Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jjjUC5ggb2nQMb1B6SvBkwmT.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\main\7z.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:52 2023,
atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\in.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp30F7.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp3107.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.bin
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\main.bat
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
|
"C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe"
|
||
C:\Users\user\AppData\Local\Temp\main\in.exe
|
"in.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mode.com
|
mode 65,10
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e file.zip -p324051139125346723019431074 -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_4.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_3.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_2.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_1.zip -oextracted
|
||
C:\Windows\System32\attrib.exe
|
attrib +H "in.exe"
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
23.94.183.150:5058
|
|||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
http://tempuri.org/Entity/Id14ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id23ResponseD
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://tempuri.org/Entity/Id9
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://tempuri.org/Entity/Id8
|
unknown
|
||
http://tempuri.org/Entity/Id6ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id5
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://tempuri.org/Entity/Id4
|
unknown
|
||
http://tempuri.org/Entity/Id7
|
unknown
|
||
http://tempuri.org/Entity/Id6
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://tempuri.org/Entity/Id19Response
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
http://tempuri.org/Entity/Id13ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
http://tempuri.org/Entity/Id5ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://tempuri.org/Entity/Id6Response
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://tempuri.org/Entity/Id1ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id9Response
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://tempuri.org/Entity/Id20
|
unknown
|
||
http://tempuri.org/Entity/Id21
|
unknown
|
||
http://tempuri.org/Entity/Id22
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id23
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id24
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://tempuri.org/Entity/Id1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://tempuri.org/Entity/Id21ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://tempuri.org/Entity/Id10
|
unknown
|
||
http://tempuri.org/Entity/Id11
|
unknown
|
||
http://tempuri.org/Entity/Id10ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id12
|
unknown
|
||
http://tempuri.org/Entity/Id16Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id13
|
unknown
|
||
http://tempuri.org/Entity/Id14
|
unknown
|
||
http://tempuri.org/Entity/Id15
|
unknown
|
||
http://tempuri.org/Entity/Id16
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://tempuri.org/Entity/Id17
|
unknown
|
||
http://tempuri.org/Entity/Id18
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://tempuri.org/Entity/Id19
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://tempuri.org/Entity/Id15ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://tempuri.org/Entity/Id11ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.94.183.150
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
422000
|
unkown
|
page readonly
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
direct allocation
|
page read and write
|
||
3DC1000
|
trusted library allocation
|
page read and write
|
||
22024F30000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
93E4000
|
heap
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
6986000
|
trusted library allocation
|
page read and write
|
||
98EE000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
6D2B000
|
stack
|
page read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
3D52000
|
trusted library allocation
|
page read and write
|
||
947E000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
215B7BD0000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
6992000
|
trusted library allocation
|
page read and write
|
||
128D5490000
|
heap
|
page read and write
|
||
38FF000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
trusted library allocation
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
2F8C000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
3DE2000
|
trusted library allocation
|
page read and write
|
||
3D6C000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
128D5560000
|
heap
|
page read and write
|
||
60BF000
|
stack
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
3B7B000
|
trusted library allocation
|
page read and write
|
||
22023560000
|
heap
|
page read and write
|
||
3DD1000
|
trusted library allocation
|
page read and write
|
||
E03000
|
trusted library allocation
|
page read and write
|
||
215B6410000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
93EC000
|
heap
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
65F5000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
3C72000
|
trusted library allocation
|
page read and write
|
||
9890000
|
trusted library allocation
|
page execute and read and write
|
||
4E30000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
61FF000
|
stack
|
page read and write
|
||
3B22000
|
trusted library allocation
|
page read and write
|
||
8A65000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
3C42000
|
trusted library allocation
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2F96000
|
trusted library allocation
