Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
4TH HIRE SOA REMITTANCE_USD280,000.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmp16FF.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\GRogNEHvcL.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4TH HIRE SOA REMITTANCE_USD280,000.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GRogNEHvcL.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Y656-D6L1
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_azxhduxd.o4l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gracnpwr.0gd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_im3uef2p.bfq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mld0gfds.vau.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upwf1lj4.gxn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxzp5qwv.syp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xff2mrt0.bys.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y551avhh.khe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp30FF.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\GRogNEHvcL.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\4TH HIRE SOA REMITTANCE_USD280,000.exe
|
"C:\Users\user\Desktop\4TH HIRE SOA REMITTANCE_USD280,000.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\4TH HIRE
SOA REMITTANCE_USD280,000.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GRogNEHvcL.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GRogNEHvcL" /XML "C:\Users\user\AppData\Local\Temp\tmp16FF.tmp"
|
||
C:\Users\user\Desktop\4TH HIRE SOA REMITTANCE_USD280,000.exe
|
"C:\Users\user\Desktop\4TH HIRE SOA REMITTANCE_USD280,000.exe"
|
||
C:\Users\user\AppData\Roaming\GRogNEHvcL.exe
|
C:\Users\user\AppData\Roaming\GRogNEHvcL.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GRogNEHvcL" /XML "C:\Users\user\AppData\Local\Temp\tmp30FF.tmp"
|
||
C:\Users\user\AppData\Roaming\GRogNEHvcL.exe
|
"C:\Users\user\AppData\Roaming\GRogNEHvcL.exe"
|
||
C:\Program Files (x86)\SsffkNIowRsReJBYlDZpsAqXDiYZSMDNIfLoWWAcjuRlhiYNTxfcNBJnSqzyGrAHTAT\vFRZZQiLgeOQDzGymvZVa.exe
|
"C:\Program Files (x86)\SsffkNIowRsReJBYlDZpsAqXDiYZSMDNIfLoWWAcjuRlhiYNTxfcNBJnSqzyGrAHTAT\vFRZZQiLgeOQDzGymvZVa.exe"
|
||
C:\Windows\SysWOW64\winver.exe
|
"C:\Windows\SysWOW64\winver.exe"
|
||
C:\Program Files (x86)\SsffkNIowRsReJBYlDZpsAqXDiYZSMDNIfLoWWAcjuRlhiYNTxfcNBJnSqzyGrAHTAT\vFRZZQiLgeOQDzGymvZVa.exe
|
"C:\Program Files (x86)\SsffkNIowRsReJBYlDZpsAqXDiYZSMDNIfLoWWAcjuRlhiYNTxfcNBJnSqzyGrAHTAT\vFRZZQiLgeOQDzGymvZVa.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.adylkerak.ru/1jr4/
|
51.195.44.77
|
||
http://www.newmediamonday.com/f1h2/?4b34ht=o2w0OkdzOU7AeO8cST1vLwAMb2MVSZPok4SxmOvOEN/vFfcFf0cZDVwWJD0TY2twL06giNetwFt+I5xckOsROdTXbf+WwKvZ5D3dZkP4IlWKwwnosj8+1uAXlawkkcomhg==&UxF=2Nflznk0WJ3hjv
|
173.254.28.213
|
||
http://www.btx937.top/gp7t/
|
199.59.243.225
|
||
http://www.retrorocketmodels.com/vtm3/?4b34ht=kR7Fl86BSFGGM0PlM+jb3Z8U1XiTwr46KttiVv2q+FBEIB4NiNNJYHhFj5b5v2TtaYgnHWWiT/h6cxdEcVnMTV8uD5XBSlgGjz30dZ+o/GujFcx5HUknEw/XEJ5xYkmM6w==&UxF=2Nflznk0WJ3hjv
|
3.33.130.190
|
||
http://www.cica-rank.com/fx5q/
|
183.181.79.111
|
||
http://www.pilatovparts.ru/k2o4/
|
31.31.196.16
|
||
http://www.adylkerak.ru/1jr4/?4b34ht=kGdd1iddr+mvgzlLI3SGjgxAabUOGsKw2bG4JPXV9hwIwsQyE7CLPYW2F+PDsbjHTDHawkku/URFrqQj7JM/kB2xKVcJ0yqZ4Q9OBe3AFA9XjQjtHcn6JNxir1+KynzC3w==&UxF=2Nflznk0WJ3hjv
|
51.195.44.77
|
||
http://www.falldove.top/ewqf/
|
66.29.149.46
|
||
http://www.retrorocketmodels.com/vtm3/
|
3.33.130.190
|
||
http://www.btx937.top/gp7t/?4b34ht=rAqEu2gSv2s2Q34sajdUQRUadeB85tkFqSKdenQDQ2DGw2dO3uX5Zw6KDTM8IV3Tf+lQDmhmNxGX2EN4uh2PDjjxVn+OEzZBTy/UzpMaoQhQyJClBqNmt4mNfKWMNb1t7Q==&UxF=2Nflznk0WJ3hjv
|
199.59.243.225
|
||
http://www.botcsllc.com/wouf/
|
216.40.34.41
|
||
http://www.lesfleursdeceline.be/11y6/
|
3.125.172.46
|
||
http://www.lesfleursdeceline.be/11y6/?4b34ht=Dwy6CWGja1kYD5j/NiyuAt+/fS8dx1oXABRd8IB5T1BIX3lRMt9N7dOmg29JYmKAoU96l3n9gZEsdf5amHP+judxC5mcbKzq6E6B/htT/kbgwKzkG09OKna/oGm6dpHmyw==&UxF=2Nflznk0WJ3hjv
|
3.125.172.46
|
||
http://www.jl884.vip/viqu/?4b34ht=MVCyVDN3RwNEbgSUD+0xRye29v/XSHfdB7daKMb285I6uLH+in3mV6SqMrakijFPfITBXvDDRnIloAD3dOOGlBaUMS2RVppA4PBahCfW4PrIZhDLLp/ysGvZxQcLTJd5vQ==&UxF=2Nflznk0WJ3hjv
|
65.181.132.158
|
||
http://www.jl884.vip/viqu/
|
65.181.132.158
|
||
http://www.diplocity.org/l1oh/
|
78.142.211.199
|
||
http://www.duhocvietanh.edu.vn/iqzp/?4b34ht=fu92k1NC4wJFnZcipX/XbPhVhBhXF83hEHBnQGjO4gCDEIQAPcvMGFbAeujwAxJrjpsvX+qRkMbJbRaZT89LHtus1xeGcvR3FY7l2IYkKTCFrV4doYlBH8GHezxeD3NhTg==&UxF=2Nflznk0WJ3hjv
|
103.138.88.50
|
||
http://www.cica-rank.com/fx5q/?4b34ht=58zXcaw4QDLVkaL+G0qZOwfYBtfLZlBf9k0Qnw1Zv4bR0GQyFI5ORfMwVsCUT1zQejwif13gDfh0mdA+c9yRzCT9PqSg1LoC16c3+fSR0wz9mE2aSN+j+I+5sdCG7jTd0Q==&UxF=2Nflznk0WJ3hjv
|
183.181.79.111
|
||
http://www.equi-sen.ca/oh6m/
|
199.59.243.225
|
||
