Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
spec 4008670601 AZTEK Order.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\spec 4008670601 AZTEK Order.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\N77o9w1836
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x37, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yx0pa5d.iec.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hefjqtk1.rer.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvfivwcf.jud.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdfgkkzi.gve.ps1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
|
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\spec 4008670601
AZTEK Order.exe"
|
||
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
|
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
|
||
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
|
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
|
||
C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe
|
"C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe"
|
||
C:\Windows\SysWOW64\compact.exe
|
"C:\Windows\SysWOW64\compact.exe"
|
||
C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe
|
"C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.hellokong.xyz/oui5/
|
203.161.49.220
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://www.architect-usschool.com/s24g/
|
217.160.0.84
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://www.hondamechanic.today/pv57/?7Dihs8p=6UcJOPuI3ds3m8dRFaGqe18kk0aRE6C9zfep+6iQQcPKXv8sEJKo1I2dFrwlAwFzKSJLgqMZnt8gW4RLGDqdj2op7I/d7Qwx4DLM/Sb7UzOzABLy3akf6gQBeurdxZRPhPoEffE=&Bp=2LpD8tLh
|
64.190.62.22
|
||
http://searchdiscovered.com/__media__/images/logo.gif)
|
unknown
|
||
http://www.rz6grmvv.shop/wvam/?Bp=2LpD8tLh&7Dihs8p=ppN4Kg7gaCRo+jf4iLEmna60kcJd+oo7/wZIRMT4+Man5OlGV28GmQNPMVld/mi8klF/kBnYjgc4RUC2chY7WuIAYm4xk+Ll6sKGI2rWgbxJmoqgO5rVx7RJwqzCMQvvfrLjQU4=
|
121.254.178.230
|
||
http://www.hellokong.xyz/oui5/?7Dihs8p=SBbMJInblZiNUqJtj2t3oAZeaf7w1Mr63FaPzYR5npk3jTg+edZF9NME4tF9tViJCHx7c4tSq6N/qcOwzg98IChDG2ekcZOWcYJRK2znKimA3GQ/fbvAwxxdlKlVh8HBUwdv3Sg=&Bp=2LpD8tLh
|
203.161.49.220
|
||
http://i3.cdn-image.com/__media__/pics/28903/search.png)
|
unknown
|
||
https://cdn.consentmanager.net
|
unknown
|
||
http://www.epicbazaarhub.com/2769/
|
192.185.208.8
|
||
http://www.architect-usschool.com/s24g/?Bp=2LpD8tLh&7Dihs8p=4rIlPCx72NWCI0QJXJwD+tzjHhGgLlyDkrck6XhMS8VcXSbKvpDPBj6V0V8nuLzRy/FwKWDUEv1cw0ImnsIqFnkVImpc8YyZ7gWSicgk/ENTSAvixeUyT+Tq9osdZT4ae7dFHSM=
|
217.160.0.84
|
||
http://www.hondamechanic.today/pv57/
|
64.190.62.22
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://architect-usschool.com/s24g/?Bp=2LpD8tLh&7Dihs8p=4rIlPCx72NWCI0QJXJwD
|
unknown
|
||
http://www.tedjp-x.com/rxdf/?7Dihs8p=n5pckC1kDFTF1S5BKIsmiJ5ryDhRlCYaQVQlc2liktwXiyajKP48Wkncu6FoMqtxFtMv+2TSpEcAsDV+dI8BV0td651LvJeUOcJvnAipjtqBUQAoEW2kSo5oIr+iYWP+5LowsUg=&Bp=2LpD8tLh
|
162.43.101.114
|
||
http://www.ad14.fun/oc7s/?Bp=2LpD8tLh&7Dihs8p=ITz00edB1Uq7JDbRPTK5B57t89T2WQZ+hnFFsCQVLpiDf2LeJizgG+jH2jz5I+TBlRR/yAoHWWMQTB4d0WCMdZHpvgPMtRMFWqdBjyYGuisLgsnAd4XsPoSnl82L2CWvs48fsL0=
|
188.114.96.3
|
||
http://www.tedjp-x.com/rxdf/
|
162.43.101.114
|
||
http://www.rz6grmvv.shop/wvam/
|
121.254.178.230
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
|
unknown
|
||
https://www.namecheap.com/domains/registration/results/?domain=easybackpage.net
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
|
unknown
|
||
http://www.mengistiebethlehem.com/Moravia.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2FFitbFc
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
|
unknown
|
||
http://www.fondazionegtech.org/jmiz/?Bp=2LpD8tLh&7Dihs8p=FlIs+r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWKKTvYGFckMGyNztz9f5I1p/5DHHhHlE1nDIZgKO5qXvVh1+gwmyYcA+2CCaGrmZckpjuvJQ96WUy8TtzIG0Do=
|
89.31.76.10
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
|
unknown
|
||
http://www.3cubesinterior.in/n8zi/
|
45.113.122.18
|
||
http://www.mengistiebethlehem.com/display.cfm
|
unknown
|
||
http://3cubesinterior.in/n8zi/?Bp=2LpD8tLh&7Dihs8p=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTXe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.mengistiebethlehem.com/Christmas_City_Studio.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe
|
unknown
|
||
http://yg08.gowi0i.xyz
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
|
unknown
|
||
https://delivery.consentmanager.net
|
unknown
|
||
https://support.hostgator.com/
|
unknown
|
||
http://www.superunicornpalace.com/mwa4/
|
144.208.124.10
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
|
unknown
|
||
http://epicbazaarhub.com/2769/?7Dihs8p=rQ9MRvShllEvhf19NmQGPjdBfvwxqGfh/iQ/JyzvIKd3JVnhiEf6Ad8S1fm4Y
|
unknown
|
||
http://www.easybackpage.net/3jr0/?7Dihs8p=C6nbN3Z6SrmD48dKFL5Pdr+cZFmYp1QsQ3e628IyGZcRZCB2vhKb6ox4g6I37OYbmAVSFMbRXnVDWcusSAPk0vfQfIagm0ASlZK02lSA38wn9PDfH1oUKWJrxTMbBcOAU+1qziI=&Bp=2LpD8tLh
|
91.195.240.19
|
||
http://i3.cdn-image.com/__media__/pics/29590/bg1.png)
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://www.3cubesinterior.in/n8zi/?Bp=2LpD8tLh&7Dihs8p=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTXePjBpDkk8R6CbNZjNtV+M1xTH1M7WEFVhsxtrVg+jjfEC0sBsxKcDNAG8QmzJp6ywkUHIkWAXYoQO53dC+2pPrw=
|
45.113.122.18
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://i3.cdn-image.com/__media__/pics/28905/arrrow.png)