|
page read and write
|
||
697B000
|
trusted library allocation
|
page read and write
|
||
128D54D0000
|
direct allocation
|
page read and write
|
||
215B7D40000
|
direct allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
20F75FE000
|
stack
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
94C0000
|
heap
|
page read and write
|
||
2CD5000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
stack
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
1E748E50000
|
heap
|
page read and write
|
||
9552000
|
heap
|
page read and write
|
||
3CE7000
|
trusted library allocation
|
page read and write
|
||
68D0000
|
direct allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
trusted library allocation
|
page read and write
|
||
435000
|
unkown
|
page readonly
|
||
BEE000
|
stack
|
page read and write
|
||
3925000
|
trusted library allocation
|
page read and write
|
||
8A90000
|
trusted library allocation
|
page execute and read and write
|
||
3D49000
|
trusted library allocation
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page execute and read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
3CDA000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
93B0000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
4E12000
|
trusted library allocation
|
page read and write
|
||
BD33D2D000
|
stack
|
page read and write
|
||
2DFB000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
direct allocation
|
page read and write
|
||
3D44000
|
trusted library allocation
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
3945000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
20F713D000
|
stack
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
64CC000
|
direct allocation
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
30B7000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
trusted library allocation
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
3B8C000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page write copy
|
||
30C8000
|
trusted library allocation
|
page read and write
|
||
3C6D000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
3C94000
|
trusted library allocation
|
page read and write
|
||
9492000
|
heap
|
page read and write
|
||
80C21FF000
|
stack
|
page read and write
|
||
226A2330000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
128D5555000
|
heap
|
page read and write
|
||
6A6C000
|
trusted library allocation
|
page read and write
|
||
3CA7000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page execute and read and write
|
||
9C4E000
|
stack
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
950F000
|
heap
|
page read and write
|
||
3DB5000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page execute and read and write
|
||
450000
|
unkown
|
page readonly
|
||
3DA4000
|
trusted library allocation
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
3D85000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
2E73000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6D86000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
940E000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
226A2470000
|
direct allocation
|
page read and write
|
||
3C1A000
|
trusted library allocation
|
page read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library section
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
1000FC000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
3D0D000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
2B94000
|
trusted library allocation
|
page read and write
|
||
22023640000
|
heap
|
page read and write
|
||
215B7E40000
|
direct allocation
|
page read and write
|
||
E15F7FE000
|
stack
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
3B4D000
|
trusted library allocation
|
page read and write
|
||
128D3BC0000
|
heap
|
page read and write
|
||
3B5D000
|
trusted library allocation
|
page read and write
|
||
6D83000
|
trusted library allocation
|
page read and write
|
||
94B1000
|
heap
|
page read and write
|
||
2E06000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
529D000
|
heap
|
page read and write
|
||
3BBF000
|
trusted library allocation
|
page read and write
|
||
226A0A40000
|
heap
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
52B9000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4D7E000
|
trusted library allocation
|
page read and write
|
||
3B41000
|
trusted library allocation
|
page read and write
|
||
3C35000
|
trusted library allocation
|
page read and write
|
||
3C68000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
128D3AE0000
|
heap
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page execute and read and write
|
||
22025030000
|
direct allocation
|
page read and write
|
||
9970000
|
trusted library allocation
|
page read and write
|
||
E12000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
4D6B000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
93D5000
|
heap
|
page read and write
|
||
3D92000
|
trusted library allocation
|
page read and write
|
||
1E748E10000
|
heap
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
94D2000
|
heap
|
page read and write
|
||
531E000
|
heap
|
page read and write
|
||
956A000
|
heap
|
page read and write
|
||
5ACC000
|
direct allocation
|
page read and write
|
||
3BD8000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
3BF7000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
96C0000
|
heap
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
3910000
|
trusted library allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
992E000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
8A78000
|
trusted library allocation
|
page read and write
|
||
3C9E000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
900000
|
heap
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
65FA000
|
trusted library allocation
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
