Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40'
HQ.pdf.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CH5FQLPZHWQW5TXD_6eeabbae5e165c4a861c92134e9484f56eb98e6_b956fc39_9100153d-56bc-45e0-9f1e-ac46bf4ebbca\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71E3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jul 17 10:54:46 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73C8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73E9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_01bay35h.on5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wddgtpb.1q3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3dxww1fj.1z2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfpcwqfp.mgt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eq54itpa.dze.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2mxthd3.tl5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hitzmhp2.yhd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hkjvhu34.xn5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ompeodq2.eme.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ri3llwur.aoy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0lfl0vd.bd1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yfkjlebk.mfz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jul 17 09:53:15
2024, mtime=Wed Jul 17 09:53:15 2024, atime=Wed Jul 17 09:53:15 2024, length=528384, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
|
"C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe"
|
||
C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
|
"C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\719#U665a)
HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '719#U665a)
HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7812 -s 2196
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
104.250.180.178
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://services.sunlightlabs.com/api
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.microC
|
unknown
|
||
http://www.sakkal.comK
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://www.google.com/search?q=
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 34 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.250.180.178
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
ProgramId
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
FileId
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
LongPathHash
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Name
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
OriginalFileName
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Publisher
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Version
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
BinFileVersion
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
BinaryType
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
ProductName
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
ProductVersion
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
LinkDate
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
BinProductVersion
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
AppxPackageFullName
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Size
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Language
|
||
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00EABCC9886
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
245F000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
trusted library section
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
8341000
|
heap
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
49F2000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
3457000
|
trusted library allocation
|
page read and write
|
||
7C58000
|
heap
|
page read and write
|
||
5C6A000
|
stack
|
page read and write
|
||
7CC1000
|
heap
|
page read and write
|
||
828D000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
7CCB000
|
heap
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
7C50000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2D20000
|
trusted library section
|
page read and write
|
||
6D1D000
|
stack
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
717D000
|
stack
|
page read and write
|
||
2230000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
81C9000
|
stack
|
page read and write
|
||
59BC000
|
stack
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
65C2000
|
trusted library allocation
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
29AD000
|
trusted library allocation
|
page execute and read and write
|
||
650000
|
trusted library section
|
page read and write
|
||
7D12000
|
heap
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
7745000
|
heap
|
page read and write
|
||
7150000
|
heap
|
page execute and read and write
|
||
70DE000
|
stack
|
page read and write
|
||
758000
|
stack
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
6D60000
|
heap
|
page execute and read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
10FB000
|
trusted library allocation
|
page execute and read and write
|
||
834E000
|
stack
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
4C1B000
|
stack
|
page read and write
|
||
7347000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page execute and read and write
|
||
6FFB000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
6EEC000
|
stack
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page execute and read and write
|
||
72BC000
|
heap
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
674000
|
trusted library allocation
|
page read and write
|
||
4C62000
|
trusted library allocation
|
page read and write
|
||
4357000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
7C82000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page execute and read and write
|
||
982E000
|
stack
|
page read and write
|
||
23DC000
|
stack
|
page read and write
|
||
496D000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
72B7000
|
heap
|
page read and write
|
||
8110000
|
trusted library allocation
|
page execute and read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
439D000
|
stack
|
page read and write
|
||
4534000
|
trusted library allocation
|
page read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
7041000
|
heap
|
page read and write
|
||
700C000
|
heap
|
page read and write
|
||
456F000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
28D5000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
5DFC000
|
stack
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
4510000
|
heap
|
page execute and read and write
|
||
3076000
|
heap
|
page read and write
|
||
727D000
|
stack
|
page read and write
|
||
8220000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page execute and read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
4B20000
|
trusted library allocation
|
page execute and read and write
|
||
61D0000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
86A3000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
trusted library allocation
|
page read and write
|
||
4925000
|
trusted library allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
4E39000
|
trusted library allocation
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
689000
|
trusted library allocation
|
page read and write
|
||
88CE000
|
stack
|
page read and write
|
||
49A6000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
heap
|
page read and write
|
||
3BDA000
|
trusted library allocation
|
page read and write
|
||
824F000
|
stack
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
834C000
|
stack
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page readonly
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
6DEF000
|
stack
|
page read and write
|
||
7AAD000
|
trusted library allocation