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.mengistiebethlehem.com/92z0/
|
208.91.197.13
|
||
https://www.sedo.com/services/parking.php3
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
|
unknown
|
||
http://www.mengistiebethlehem.com/Lehigh_Valley.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2F
|
unknown
|
||
http://www.hondamechanic.today
|
unknown
|
||
https://www.fondazionegtech.org/jmiz/?7Dihs8p=FlIs%20r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWKK
|
unknown
|
||
http://www.artvectorcraft.store/s0j2/?7Dihs8p=BcB93STIeRzesDqYzmgjF/8Aqg2qoGbugvfC7gVQd0Epq+RTfyEF6eLz+ZShIqPWgjFYuR+pkePM3whd8giEyH2988JCuLY+vIFLWxAqbBoWpgzIu1DPnhlaAUBnkOtEvd711RA=&Bp=2LpD8tLh
|
172.217.18.19
|
||
https://img.sedoparking.com/templates/images/hero_nc.svg
|
unknown
|
||
http://i3.cdn-image.com/__media__/js/min.js?v2.3
|
unknown
|
||
http://www.mengistiebethlehem.com/92z0/?7Dihs8p=Gchg326o6RWN/XFADw/V4eD2MO3apSP8yQOPkbolGTbWXGJL1kFLipwvr6KFDeoH1MC+XiIJPCdl50bZjywkZNBk97uFxrq9QGi9z8UXs1GhAfMLlFrOVkcHu0q9EP6WPl8Zh5k=&Bp=2LpD8tLh
|
208.91.197.13
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://www.easybackpage.net/3jr0/
|
91.195.240.19
|
||
http://www.artvectorcraft.store/s0j2/
|
172.217.18.19
|
||
http://www.ad14.fun/oc7s/
|
188.114.96.3
|
There are 58 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.hellokong.xyz
|
203.161.49.220
|
||
www.3cubesinterior.in
|
unknown
|
||
www.fondazionegtech.org
|
unknown
|
||
www.macklaer.com
|
unknown
|
||
www.easybackpage.net
|
unknown
|
||
www.epicbazaarhub.com
|
unknown
|
||
www.superunicornpalace.com
|
unknown
|
||
www.artvectorcraft.store
|
unknown
|
||
www.rz6grmvv.shop
|
121.254.178.230
|
||
ghs.google.com
|
172.217.18.19
|
||
superunicornpalace.com
|
144.208.124.10
|
||
www.architect-usschool.com
|
217.160.0.84
|
||
parkingpage.namecheap.com
|
91.195.240.19
|
||
www.hondamechanic.today
|
64.190.62.22
|
||
www.mengistiebethlehem.com
|
208.91.197.13
|
||
www.ad14.fun
|
188.114.96.3
|
||
epicbazaarhub.com
|
192.185.208.8
|
||
sitestudio.it
|
89.31.76.10
|
||
www.tedjp-x.com
|
162.43.101.114
|
||
3cubesinterior.in
|
45.113.122.18
|
There are 10 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
203.161.49.220
|
www.hellokong.xyz
|
Malaysia
|
||
172.217.18.19
|
ghs.google.com
|
United States
|
||
144.208.124.10
|
superunicornpalace.com
|
United States
|
||
64.190.62.22
|
www.hondamechanic.today
|
United States
|
||
208.91.197.13
|
www.mengistiebethlehem.com
|
Virgin Islands (BRITISH)
|
||
91.195.240.19
|
parkingpage.namecheap.com
|
Germany
|
||
162.43.101.114
|
www.tedjp-x.com
|
United States
|
||
217.160.0.84
|
www.architect-usschool.com
|
Germany
|
||
89.31.76.10
|
sitestudio.it
|
Italy
|
||
188.114.96.3
|
www.ad14.fun
|
European Union
|
||
45.113.122.18
|
3cubesinterior.in
|
India
|
||
192.185.208.8
|
epicbazaarhub.com
|
United States
|
||
121.254.178.230
|
www.rz6grmvv.shop
|
Korea Republic of
|
There are 3 hidden IPs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
35B0000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
system
|
page execute and read and write
|
||
4890000
|
unkown
|
page execute and read and write
|
||
38C0000
|
unclassified section
|
page execute and read and write
|
||
50C0000
|
system
|
page execute and read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1700000
|
unclassified section
|
page execute and read and write
|
||
A3E000
|
stack
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
3116000
|
heap
|
page read and write
|
||
190E000
|
direct allocation
|
page execute and read and write
|
||
3188000
|
heap
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
82C9000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
3163000
|
heap
|
page read and write
|
||
2ACC000
|
unkown
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
B1E000
|
stack
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
F70000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
B56000
|
trusted library allocation
|
page execute and read and write
|
||
AEE000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
3B72000
|
unkown
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6E03000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
168287CE000
|
trusted library allocation
|
page read and write
|
||
168269D5000
|
system
|
page execute and read and write
|
||
52FC000
|
unkown
|
page read and write
|
||
B6B000
|
trusted library allocation
|
page execute and read and write
|
||
310B000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2A72000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
4E14000
|
unclassified section
|
page read and write
|
||
AEE000
|
unkown
|
page readonly
|
||
8283000
|
heap
|
page read and write
|
||
16828390000
|
trusted library allocation
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
82D3000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16826A70000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
109D0000
|
heap
|
page read and write
|
||
3116000
|
heap
|
page read and write
|
||
5159000
|
system
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
8600000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
31DD000
|
heap
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
29B2000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
