
page read and write
|
||
14F7A0C2000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
80D1000
|
trusted library allocation
|
page read and write
|
||
7F58000
|
trusted library allocation
|
page read and write
|
||
7402000
|
heap
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
41E0000
|
heap
|
page readonly
|
||
82C0000
|
trusted library allocation
|
page execute and read and write
|
||
649D000
|
stack
|
page read and write
|
||
6CEB000
|
stack
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
7FFB11507000
|
trusted library allocation
|
page read and write
|
||
41B0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
heap
|
page execute and read and write
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
76D0000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
278E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
27ED000
|
trusted library allocation
|
page execute and read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
81E0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
||
7FFB115C2000
|
trusted library allocation
|
page read and write
|
||
7FFB113F0000
|
trusted library allocation
|
page read and write
|
||
14F79FD0000
|
unkown
|
page readonly
|
||
8230000
|
trusted library allocation
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
8340000
|
heap
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
BF7000
|
trusted library allocation
|
page execute and read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
41A0000
|
heap
|
page read and write
|
||
502E000
|
trusted library allocation
|
page read and write
|
||
699D000
|
stack
|
page read and write
|
||
BD4000
|
trusted library allocation
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
74A9000
|
heap
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
280A000
|
heap
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
910E000
|
heap
|
page read and write
|
||
2806000
|
trusted library allocation
|
page execute and read and write
|
||
417D000
|
trusted library allocation
|
page execute and read and write
|
||
6621000
|
heap
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
2934000
|
trusted library allocation
|
page read and write
|
||
6B6C000
|
stack
|
page read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
69DA000
|
stack
|
page read and write
|
||
14F7A0AF000
|
heap
|
page read and write
|
||
84FD000
|
stack
|
page read and write
|
||
2BBD000
|
trusted library allocation
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
7FFB11426000
|
trusted library allocation
|
page execute and read and write
|
||
5036000
|
trusted library allocation
|
page read and write
|
||
6668000
|
heap
|
page read and write
|
||
14F7A320000
|
trusted library allocation
|
page read and write
|
||
6CAD000
|
stack
|
page read and write
|
||
F86000
|
trusted library allocation
|
page execute and read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
7FFB11340000
|
trusted library allocation
|
page read and write
|
||
7FFB11540000
|
trusted library allocation
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
8450000
|
heap
|
page read and write
|
||
7738000
|
trusted library allocation
|
page read and write
|
||
501B000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
BC4000
|
trusted library allocation
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
512D000
|
trusted library allocation
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
746B000
|
heap
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
7FFB11559000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
7FFB11555000
|
trusted library allocation
|
page read and write
|
||
660F000
|
heap
|
page read and write
|
||
7FFB11630000
|
trusted library allocation
|
page read and write
|
||
6B2D000
|
stack
|
page read and write
|
||
6745000
|
heap
|
page execute and read and write
|
||
5EFD000
|
stack
|
page read and write
|
||
7FFB114FC000
|
trusted library allocation
|
page read and write
|
||
7FFB11570000
|
trusted library allocation
|
page read and write
|
||
4173000
|
trusted library allocation
|
page execute and read and write
|
||
43A4000
|
trusted library allocation
|
page read and write
|
||
45C6000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
trusted library allocation
|
page read and write
|
||
38AC5FE000
|
stack
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
8270000
|
trusted library allocation
|
page execute and read and write
|
||
BC3000
|
trusted library allocation
|
page execute and read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
27FC000
|
heap
|
page read and write
|
||
3ACE000
|
trusted library allocation
|
page read and write
|
||
7FFB1134D000
|
trusted library allocation
|
page execute and read and write
|
||
75E4000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
4F27000
|
trusted library allocation
|
page read and write
|
||
6AD9000
|
stack
|
page read and write
|
||
90D0000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
38ABEFE000
|
stack
|
page read and write
|
||
D09000
|
heap
|
page read and write
|
||
7FFB11550000
|
trusted library allocation
|
page read and write
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
7FFB11514000
|
trusted library allocation
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
7FFB1136D000
|
trusted library allocation
|
page execute and read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
4183000
|
trusted library allocation
|
page read and write
|
||
7FFB11542000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page execute and read and write
|
||
C5E000
|
stack
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
7FFB115E7000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
7FFB11659000
|
trusted library allocation
|
page read and write
|
||
7FFB1135D000
|
trusted library allocation
|
page execute and read and write
|
||
95D000
|
stack
|
page read and write
|
||
66B3000
|
trusted library allocation
|
page read and write
|
||
D92000
|
heap
|
page read and write
|
||
E52000
|
trusted library allocation
|
page read and write
|
||
38ABDFE000
|
stack
|
page read and write
|
||
7FFB11683000
|
trusted library allocation
|
page read and write
|
||
4F45000
|
trusted library allocation
|
page read and write
|
||
741A000
|
heap
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
7FFB115C8000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
4189000
|
trusted library allocation
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
83B0000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
7FFB1154A000
|
trusted library allocation
|
page read and write
|
||
14F7C800000
|
trusted library section
|
page read and write
|
||
7FFB11620000
|
trusted library allocation
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
38AC9FD000
|
stack
|
page read and write
|
||
8720000
|
trusted library allocation
|
page execute and read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
6A1E000
|
stack
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
7FFB115DA000
|
trusted library allocation
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
7FFB11560000
|
trusted library allocation
|
page read and write
|
||
8370000
|
trusted library allocation
|
page execute and read and write
|
||
82D0000
|
trusted library allocation
|
page read and write
|
||
14F7A0A4000
|
heap
|
page read and write
|
||
8560000
|
trusted library allocation
|
page read and write
|
||
14F00001000
|
trusted library allocation
|
page read and write
|
||
75EC000
|
trusted library allocation
|
page read and write
|
||
660D000
|
heap
|
page read and write
|
||
7FFB11343000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1152C000
|
trusted library allocation
|
page read and write
|
||
14F7A280000
|
heap
|
page read and write
|
||
38AC2FC000
|
stack
|
page read and write
|
||
14F7C600000
|
heap
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
5205000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page execute and read and write
|
||
3A61000
|
trusted library allocation
|
page read and write
|
||
5045000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
7FFB115DD000
|
trusted library allocation
|
page read and write
|
||
7FFB11660000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
7FFB1153D000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
BFB000
|
trusted library allocation
|
page execute and read and write
|
||
82A0000
|
trusted library allocation
|
page execute and read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
38AC4FE000
|
stack
|
page read and write
|
||
7721000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
14F7A390000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB11344000
|
trusted library allocation
|
page read and write
|
There are 651 hidden memdumps, click here to show them.