Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
tWitaq427K.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tWitaq427K.exe_ede55bcbdbc173d71a3dbb97cb9bdbf86b6df14_f3754e4a_b90d445d-99d0-4d9e-971e-4d3d1768a930\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tWitaq427K.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CCSJ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp7D5C.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\znlzneAxBVd.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\znlzneAxBVd.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB814.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Jul 1 13:57:09 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC9A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBCC9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\znlzneAxBVd.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2avnx2jo.mry.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2moj532a.xg1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ade5r5y1.zgn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jscth40y.cts.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nn1igfkt.5cq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvxq1atw.edz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sndiob5v.yqx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5gviura.n3b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv6DEB.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x0155ffb7, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv86CD.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x0155ffb7, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gncx
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\qtoymupgtjxsaaccmaaspxxfkmvim
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp9076.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tWitaq427K.exe
|
"C:\Users\user\Desktop\tWitaq427K.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tWitaq427K.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\znlzneAxBVd.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\znlzneAxBVd" /XML "C:\Users\user\AppData\Local\Temp\tmp7D5C.tmp"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
"C:\Users\user\Desktop\tWitaq427K.exe"
|
||
C:\Users\user\AppData\Roaming\znlzneAxBVd.exe
|
C:\Users\user\AppData\Roaming\znlzneAxBVd.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\znlzneAxBVd" /XML "C:\Users\user\AppData\Local\Temp\tmp9076.tmp"
|
||
C:\Users\user\AppData\Roaming\znlzneAxBVd.exe
|
"C:\Users\user\AppData\Roaming\znlzneAxBVd.exe"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\qtoymupgtjxsaaccmaaspxxfkmvim"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\avtqnnaahrpfcgygdlmlsckwtsernvlr"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\dpyb"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\gncx"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\azftvwrumrngvelhzdysqkd"
|
||
C:\Users\user\Desktop\tWitaq427K.exe
|
C:\Users\user\Desktop\tWitaq427K.exe /stext "C:\Users\user\AppData\Local\Temp\youltgrrcajydbitqwajywbyycxy"
|
||
C:\Users\user\AppData\Local\Temp\CCSJ.exe
|
"C:\Users\user\AppData\Local\Temp\CCSJ.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7964 -s 1876
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
antfly50.sytes.net
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
http://secure.globals
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://smtp.yandex.com
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
antfly50.sytes.net
|
80.85.154.121
|
||
smtp.yandex.com
|
unknown
|
||
smtp.yandex.ru
|
77.88.21.158
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.85.154.121
|
antfly50.sytes.net
|
Russian Federation
|
||
77.88.21.158
|
smtp.yandex.ru
|
Russian Federation
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-BW3KDF
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-BW3KDF
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-BW3KDF
|
time
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
ProgramId
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
FileId
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
LowerCaseLongPath
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
LongPathHash
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Name
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
OriginalFileName
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Publisher
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Version
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
BinFileVersion
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
BinaryType
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
ProductName
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
ProductVersion
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
LinkDate
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
BinProductVersion
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
AppxPackageFullName
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Size
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Language
|
||
\REGISTRY\A\{2f1e1abb-7718-9e89-4f45-6235b22f84eb}\Root\InventoryApplicationFile\twitaq427k.exe|167a85f170ebf73f
|
Usn
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3B4C000
|
trusted library allocation
|
page read and write
|
||
2DC9000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
F97000
|
trusted library allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
549B000
|
stack
|
page read and write
|
||
5AAF000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
3CBE000
|
trusted library allocation
|
page read and write
|
||
5726000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
FDC000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
F3C000
|
stack
|
page read and write
|
||
8F4E000
|
stack
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
429B000
|
stack
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
92FD000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
7F880000
|
trusted library allocation
|
page execute and read and write
|
||
12D6000
|
stack
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
130C000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
5830000
|
trusted library section
|
page read and write
|
||
F2C000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
5550000
|
trusted library section
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page execute and read and write
|
||
12DB000
|
stack
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
FC6000
|
trusted library allocation
|
page execute and read and write
|
||
5520000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
61EF000
|
stack
|
page read and write
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