1AC0000
|
unclassified section
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16828370000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
AD5000
|
heap
|
page read and write
|
||
26FA4000
|
system
|
page read and write
|
||
3A20000
|
trusted library allocation
|
page execute and read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
67B3FFC000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
8312000
|
heap
|
page read and write
|
||
3024000
|
heap
|
page read and write
|
||
5141000
|
system
|
page execute and read and write
|
||
A3E000
|
stack
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
C3E000
|
heap
|
page read and write
|
||
449F000
|
trusted library allocation
|
page read and write
|
||
82CF000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
463A000
|
unclassified section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16828621000
|
trusted library allocation
|
page read and write
|
||
2C8C000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
352A000
|
unkown
|
page read and write
|
||
3D9C000
|
unclassified section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
3175000
|
heap
|
page read and write
|
||
8291000
|
heap
|
page read and write
|
||
6410000
|
unkown
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5165000
|
system
|
page execute and read and write
|
||
5167000
|
system
|
page execute and read and write
|
||
67B57FF000
|
stack
|
page read and write
|
||
16826A80000
|
heap
|
page read and write
|
||
310D000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4C82000
|
unclassified section
|
page read and write
|
||
A61000
|
unkown
|
page readonly
|
||
2A90000
|
unkown
|
page execute and read and write
|
||
486E000
|
trusted library allocation
|
page read and write
|
||
2A27000
|
trusted library allocation
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
513E000
|
system
|
page execute and read and write
|
||
D78000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5440000
|
unclassified section
|
page execute and read and write
|
||
1A36000
|
direct allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
16826ABC000
|
heap
|
page read and write
|
||
6DE2000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
4F6E000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
1A21000
|
direct allocation
|
page execute and read and write
|
||
2703000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16828614000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3398000
|
unkown
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
384E000
|
unkown
|
page read and write
|
||
830F000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
4316000
|
unclassified section
|
page read and write
|
||
82A5000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
3475000
|
heap
|
page read and write
|
||
4040000
|
unclassified section
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3172000
|
heap
|
page read and write
|
||
6DB0000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
3116000
|
heap
|
page read and write
|
||
26BBC000
|
system
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
31A4000
|
heap
|
page read and write
|
||
108CB000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
31D7000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
82A0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
1098000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
3040000
|
heap
|
page read and write
|
||
168287C4000
|
trusted library allocation
|
page read and write
|
||
A61000
|
unkown
|
page readonly
|
||
6F10000
|
trusted library section
|
page read and write
|
||
2845000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
3490000
|
unkown
|
page execute and read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
268E2000
|
system
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4028000
|
unkown
|
page read and write
|
||
16828701000
|
trusted library allocation
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
67B47FE000
|
stack
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
311F000
|
heap
|
page read and write
|
||
36BC000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
D0CE000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
82FF000
|
heap
|
page read and write
|
||
4D5E000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library section
|
page read and write
|
||
4899000
|
trusted library allocation
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
CEEE000
|
stack
|
page read and write
|
||
51F5000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page readonly
|
||
B5A000
|
trusted library allocation
|
page execute and read and write
|
||
37FD000
|
direct allocation
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1291000
|
unkown
|
page readonly
|
||
BAE000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
6F20000
|
trusted library section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
3024000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
1070000
|
heap
|
page read and write
|
||
3B82000
|
unclassified section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3175000
|
heap
|
page read and write
|
||
1A3D000
|
direct allocation
|
page execute and read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
2D4B000
|
stack
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
51BC000
|
system
|