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
791F000
|
stack
|
page read and write
|
||
4CB9000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
827D000
|
heap
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
220A000
|
trusted library allocation
|
page execute and read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
44DA000
|
stack
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library section
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
424C000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
3174000
|
trusted library allocation
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
732D000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
972E000
|
stack
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
69BD000
|
stack
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
3173000
|
trusted library allocation
|
page execute and read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
34A5000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
4DE2000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4C6D000
|
stack
|
page read and write
|
||
69A000
|
trusted library allocation
|
page execute and read and write
|
||
851E000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
6D73000
|
heap
|
page read and write
|
||
4C82000
|
trusted library allocation
|
page read and write
|
||
21E3000
|
trusted library allocation
|
page execute and read and write
|
||
292E000
|
stack
|
page read and write
|
||
5469000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
5212000
|
trusted library allocation
|
page read and write
|
||
5E6F000
|
trusted library allocation
|
page read and write
|
||
6D78000
|
heap
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page execute and read and write
|
||
2D75000
|
trusted library allocation
|
page execute and read and write
|
||
734B000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
6B7F000
|
stack
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
2938000
|
heap
|
page read and write
|
||
42B0000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
5143000
|
heap
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
72A2000
|
heap
|
page read and write
|
||
4851000
|
trusted library allocation
|
page read and write
|
||
7CF6000
|
heap
|
page read and write
|
||
7014000
|
heap
|
page read and write
|
||
5579000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
475E000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
49F6000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page execute and read and write
|
||
702C000
|
stack
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute and read and write
|
||
712E000
|
stack
|
page read and write
|
||
43AC000
|
stack
|
page read and write
|
||
7B5F000
|
stack
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
884E000
|
stack
|
page read and write
|
||
4EC7000
|
trusted library allocation
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
7315000
|
heap
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
707A000
|
stack
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
80BD000
|
stack
|
page read and write
|
||
6AC6000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
29D0000
|
heap
|
page read and write
|
||
6E30000
|
heap
|
page execute and read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
5EFB000
|
stack
|
page read and write
|
||
6159000
|
stack
|
page read and write
|
||
7FD48000
|
trusted library allocation
|
page execute and read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
80FE000
|
stack
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
85F0000
|
heap
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
6FDF000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
803E000
|
stack
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
6A5000
|
trusted library allocation
|
page execute and read and write
|
||
449D000
|
stack
|
page read and write
|
||
605C000
|
stack
|
page read and write
|
||
6AEC000
|
heap
|
page read and write
|
||
7B9A000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
229E000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page execute and read and write
|
||
6D70000
|
heap
|
page read and write
|
||
249E000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
heap
|
page readonly
|
||
5571000
|
trusted library allocation
|
page read and write
|
||
76D3000
|
heap
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
2D10000
|
trusted library section
|
page read and write
|
||
5135000
|
trusted library allocation
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page execute and read and write
|
||
6920000
|
heap
|
page read and write
|
||
4B7C000
|
stack
|
page read and write
|
||
6ACD000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
7D15000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
4DFD000
|
stack
|
page read and write
|
||
51C4000
|
trusted library allocation
|
page read and write
|
||
888E000
|
stack
|
page read and write
|
||
4445000
|
trusted library allocation
|
page read and write
|
||
7E42000
|
trusted library allocation
|
page read and write
|
||
4799000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
6D83000
|
heap
|
page read and write
|
||
8030000
|
trusted library allocation
|
page execute and read and write
|
||
74CD000
|
stack
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page execute and read and write
|
||
7002000
|
heap
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
81C7000
|
trusted library allocation
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
81B0000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
EED000
|
trusted library allocation
|
page execute and read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
5ED000
|
stack
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
3222000
|
heap
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
54DE000
|
heap
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
4961000
|
trusted library allocation
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
8281000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page readonly
|
||
8E0000
|
heap
|
page read and write
|
||
67D000
|
trusted library allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
6D65000
|
heap
|
page execute and read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
680000
|
trusted library allocation
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
319A000
|
trusted library allocation
|
page execute and read and write
|
||
6C09000
|
stack
|
page read and write
|
||
596000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
8140000
|
trusted library allocation
|
page execute and read and write
|
||
47CA000
|
trusted library allocation
|
page read and write
|
||
799D000
|
stack
|
page read and write
|
||
42A0000
|
heap
|
page readonly
|
||
7B80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
7C40000
|
heap
|
page read and write
|
||
28CD000
|
stack
|
page read and write
|
||
6A2000
|
trusted library allocation
|
page read and write
|
||
8270000
|
heap
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
446C000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page execute and read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
449B000
|
trusted library allocation
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
7F1E0000
|
trusted library allocation
|
page execute and read and write
|
||
84B0000
|
trusted library allocation
|
page execute and read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
82D2000
|
heap
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
5A03000
|
trusted library allocation
|
page read and write
|
||
8460000
|
trusted library allocation
|
page execute and read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
72C8000
|
heap
|
page read and write