http://www.falldove.top/ewqf/?4b34ht=kYShQH1sa3Le60gDrsgCYGFyuVEpRJ0k4IW5QzbfeKprYk61XZyNmSsEdCDrGrgTxI+6jeCx+L1A4qHHQky9AsRR7ruU+KhrWGBfvU9SpfMi+rY6DVY8elzf7b7Bw6Cu6g==&UxF=2Nflznk0WJ3hjv
|
66.29.149.46
|
||
http://www.diplocity.org/l1oh/?4b34ht=CLj62WE97PINjru9/2Ua0S4wJ+6clgTBZzFqYLe+Zb/mrkE/j+GqxKOEwyxDIhmnv5tawjcWYXQUR2YOfRR5ys/k8mvsQ8S8w9omXjrMO8RJvp8vgkkqsEYyw/rrHr7WOA==&UxF=2Nflznk0WJ3hjv
|
78.142.211.199
|
||
http://www.newmediamonday.com/f1h2/
|
173.254.28.213
|
||
http://www.botcsllc.com/wouf/?4b34ht=XRItmHXywGWVnqDngINAMvff3IpqjclEV1ySHuRZOTcLzBiyF5+l3MoobodW+p084j4Tu28tOugkX2LbOW2aRLZQ/Vv/K47AM9XykbCYypLB0HUyScM9sRvicmb0LC0c/g==&UxF=2Nflznk0WJ3hjv
|
216.40.34.41
|
||
http://www.pilatovparts.ru/k2o4/?4b34ht=qS1OWRHNQ56Cw7+fPD172OEEUbCPY94RPpebPz6xreoqxXbgy7Cu/Z+GqTqWS2Pyzkow4Xyx1yLx23Wbx34O9asPPjW4w1AqTiokyKtl/e0W2Htu8J9pM1VOgBMsot7LIg==&UxF=2Nflznk0WJ3hjv
|
31.31.196.16
|
||
http://www.duhocvietanh.edu.vn/iqzp/
|
103.138.88.50
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://ogp.me/ns#
|
unknown
|
||
https://www.instagram.com/hover_domains
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/client/js.polyfill/container-query-polyfill.modern.js
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/2v/2v4/2v414g.css?ph=8290e35a9b
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/client/img/favicons/sb-favicon.ico?ph=8290e35a9b
|
unknown
|
||
https://events.webnode.com/projects/-/events/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://www.tranivel.com
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
|
unknown
|
||
https://www.reg.ru/support/#request
|
unknown
|
||
https://newmediamonday.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://duhocvietanh.edu.vn/iqzp/?4b34ht=fu92k1NC4wJFnZcipX/XbPhVhBhXF83hEHBnQGjO4gCDEIQAPcvMGFbAeujw
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-Regular.woff)
|
unknown
|
||
https://www.hover.com/domains/results
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/client/img/favicons/sb-favicon-16.svg?ph=8290e35a9b
|
unknown
|
||
https://server27.hosting.reg.ru/manager
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/39/396/39634o.js?ph=8290e35a9b
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://feeds.soundcloud.com/users/soundcloud:users:38128127/sounds.rss
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://twitter.com/hover
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/19/19m/19mvcd.css?ph=8290e35a9b
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/2r/2rd/2rdzz2.css?ph=8290e35a9b
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/04/04p/04pi85.css?ph=8290e35a9b
|
unknown
|
||
https://2domains.ru
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/17/178/178on3.css?ph=8290e35a9b
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/2i/2iw/2iwzy5.css?ph=8290e35a9b
|
unknown
|
||
http://www.tranivel.com/fr5e/
|
217.70.184.50
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/3c/3cw/3cwfrk.css?ph=8290e35a9b
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-Medium.woff)
|
unknown
|
||
https://codepen.io/uzcho_/pens/popular/?grid_type=list
|
unknown
|
||
https://codepen.io/uzcho_/pen/eYdmdXw.css
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/49/49x/49xmuk.css?ph=8290e35a9b
|
unknown
|
||
https://www.lesfleursdeceline.be/page-not-found-404/
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/32/32i/32i65q.css?ph=8290e35a9b
|
unknown
|
||
https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
|
unknown
|
||
https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/client/img/favicons/sb-favicon.svg?ph=8290e35a9b
|
unknown
|
||
https://d1di2lzuh97fh2.cloudfront.net/files/3f/3f9/3f9vvf.css?ph=8290e35a9b
|
unknown
|
||
https://reg.ru?target=_blank
|
unknown
|
There are 66 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.botcsllc.com
|
216.40.34.41
|
||
www.pilatovparts.ru
|
31.31.196.16
|
||
www.diplocity.org
|
78.142.211.199
|
||
lb.webnode.io
|
3.125.172.46
|
||
www.equi-sen.ca
|
199.59.243.225
|
||
newmediamonday.com
|
173.254.28.213
|
||
www.cica-rank.com
|
183.181.79.111
|
||
www.adylkerak.ru
|
51.195.44.77
|
||
94950.bodis.com
|
199.59.243.225
|
||
www.falldove.top
|
66.29.149.46
|
||
e6375a47.jl884.vip.cname.scname.com
|
65.181.132.158
|
||
duhocvietanh.edu.vn
|
103.138.88.50
|
||
retrorocketmodels.com
|
3.33.130.190
|
||
www.duhocvietanh.edu.vn
|
unknown
|
||
www.lesfleursdeceline.be
|
unknown
|
||
www.retrorocketmodels.com
|
unknown
|
||
www.btx937.top
|
unknown
|
||
www.tranivel.com
|
unknown
|
||
www.jl884.vip
|
unknown
|
||
www.newmediamonday.com
|
unknown
|
||
www.double.gay
|
unknown
|
||
webredir.vip.gandi.net
|
217.70.184.50
|
There are 12 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
183.181.79.111
|
www.cica-rank.com
|
Japan
|
||
51.195.44.77
|
www.adylkerak.ru
|
France
|
||
65.181.132.158
|
e6375a47.jl884.vip.cname.scname.com
|
United States
|
||
199.59.243.225
|
www.equi-sen.ca
|
United States
|
||
66.29.149.46