page execute and read and write
|
||
3111000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
8291000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
40B7000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
720000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
311C000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
C10000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
99EF000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AF5000
|
unkown
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
B3D000
|
trusted library allocation
|
page execute and read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16826950000
|
system
|
page execute and read and write
|
||
A56000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
8309000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4A40000
|
unclassified section
|
page execute and read and write
|
||
1899000
|
direct allocation
|
page execute and read and write
|
||
7DA000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
F70000
|
unkown
|
page readonly
|
||
5138000
|
unclassified section
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3A12000
|
direct allocation
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
52CA000
|
unclassified section
|
page read and write
|
||
31F1000
|
heap
|
page read and write
|
||
5A10000
|
unkown
|
page execute and read and write
|
||
44A8000
|
unclassified section
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
unkown
|
page read and write
|
||
3651000
|
heap
|
page read and write
|
||
16828611000
|
trusted library allocation
|
page read and write
|
||
4D72000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3E90000
|
unkown
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
4DF2000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
313B000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1770000
|
direct allocation
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
5149000
|
system
|
page execute and read and write
|
||
7F070000
|
trusted library allocation
|
page execute and read and write
|
||
AE1000
|
unkown
|
page execute read
|
||
3655000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
10BCC000
|
stack
|
page read and write
|
||
10CCE000
|
stack
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
3116000
|
heap
|
page read and write
|
||
78A000
|
stack
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
472000
|
unkown
|
page readonly
|
||
E9F000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1682860B000
|
trusted library allocation
|
page read and write
|
||
41BA000
|
unkown
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
82A8000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
78A000
|
stack
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2C8C000
|
unkown
|
page read and write
|
||
CFCE000
|
stack
|
page read and write
|
||
36D0000
|
direct allocation
|
page execute and read and write
|
||
829B000
|
heap
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
67B4FFE000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
82A2000
|
heap
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
AF5000
|
unkown
|
page read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
269A2000
|
system
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3116000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
49FC000
|
stack
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
824000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3074000
|
unkown
|
page read and write
|
||
1AB8000
|
direct allocation
|
page execute and read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
A70000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
2D88000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
15FF000
|
stack
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
29A0000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
16828600000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16828390000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
4880000
|
trusted library allocation
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
4105000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
189D000
|
direct allocation
|
page execute and read and write
|
||
36C6000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
39E0000
|
unkown
|
page read and write
|
||
3E96000
|
unkown
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
16828390000
|
trusted library allocation
|
page read and write
|
||
4F1B000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page execute and read and write
|
||
8303000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3112000
|
heap
|
page read and write
|
||
4FA2000
|
unkown
|
page execute and read and write
|
||
29B2000
|
unkown
|
page read and write
|
||
16826AD1000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
8290000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1682860F000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
11D0000
|
direct allocation
|
page read and write
|
||
29A0000
|
unkown
|
page readonly
|
||
399D000
|
direct allocation
|
page execute and read and write
|
||
B67000
|
trusted library allocation
|
page execute and read and write
|
||
4F20000
|
trusted library allocation
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
16826ACE000
|
heap
|
page read and write
|
||
310B000