|
||
6D8C000
|
heap
|
page read and write
|
||
44C7000
|
trusted library allocation
|
page read and write
|
||
495E000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
2A99000
|
heap
|
page read and write
|
||
4526000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
6177000
|
trusted library allocation
|
page read and write
|
||
44AA000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
81CA000
|
trusted library allocation
|
page read and write
|
||
72BA000
|
stack
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
50FA000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
4E69000
|
trusted library allocation
|
page read and write
|
||
70A2000
|
trusted library allocation
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
748D000
|
stack
|
page read and write
|
||
5390000
|
heap
|
page execute and read and write
|
||
71E000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
804B000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
7AAB000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
7333000
|
heap
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
7690000
|
heap
|
page read and write
|
||
81AE000
|
stack
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
46A6000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
890F000
|
stack
|
page read and write
|
||
2D44000
|
trusted library allocation
|
page read and write
|
||
56FC000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
86D0000
|
trusted library allocation
|
page execute and read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
7B97000
|
trusted library allocation
|
page read and write
|
||
7B1D000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
6DC6000
|
heap
|
page read and write
|
||
8279000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
8490000
|
trusted library allocation
|
page execute and read and write
|
||
6F00000
|
heap
|
page read and write
|
||
48AB000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
heap
|
page read and write
|
||
5198000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
EE3000
|
trusted library allocation
|
page execute and read and write
|
||
818D000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page execute and read and write
|
||
7361000
|
heap
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
6FCA000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
2E28000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
7644000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
76E2000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
6E03000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
8285000
|
heap
|
page read and write
|
||
7305000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
2217000
|
trusted library allocation
|
page execute and read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
72D6000
|
heap
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
6D2E000
|
stack
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
673000
|
trusted library allocation
|
page execute and read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
880D000
|
stack
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library section
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
2A16000
|
heap
|
page read and write
|
||
6FA7000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
21ED000
|
trusted library allocation
|
page execute and read and write
|
||
6BB7000
|
trusted library allocation
|
page read and write
|
||
4551000
|
trusted library allocation
|
page read and write
|
||
2E78000
|
stack
|
page read and write
|
||
72CE000
|
heap
|
page read and write
|
||
820E000
|
stack
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
7D70000
|
heap
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
2212000
|
trusted library allocation
|
page read and write
|
||
68E5000
|
heap
|
page execute and read and write
|
||
47EE000
|
stack
|
page read and write
|
||
289C000
|
stack
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
heap
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
4B6C000
|
stack
|
page read and write
|
||
6B7A000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
8040000
|
trusted library allocation
|
page read and write
|
||
7CC7000
|
heap
|
page read and write
|
||
493E000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
7264000
|
heap
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
47F0000
|
heap
|
page execute and read and write
|
||
6DBD000
|
heap
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
6D5B000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
4EA9000
|
trusted library allocation
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
51E4000
|
trusted library allocation
|
page read and write
|
||
6EEB000
|
stack
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
heap
|
page execute and read and write
|
||
701D000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
834F000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page execute and read and write
|
||
29C3000
|
heap
|
page read and write
|
||
4944000
|
trusted library allocation
|
page read and write
|
||
3257000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
494B000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
7722000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
68CD000
|
stack
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
285C000
|
stack
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page execute and read and write
|
||
6DAB000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page execute and read and write
|
||
6BCD000
|
stack
|
page read and write
|
||
7F1F8000
|
trusted library allocation
|
page execute and read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
68E0000
|
heap
|
page execute and read and write
|
||
7D10000
|
heap
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
45B1000
|
trusted library allocation
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
4360000
|
heap
|
page execute and read and write
|
||
7A90000
|
trusted library allocation
|
page execute and read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
69FB000
|
stack
|
page read and write
|
||
702F000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
trusted library allocation
|
page execute and read and write
|
||
E2000
|
unkown
|
page readonly
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
756D000
|
stack
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page execute and read and write
|
||
6FA2000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
5D69000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
6C12000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
804D000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
890D000
|
stack
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page execute and read and write
|
||
5022000
|
trusted library allocation
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
1A8000
|
stack
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
4499000
|
trusted library allocation
|
page read and write
|
||
71BB000
|
stack
|
page read and write
|
||
727F000
|
heap
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
76A1000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4F36000
|
trusted library allocation
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
7C4C000
|
heap
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
8345000
|
heap
|
page read and write
|
||
8210000
|
trusted library allocation
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
43DB000
|
stack
|
page read and write
|
||
640000
|
trusted library section
|
page read and write
|
||
7031000
|
heap
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
790000
|
trusted library allocation
|
page execute and read and write
|
||
23F0000
|
heap