|
www.falldove.top
|
United States
|
||
103.138.88.50
|
duhocvietanh.edu.vn
|
Viet Nam
|
||
78.142.211.199
|
www.diplocity.org
|
Turkey
|
||
31.31.196.16
|
www.pilatovparts.ru
|
Russian Federation
|
||
3.125.172.46
|
lb.webnode.io
|
United States
|
||
173.254.28.213
|
newmediamonday.com
|
United States
|
||
3.33.130.190
|
retrorocketmodels.com
|
United States
|
||
216.40.34.41
|
www.botcsllc.com
|
Canada
|
||
217.70.184.50
|
webredir.vip.gandi.net
|
France
|
There are 3 hidden IPs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C50000
|
unclassified section
|
page execute and read and write
|
||
1AB0000
|
unclassified section
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
unkown
|
page execute and read and write
|
||
5920000
|
system
|
page execute and read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
system
|
page execute and read and write
|
||
26F0000
|
heap
|
page read and write
|
||
332C000
|
unkown
|
page read and write
|
||
10C1000
|
unkown
|
page readonly
|
||
2B87000
|
unkown
|
page execute and read and write
|
||
1C34E2F0000
|
trusted library allocation
|
page read and write
|
||
1C34CB3A000
|
heap
|
page read and write
|
||
1C34E701000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library section
|
page readonly
|
||
3D3E000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
58C4000
|
unclassified section
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1530000
|
unkown
|
page readonly
|
||
25CF000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
EBB000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F0E000
|
unkown
|
page readonly
|
||
BFD25FF000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6D03000
|
heap
|
page read and write
|
||
1C34E612000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
3D7E000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
32B1000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8350000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
80C0000
|
heap
|
page read and write
|
||
66E6000
|
unclassified section
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
997000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
80DA000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F17000
|
unkown
|
page readonly
|
||
32B6000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
40AE000
|
unkown
|
page read and write
|
||
B60D000
|
stack
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
5D7A000
|
unclassified section
|
page read and write
|
||
8109000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
BFD15FE000
|
stack
|
page read and write
|
||
32F6000
|
heap
|
page read and write
|
||
1889000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
119D000
|
stack
|
page read and write
|
||
813A000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
stack
|
page read and write
|
||
1B23000
|
direct allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
539000
|
stack
|
page read and write
|
||
F15000
|
unkown
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
910000
|
unkown
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
517D000
|
direct allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
D2D000
|
trusted library allocation
|
page execute and read and write
|
||
6554000
|
unclassified section
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
5F0C000
|
unclassified section
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
970000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
46F6000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
13B0000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
811F000
|
heap
|
page read and write
|
||
4FD9000
|
direct allocation
|
page execute and read and write
|
||
ED6000
|
trusted library allocation
|
page read and write
|
||
80CB000
|
heap
|
page read and write
|
||
27AA000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
80B0000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
5003000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
CBF000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1410000
|
unkown
|
page read and write
|
||
1430000
|
unkown
|
page read and write
|
||
18FE000
|
direct allocation
|
page execute and read and write
|
||
9B7F000
|
stack
|
page read and write
|
||
3A6E000
|
trusted library allocation
|
page read and write
|
||
C93000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
1C34CB41000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2A9F000
|
unkown
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
954D000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8131000
|
heap
|
page read and write
|
||
4FCB000
|
trusted library allocation
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
2600000
|
unkown
|
page readonly
|
||
F17000
|
unkown
|
page readonly
|
||
D70000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page execute and read and write
|
||