|
heap
|
page read and write
|
||
31B7000
|
heap
|
page read and write
|
||
3024000
|
heap
|
page read and write
|
||
16826AA0000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
310D000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
39A1000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
6DC3000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
16828617000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4AF0000
|
unclassified section
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1290000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
16828603000
|
trusted library allocation
|
page read and write
|
||
5FA000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4153000
|
trusted library allocation
|
page read and write
|
||
830C000
|
heap
|
page read and write
|
||
82FC000
|
heap
|
page read and write
|
||
168287A5000
|
trusted library allocation
|
page read and write
|
||
4184000
|
unclassified section
|
page read and write
|
||
82ED000
|
heap
|
page read and write
|
||
3107000
|
heap
|
page read and write
|
||
1301000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
722F000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
A20000
|
unkown
|
page readonly
|
||
16826ACA000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
3193000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
B4D000
|
trusted library allocation
|
page execute and read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
A40000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
318F000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
283E000
|
stack
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
AC4000
|
heap
|
page read and write
|
||
349A000
|
heap
|
page read and write
|
||
3FD2000
|
unclassified section
|
page execute and read and write
|
||
3320000
|
heap
|
page read and write
|
||
24C0000
|
unclassified section
|
page execute and read and write
|
||
700000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
73A2000
|
trusted library allocation
|
page read and write
|
||
B43000
|
trusted library allocation
|
page read and write
|
||
283C000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
37F9000
|
direct allocation
|
page execute and read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
3AC2000
|
unclassified section
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
8F7000
|
stack
|
page read and write
|
||
168287BE000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3172000
|
heap
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
16826AA7000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
4FA6000
|
unclassified section
|
page read and write
|
||
8A0F000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
495E000
|
unclassified section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
82AA000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
31CC000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page execute and read and write
|
||
2A33000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
8296000
|
heap
|
page read and write
|
||
16828500000
|
trusted library allocation
|
page read and write
|
||
3206000
|
unkown
|
page read and write
|
||
C6D000
|
heap
|
page read and write
|
||
82D9000
|
heap
|
page read and write
|
||
2EC0000
|
unclassified section
|
page execute and read and write
|
||
3BDC000
|
unclassified section
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
47CC000
|
unclassified section
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
311C000
|
heap
|
page read and write
|
||
7DA000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
B33000
|
trusted library allocation
|
page execute and read and write
|
||
AEE000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
3371000
|
heap
|
page read and write
|
||
6DC9000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
B52000
|
trusted library allocation
|
page read and write
|
||
3861000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page readonly
|
||
1300000
|
unkown
|
page readonly
|
||
3157000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
386E000
|
direct allocation
|
page execute and read and write
|
||
2700000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
1400000
|
heap
|
page read and write
|
||
269FC000
|
system
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
50B0000
|
trusted library section
|
page readonly
|
||
3D04000
|
unkown
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
5010000
|
unkown
|
page execute and read and write
|
||
3371000
|
heap
|
page read and write
|
||
16826AAE000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6E07000
|
heap
|
page read and write
|
||
C0C000
|
stack
|
page read and write
|
||
AF5000
|
unkown
|
page read and write
|
||
26EC000
|
stack
|
page read and write
|
||
D100000
|
trusted library section
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
82B4000
|
heap
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
168284E0000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
82F6000
|
heap
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
4D66000
|
trusted library allocation
|
page read and write
|
||
168269D2000
|
system
|
page execute and read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
6FAE000
|
stack
|
page read and write
|
There are 698 hidden memdumps, click here to show them.