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page execute and read and write
|
||
21F0000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
4493000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page execute and read and write
|
||
21E4000
|
trusted library allocation
|
page read and write
|
||
7670000
|
heap
|
page execute and read and write
|
||
6B0000
|
heap
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
82D9000
|
heap
|
page read and write
|
||
4CBB000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
4966000
|
trusted library allocation
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
55BF000
|
trusted library allocation
|
page read and write
|
||
7FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
52DC000
|
trusted library allocation
|
page read and write
|
||
6EDE000
|
stack
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page execute and read and write
|
||
71C0000
|
heap
|
page read and write
|
||
992F000
|
stack
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
2210000
|
trusted library allocation
|
page read and write
|
||
6D2D000
|
heap
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
4275000
|
trusted library allocation
|
page execute and read and write
|
||
473C000
|
stack
|
page read and write
|
||
46E8000
|
trusted library allocation
|
page read and write
|
||
772B000
|
heap
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
7D08000
|
heap
|
page read and write
|
||
7E79000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library section
|
page readonly
|
||
717E000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
8160000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page execute and read and write
|
||
32B8000
|
heap
|
page read and write
|
||
6FF4000
|
heap
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
6AFA000
|
stack
|
page read and write
|
||
4E4C000
|
trusted library allocation
|
page read and write
|
||
6D7F000
|
heap
|
page read and write
|
||
639000
|
stack
|
page read and write
|
||
4539000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
221B000
|
trusted library allocation
|
page execute and read and write
|
||
730E000
|
stack
|
page read and write
|
||
76E4000
|
heap
|
page read and write
|
||
5D82000
|
trusted library allocation
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
5A0B000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
7250000
|
heap
|
page read and write
|
||
4E27000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4942000
|
trusted library allocation
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page execute and read and write
|
||
61C0000
|
trusted library allocation
|
page execute and read and write
|
||
10E6000
|
trusted library allocation
|
page execute and read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
8472000
|
trusted library allocation
|
page read and write
|
||
7028000
|
heap
|
page read and write
|
||
6DEC000
|
heap
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
2E1B000
|
heap
|
page read and write
|
||
6DB6000
|
heap
|
page read and write
|
||
72C3000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
6EA2000
|
heap
|
page read and write
|
||
82CC000
|
stack
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
heap
|
page read and write
|
||
477C000
|
stack
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
7D1F000
|
heap
|
page read and write
|
||
4272000
|
trusted library allocation
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
7C44000
|
heap
|
page read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
72C5000
|
heap
|
page execute and read and write
|
||
42FE000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4933000
|
heap
|
page read and write
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
778000
|
trusted library allocation
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
EE4000
|
trusted library allocation
|
page read and write
|
||
4972000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
72D3000
|
heap
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
831C000
|
heap
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
6D6C000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
7D21000
|
heap
|
page read and write
|
||
6AE3000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
828E000
|
stack
|
page read and write
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
4325000
|
heap
|
page execute and read and write
|
||
82B3000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
7FF3000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page execute and read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
2EE7000
|
heap
|
page read and write
|
||
8289000
|
heap
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
807E000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page execute and read and write
|
||
239F000
|
stack
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
719E000
|
stack
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
2D6A000
|
trusted library allocation
|
page execute and read and write
|
||
72C0000
|
heap
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
288E000
|
stack
|
page read and write
|
||
72D000
|
stack
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page execute and read and write
|
||
21D0000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
4320000
|
heap
|
page execute and read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
871D000
|
stack
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
76C4000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
1F9000
|
stack
|
page read and write
|
||
824D000
|
stack
|
page read and write
|
||
459C000
|
stack
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
8540000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
7FD30000
|
trusted library allocation
|
page execute and read and write
|
||
7E7F000
|
trusted library allocation
|
page read and write
|
||
1198000
|
trusted library allocation
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
583F000
|
stack
|
page read and write
|
||
2202000
|
trusted library allocation
|
page read and write
|
||
2250000
|
heap
|
page execute and read and write
|
||
28D0000
|
heap
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
6E6A000
|
stack
|
page read and write
|
||
2200000
|
trusted library allocation
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
6D49000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
6B93000
|
trusted library allocation
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
2206000
|
trusted library allocation
|
page execute and read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page execute and read and write
|
||
6170000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
4461000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
heap
|
page read and write
|
||
74D0000
|
heap
|
page read and write
|
||
4C94000
|
trusted library allocation
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
29D8000
|
heap
|
page read and write
|
||
35DE000
|
trusted library allocation
|
page read and write
|
||
56EB000
|
trusted library allocation
|
page read and write
|
||
6FED000
|
stack
|
page read and write
|
||
690B000
|
stack
|
page read and write
|
||
726D000
|
stack
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
71DA000
|
heap
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
2240000
|
trusted library allocation
|
page execute and read and write
|
||
EF6000
|
heap
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
7C54000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
10F7000
|
trusted library allocation
|
page execute and read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
482C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
There are 893 hidden memdumps, click here to show them.