5080000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6CDC000
|
heap
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
32B1000
|
heap
|
page read and write
|
||
1AF1000
|
unkown
|
page readonly
|
||
286F000
|
unkown
|
page read and write
|
||
6EFC000
|
heap
|
page read and write
|
||
1C34E600000
|
trusted library allocation
|
page read and write
|
||
1C40000
|
heap
|
page read and write
|
||
53A000
|
stack
|
page read and write
|
||
80D8000
|
heap
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
1C34E621000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
80C6000
|
heap
|
page read and write
|
||
1127000
|
trusted library allocation
|
page execute and read and write
|
||
531C000
|
unclassified section
|
page read and write
|
||
1C34C8A7000
|
system
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1116000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
DCB000
|
trusted library allocation
|
page execute and read and write
|
||
25F4000
|
heap
|
page read and write
|
||
52C2000
|
unclassified section
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
6C90000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4BAC000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
6E2E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
3341000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
53A000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
14B8000
|
heap
|
page read and write
|
||
135C000
|
stack
|
page read and write
|
||
879F000
|
stack
|
page read and write
|
||
8133000
|
heap
|
page read and write
|
||
F17000
|
unkown
|
page readonly
|
||
EF0000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page execute and read and write
|
||
32C2000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
188D000
|
direct allocation
|
page execute and read and write
|
||
32C2000
|
heap
|
page read and write
|
||
1103000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
4B41000
|
heap
|
page read and write
|
||
1760000
|
unkown
|
page readonly
|
||
FFF000
|
stack
|
page read and write
|
||
C9D000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3887000
|
trusted library allocation
|
page read and write
|
||
B8AE000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5220000
|
heap
|
page execute and read and write
|
||
2CE8000
|
stack
|
page read and write
|
||
111A000
|
trusted library allocation
|
page execute and read and write
|
||
32B3000
|
heap
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
3A66000
|
unkown
|
page read and write
|
||
4FE6000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6878000
|
unclassified section
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3120000
|
unkown
|
page readonly
|
||
4FED000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
F15000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B7C000
|
stack
|
page read and write
|
||
AEDF000
|
stack
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
51F5000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
1550000
|
unkown
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
28CE000
|
trusted library allocation
|
page read and write
|
||
4240000
|
unkown
|
page read and write
|
||
1AA8000
|
direct allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4FDD000
|
direct allocation
|
page execute and read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
9C7D000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
109D000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
CA2000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8013000
|
heap
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34C940000
|
heap
|
page read and write
|
||
B86C000
|
stack
|
page read and write
|
||
5971000
|
system
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
1C34E490000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
ECE000
|
trusted library allocation
|
page read and write
|
||
B0DF000
|
stack
|
page read and write
|
||
4A1A000
|
unkown
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
198F000
|
stack
|
page read and write
|
||
3354000
|
heap
|
page read and write
|
||
6CE0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
B3DE000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
D23000
|
trusted library allocation
|
page execute and read and write
|
||
486E000
|
stack
|
page read and write
|
||
1190000
|
trusted library allocation
|
page execute and read and write
|
||
30C0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1AF1000
|
unkown
|
page readonly
|
||
50BE000
|
stack
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
50F7000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1390000
|
unkown
|
page readonly
|
||
4E90000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
A05F000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3307000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