1E748E55000
|
heap
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
3B84000
|
trusted library allocation
|
page read and write
|
||
9D4E000
|
stack
|
page read and write
|
||
996E000
|
stack
|
page read and write
|
||
3B87000
|
trusted library allocation
|
page read and write
|
||
988E000
|
stack
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page execute and read and write
|
||
9470000
|
heap
|
page read and write
|
||
2EAC000
|
trusted library allocation
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
3D13000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page execute and read and write
|
||
25AE000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
220250B0000
|
direct allocation
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
22023740000
|
heap
|
page read and write
|
||
226A2450000
|
direct allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
890F000
|
stack
|
page read and write
|
||
3DB1000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
3D33000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
3046000
|
trusted library allocation
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
6F65000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
9539000
|
heap
|
page read and write
|
||
6DA0000
|
heap
|
page read and write
|
||
E0D000
|
trusted library allocation
|
page execute and read and write
|
||
96AD000
|
stack
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
6981000
|
trusted library allocation
|
page read and write
|
||
28C1000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page execute and read and write
|
||
450000
|
unkown
|
page readonly
|
||
3C56000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
trusted library allocation
|
page read and write
|
||
93F5000
|
heap
|
page read and write
|
||
215B7BF0000
|
direct allocation
|
page read and write
|
||
94F4000
|
heap
|
page read and write
|
||
942D000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page write copy
|
||
60FE000
|
stack
|
page read and write
|
||
3BDD000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
7E4ADFE000
|
stack
|
page read and write
|
||
2FA2000
|
trusted library allocation
|
page read and write
|
||
6F6B000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E15F6FC000
|
stack
|
page read and write
|
||
226A2440000
|
heap
|
page read and write
|
||
2B28AA40000
|
heap
|
page read and write
|
||
128D54B0000
|
direct allocation
|
page read and write
|
||
E2B000
|
trusted library allocation
|
page execute and read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
94E7000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
1E74A940000
|
direct allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
69A1000
|
trusted library allocation
|
page read and write
|
||
8990000
|
trusted library allocation
|
page execute and read and write
|
||
96B0000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
215B6240000
|
heap
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page read and write
|
||
2EC9000
|
trusted library allocation
|
page read and write
|
||
220250A5000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page write copy
|
||
89E0000
|
trusted library allocation
|
page read and write
|
||
6CEC000
|
stack
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
1E748E80000
|
direct allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
20F74FE000
|
stack
|
page read and write
|
||
4D5F000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
27B8000
|
heap
|
page read and write
|
||
4D3E000
|
trusted library allocation
|
page read and write
|
||
980E000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
3D58000
|
trusted library allocation
|
page read and write
|
||
9446000
|
heap
|
page read and write
|
||
3942000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
1004FE000
|
stack
|
page read and write
|
||
93FE000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
94CC000
|
heap
|
page read and write
|
||
3965000
|
trusted library allocation
|
page read and write
|
||
93CD000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page read and write
|
||
3DD8000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
trusted library allocation
|
page read and write
|
||
3CFB000
|
trusted library allocation
|
page read and write
|
||
984F000
|
stack
|
page read and write
|
||
1E748ED0000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page execute and read and write
|
||
220250A0000
|
heap
|
page read and write
|
||
3B99000
|
trusted library allocation
|
page read and write
|
||
128D3CC0000
|
heap
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
226A0960000
|
heap
|
page read and write
|
||
215B7C10000
|
direct allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
2B28AC10000
|
heap
|
page read and write
|
||
2F3A000
|
trusted library allocation
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
6AAA000
|
direct allocation
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
394A000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
2B28AA20000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
3CA4000
|
trusted library allocation
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
trusted library allocation
|
page read and write
|
||
3D2D000
|
trusted library allocation
|
page read and write
|
||
226A2445000
|
heap
|
page read and write
|
||
6F32000
|
trusted library allocation
|
page read and write
|
||
128D3BCB000
|
heap
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
4D8D000
|
trusted library allocation
|
page read and write
|
||
39A6000
|
trusted library allocation
|
page read and write
|
||
8A69000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
49F000
|
unkown
|
page readonly
|
||
9E0000
|
heap
|
page read and write
|
||
22025050000
|
direct allocation
|
page read and write
|
||
E25000
|
trusted library allocation
|
page execute and read and write