127C000
|
stack
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
2CD6000
|
trusted library allocation
|
page read and write
|
||
1047000
|
trusted library allocation
|
page execute and read and write
|
||
1045000
|
trusted library allocation
|
page execute and read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
439D000
|
stack
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
F63000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
3EA2000
|
heap
|
page read and write
|
||
FAD000
|
trusted library allocation
|
page execute and read and write
|
||
C6D000
|
heap
|
page read and write
|
||
92AC000
|
stack
|
page read and write
|
||
1040000
|
trusted library allocation
|
page execute and read and write
|
||
CE0000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
92B0000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
87CD000
|
stack
|
page read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
stack
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
BA7000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
8F3E000
|
stack
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
2E28000
|
trusted library allocation
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
102D000
|
trusted library allocation
|
page execute and read and write
|
||
271D000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3020000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
1134000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
104B000
|
trusted library allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
515B000
|
trusted library allocation
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
FC2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
3073000
|
heap
|
page read and write
|
||
59B0000
|
heap
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
3ADD000
|
stack
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
95B000
|
stack
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
B77000
|
stack
|
page read and write
|
||
2DA6000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
301D000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
333E000
|
unkown
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page execute and read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
4600000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
5171000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
FFE000
|
stack
|
page read and write
|
||
557B000
|
heap
|
page read and write
|
||
341A000
|
stack
|
page read and write
|
||
52E0000
|
heap
|
page execute and read and write
|
||
29DB000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
8A30000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
878F000
|
stack
|
page read and write
|
||
2D9C000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
160E000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
406F000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
16A1000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page execute and read and write
|
||
169A000
|
heap
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
4C75000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
285B000
|
stack
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
8DAE000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
4AE8000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
1070000
|
trusted library allocation
|
page execute and read and write
|
||
8E0C000
|
stack
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
5032000
|
trusted library allocation
|
page read and write
|
||
5554000
|
heap
|
page read and write
|
||
2B0F000
|
unkown
|
page read and write
|
||
3488000
|
heap
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page execute and read and write
|
||
3DB0000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
3E3F000
|
trusted library allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
3340000
|
heap
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
3EFA000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
heap
|
page read and write
|
||
1626000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1132000
|
stack
|
page read and write
|
||
FCA000
|
trusted library allocation
|
page execute and read and write
|
||
5FCF000
|
stack
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
3C6D000
|
stack
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
6890000
|
heap
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
5212000
|
trusted library allocation
|
page read and write
|
||
5559000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
7F660000
|
trusted library allocation
|
page execute and read and write
|
||
545E000
|
stack
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
2CC2000
|
trusted library allocation
|
page read and write
|
||
FD2000
|
trusted library allocation
|
page read and write
|
||
93FE000
|
stack
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page execute and read and write
|
||
158F000
|
stack
|
page read and write
|
||
5FF0000
|
trusted library section
|
page read and write
|
||
F86000
|
trusted library allocation
|
page execute and read and write
|
||
E4E000
|
stack
|
page read and write
|
||
904E000
|
stack
|
page read and write
|
||
533B000
|
stack
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
3FB2000
|
heap
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
8B4E000
|
stack
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
88CD000
|
stack
|
page read and write
|
||
8C50000
|
heap
|
page read and write
|
||
3078000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
CAA000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
86AE000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
9190000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
3340000
|
heap
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
FDB000
|
trusted library allocation
|
page execute and read and write
|
||
302F000
|
heap
|
page read and write
|
||
2CBE000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
F9B000
|
trusted library allocation
|
page execute and read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
6017000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1338000
|
trusted library allocation
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
B8B000
|
stack
|
page read and write
|
||
101D000
|
trusted library allocation
|
page execute and read and write
|
||
3C71000
|
trusted library allocation
|
page read and write
|
||
3FE5000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
1036000
|
trusted library allocation
|
page execute and read and write
|
||
168C000
|
heap
|
page read and write
|
||
87AE000
|
stack
|
page read and write
|
||
5F2E000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
9B9000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