80FA000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page execute and read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
EAB000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
C7A2000
|
system
|
page read and write
|
||
8127000
|
heap
|
page read and write
|
||
1A11000
|
direct allocation
|
page execute and read and write
|
||
96E000
|
stack
|
page read and write
|
||
8342000
|
trusted library allocation
|
page read and write
|
||
6EE8000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9A7E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6EE4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
6B00000
|
trusted library section
|
page read and write
|
||
2720000
|
heap
|
page execute and read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
A41F000
|
stack
|
page read and write
|
||
80E4000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
30C4000
|
heap
|
page read and write
|
||
1CCD000
|
direct allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3FC7000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
1CB1000
|
direct allocation
|
page execute and read and write
|
||
F01000
|
unkown
|
page execute read
|
||
20E7000
|
unclassified section
|
page execute and read and write
|
||
135C000
|
stack
|
page read and write
|
||
1760000
|
unkown
|
page readonly
|
||
9F0000
|
heap
|
page read and write
|
||
810B000
|
heap
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
282E000
|
unkown
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4E9A000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
957A000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3B41000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
5A56000
|
unclassified section
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1421000
|
unkown
|
page readonly
|
||
8136000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
157F000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
6EF0000
|
heap
|
page read and write
|
||
1AC2000
|
direct allocation
|
page execute and read and write
|
||
25F4000
|
heap
|
page read and write
|
||
5092000
|
trusted library allocation
|
page read and write
|
||
C862000
|
system
|
page read and write
|
||
1C34E2F0000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
B1DD000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1C34E60F000
|
trusted library allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
6B9C000
|
unclassified section
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
80D2000
|
heap
|
page read and write
|
||
C84000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
EDD000
|
trusted library allocation
|
page read and write
|
||
125A000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
5181000
|
direct allocation
|
page execute and read and write
|
||
232A000
|
stack
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
6F37000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
1C34CB2C000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
51D0000
|
trusted library section
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
1A00000
|
direct allocation
|
page execute and read and write
|
||
4564000
|
unkown
|
page read and write
|
||
8014000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
B1E0000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
879E000
|
stack
|
page read and write
|
||
F0E000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
F15000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
59EC000
|
system
|
page execute and read and write
|
||
337A000
|
heap
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
292A000
|
trusted library allocation
|
page read and write
|
||
4E8C000
|
stack
|
page read and write
|
||
6A0A000
|
unclassified section
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
32BD000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
6870000
|
heap
|
page read and write
|
||
504E000
|
direct allocation
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
1C34E7C4000
|
trusted library allocation
|
page read and write
|
||
3BF8000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6D2E000
|
unclassified section
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
7F480000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
1550000
|
unkown
|
page read and write
|
||
3D8A000
|
unkown
|
page read and write
|
||
3A2E000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8490000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2DBD000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
CAA000
|
trusted library allocation
|
page execute and read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B46000
|
heap
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
unkown
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
597A000
|
system
|
page execute and read and write
|
||
51F2000
|
direct allocation
|
page execute and read and write
|
||
2A5E000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34E603000
|
trusted library allocation
|
page read and write
|
||
6F22000
|
heap
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
800E000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2F8C000
|
unkown
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
11EE000
|
unkown
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
140D000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F17000
|
unkown
|
page readonly
|
||
980000
|
unkown
|
page readonly
|
||
23C0000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
14B0000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
80C1000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
4EB5000
|
heap
|
page read and write
|
||
1A80000
|
direct allocation
|
page execute and read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
2899000
|
trusted library allocation
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
51CB000
|
stack
|
page read and write
|
||
F15000
|
unkown
|
page read and write
|
||
3F43000
|
trusted library allocation
|
page read and write
|
||
6E3E000
|
trusted library allocation
|
page read and write
|
||
1B29000
|
direct allocation
|
page execute and read and write
|
||
B4DE000
|
stack
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute read
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6B40000
|
trusted library section
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
4FF2000
|
trusted library allocation
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page execute and read and write
|
||
5B5000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
C83000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
A09C000
|
stack
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
3120000
|
unkown
|
page readonly
|
||
2A10000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page execute and read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
1122000
|
trusted library allocation
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1C34CB1A000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
AFDF000
|
stack
|
page read and write
|
||
8105000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
6230000
|
unclassified section
|
page read and write
|
||
63C2000
|
unclassified section
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
DC2000
|
trusted library allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
32B7000
|
heap
|
page read and write
|
||
A1DD000
|
stack
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
1C34CA60000
|
heap
|
page read and write
|
||
3839000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
B76B000
|
stack
|
page read and write
|
||
A31D000
|
stack
|
page read and write
|
||
5996000
|
system
|
page execute and read and write
|
||
3212000
|
unkown
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
1C34E2F0000
|
trusted library allocation
|
page read and write
|
||
6F6D000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34E60D000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5280000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
A2DF000
|
stack
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8143000
|
heap
|
page read and write
|
||
ED1000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
CA7C000
|
system
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
CE64000
|
system
|
page read and write
|
||
5BE8000
|
unclassified section
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
1410000
|
unkown
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
32B8000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
80D5000
|
heap
|
page read and write
|
||
6E39000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
ACEE000
|
stack
|
page read and write
|
||
6CD9000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F0E000
|
unkown
|
page readonly
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
901000
|
unkown
|
page readonly
|
||
5202000
|
unclassified section
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
32B7000
|
heap
|
page read and write
|
||
3212000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4C7C000
|
stack
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34E500000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1A2D000
|
direct allocation
|
page execute and read and write
|
||
11B7000
|
heap
|
page read and write
|
||
7F870000
|
trusted library allocation
|
page execute and read and write
|
||
1A86000
|
direct allocation
|
page execute and read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
2B30000
|
heap
|
page read and write
|
||
2CAB000
|
stack
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
26B5000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
trusted library allocation
|
page execute and read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
338E000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
3F1C000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
173F000