stack
|
page read and write
|
||
916F000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
5D3F000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
DBA000
|
stack
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
32FE000
|
unkown
|
page read and write
|
||
908E000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
8A2D000
|
stack
|
page read and write
|
||
85C000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
918E000
|
stack
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
3DAF000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
3D84000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
6381000
|
heap
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
9410000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
2D33000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
A8C000
|
stack
|
page read and write
|
||
12AF000
|
trusted library allocation
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
445B000
|
heap
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page execute and read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
27FE000
|
unkown
|
page read and write
|
||
91AB000
|
stack
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page execute and read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
FB3000
|
trusted library allocation
|
page read and write
|
||
3AE9000
|
trusted library allocation
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
1129000
|
heap
|
page read and write
|
||
275A000
|
stack
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
5190000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
CAE000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page execute and read and write
|
||
392F000
|
stack
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
C39000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1014000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
868E000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
45A000
|
system
|
page execute and read and write
|
||
F73000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
167D000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
2CDD000
|
trusted library allocation
|
page read and write
|
||
892000
|
unkown
|
page readonly
|
||
10D2000
|
heap
|
page read and write
|
||
88E0000
|
heap
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
3FB4000
|
trusted library allocation
|
page read and write
|
||
8F0C000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
8C6F000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
4675000
|
heap
|
page read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
2B92000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
103A000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
trusted library allocation
|
page read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
55FF000
|
stack
|
page read and write
|
||
1013000
|
trusted library allocation
|
page execute and read and write
|
||
322B000
|
stack
|
page read and write
|
||
892D000
|
stack
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
3F35000
|
heap
|
page read and write
|
||
88D0000
|
heap
|
page read and write
|
||
39DD000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
3C99000
|
trusted library allocation
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
2B1C000
|
stack
|
page read and write
|
||
517D000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
138F000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
trusted library allocation
|
page execute and read and write
|
||
C90000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
3041000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
3FE2000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
5EEB000
|
stack
|
page read and write
|
||
12F4000
|
stack
|
page read and write
|
||
6870000
|
heap
|
page read and write
|
||
13D4000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
5820000
|
trusted library allocation
|
page execute and read and write
|
||
13CE000
|
stack
|
page read and write
|
||
54A0000
|
heap
|
page execute and read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
8A0D000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
2BE2000
|
trusted library allocation
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
FD7000
|
trusted library allocation
|
page execute and read and write
|
||
87EE000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
3C79000
|
trusted library allocation
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FA40000
|
trusted library allocation
|
page execute and read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
18ED000
|
heap
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
3D79000
|
trusted library allocation
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
7201000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
3D6B000
|
stack
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
635A000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
5460000
|
trusted library allocation
|
page execute and read and write
|
||
3440000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
41E000
|
system
|
page execute and read and write
|
||
5470000
|
heap
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
8E3E000
|
stack
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
5E30000
|
heap
|
page read and write
|
||
3FF2000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
50C3000
|
heap
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
3EC0000
|
heap
|
page read and write
|
||
52DC000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
FD0000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
6352000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
327A000
|
stack
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
864F000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
F3D000
|
stack
|
page read and write
|
||
2AC5000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
A7A000
|
stack
|
page read and write
|
||
1116000
|
stack
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
2DD2000
|
trusted library allocation
|
page read and write
|
||
111B000
|
stack
|
page read and write
|
||
4C7F000
|
trusted library allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
2AA6000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
5260000
|
trusted library allocation
|
page execute and read and write
|
||
52C3000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
11E0000
|
trusted library allocation
|
page execute and read and write
|
||
1050000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
5182000
|
trusted library allocation
|
page read and write
|
||
4C7C000
|
stack
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
There are 640 hidden memdumps, click here to show them.