|
stack
|
page read and write
|
||
112B000
|
trusted library allocation
|
page execute and read and write
|
||
1568000
|
heap
|
page read and write
|
||
34EC000
|
unkown
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
A19C000
|
stack
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
3004000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
1A07000
|
direct allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
D0E000
|
stack
|
page read and write
|
||
9EF000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
1430000
|
unkown
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
6F61000
|
heap
|
page read and write
|
||
1C34C810000
|
system
|
page execute and read and write
|
||
1390000
|
unkown
|
page readonly
|
||
1C34CA30000
|
heap
|
page read and write
|
||
D24000
|
trusted library allocation
|
page read and write
|
||
609E000
|
unclassified section
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
125A000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page execute and read and write
|
||
51F0000
|
heap
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34E7BE000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
9E7E000
|
stack
|
page read and write
|
||
4D3E000
|
unkown
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
1760000
|
direct allocation
|
page execute and read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34CB10000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4E25000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1CC6000
|
direct allocation
|
page execute and read and write
|
||
3290000
|
heap
|
page read and write
|
||
43D2000
|
unkown
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
997E000
|
stack
|
page read and write
|
||
7200000
|
trusted library allocation
|
page execute and read and write
|
||
38D4000
|
unkown
|
page read and write
|
||
B9AE000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
3B49000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
402000
|
unkown
|
page readonly
|
||
BFD0DFC000
|
stack
|
page read and write
|
||
32D2000
|
unkown
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
10C1000
|
unkown
|
page readonly
|
||
DBE000
|
stack
|
page read and write
|
||
6BDE000
|
trusted library allocation
|
page read and write
|
||
1C34E7B3000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
3004000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
899000
|
stack
|
page read and write
|
||
1A26000
|
direct allocation
|
page execute and read and write
|
||
1A26000
|
direct allocation
|
page execute and read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
32C8000
|
heap
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
98AE000
|
stack
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
CA6000
|
trusted library allocation
|
page execute and read and write
|
||
598A000
|
system
|
page execute and read and write
|
||
BFD1DFE000
|
stack
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
13B0000
|
unkown
|
page readonly
|
||
1421000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
6C0B000
|
trusted library allocation
|
page read and write
|
||
2713000
|
heap
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
34EC000
|
unkown
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
1530000
|
unkown
|
page readonly
|
||
3831000
|
trusted library allocation
|
page read and write
|
||
42C000
|
remote allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4FE1000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
2600000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
22ED000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
6AF0000
|
trusted library section
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
1C34C8AA000
|
system
|
page execute and read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
C8D000
|
trusted library allocation
|
page execute and read and write
|
||
4B41000
|
heap
|
page read and write
|
||
4888000
|
unkown
|
page read and write
|
||
950D000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
9F5E000
|
stack
|
page read and write
|
||
54DC000
|
unclassified section
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
3923000
|
trusted library allocation
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
4B41000
|
heap
|
page read and write
|
||
6AB0000
|
trusted library section
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1C34E7CE000
|
trusted library allocation
|
page read and write
|
||
901000
|
unkown
|
page readonly
|
||
276D000
|
stack
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
B70E000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
CC0000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
1C34CB3F000
|
heap
|
page read and write
|
||
687E000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
49CC000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
There are 860 hidden memdumps, click here to show them.