|
||
3B67000
|
trusted library allocation
|
page read and write
|
||
2202364B000
|
heap
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
2FE8000
|
trusted library allocation
|
page read and write
|
||
699E000
|
trusted library allocation
|
page read and write
|
||
2F43000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2B28AA10000
|
heap
|
page read and write
|
||
3DDE000
|
trusted library allocation
|
page read and write
|
||
38ED000
|
trusted library allocation
|
page read and write
|
||
2B28AD20000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
3DCB000
|
trusted library allocation
|
page read and write
|
||
3BB2000
|
trusted library allocation
|
page read and write
|
||
2D68000
|
trusted library allocation
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
26D0000
|
direct allocation
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
2E8D000
|
trusted library allocation
|
page read and write
|
||
3B15000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2411000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
3C22000
|
trusted library allocation
|
page read and write
|
||
3C04000
|
trusted library allocation
|
page read and write
|
||
94D9000
|
heap
|
page read and write
|
||
226A2430000
|
direct allocation
|
page read and write
|
||
26CE000
|
stack
|
page read and write
|
||
2EB3000
|
trusted library allocation
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
3E48000
|
trusted library allocation
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
215B7C40000
|
heap
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
2E9A000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page read and write
|
||
E16000
|
trusted library allocation
|
page execute and read and write
|
||
8A60000
|
trusted library allocation
|
page read and write
|
||
682D000
|
stack
|
page read and write
|
||
3D4D000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page write copy
|
||
2F4B000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
80C22FF000
|
stack
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
3C14000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
heap
|
page read and write
|
||
93FA000
|
heap
|
page read and write
|
||
3D4F000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2F73000
|
trusted library allocation
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
1E748E00000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
656E000
|
direct allocation
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
BD33CAC000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
645E000
|
stack
|
page read and write
|
||
E15F8FE000
|
stack
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
3BED000
|
trusted library allocation
|
page read and write
|
||
2CDA000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
3C29000
|
trusted library allocation
|
page read and write
|
||
635D000
|
stack
|
page read and write
|
||
226A0A60000
|
heap
|
page read and write
|
||
1E748EDB000
|
heap
|
page read and write
|
||
2411000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
3CF4000
|
trusted library allocation
|
page read and write
|
||
1E748E60000
|
heap
|
page read and write
|
||
39D0000
|
direct allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
7F8B0000
|
trusted library allocation
|
page execute and read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
BD3407E000
|
stack
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
3D18000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
A000000
|
heap
|
page read and write
|
||
8BB0000
|
trusted library allocation
|
page read and write
|
||
9521000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
3C4F000
|
trusted library allocation
|
page read and write
|
||
8A85000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
direct allocation
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
3C8E000
|
trusted library allocation
|
page read and write
|
||
67AC000
|
stack
|
page read and write
|
||
3C17000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
trusted library allocation
|
page read and write
|
||
7E4ACFE000
|
stack
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
302A000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
522C000
|
heap
|
page read and write
|
||
2B28AA4B000
|
heap
|
page read and write
|
||
215B7C35000
|
heap
|
page read and write
|
||
1E748E40000
|
direct allocation
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
215B7C30000
|
heap
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
215B6220000
|
heap
|
page read and write
|
||
3994000
|
trusted library allocation
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
6F35000
|
trusted library allocation
|
page read and write
|
||
3C1C000
|
trusted library allocation
|
page read and write
|
||
3CAC000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
E22000
|
trusted library allocation
|
page read and write
|
||
3932000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
4BF000
|
unkown
|
page readonly
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
3B7E000
|
trusted library allocation
|
page read and write
|
||
3018000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
59A000
|
stack
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
3AA7000
|
trusted library allocation
|
page read and write
|
||
3D5C000
|
trusted library allocation
|
page read and write
|
||
3C7D000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page execute and read and write
|
||
450000
|
unkown
|
page readonly
|
||
49F000
|
unkown
|
page readonly
|
||
264E000
|
stack
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
38D3000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
8A7F000
|
trusted library allocation
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
2415000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
E27000
|
trusted library allocation
|
page execute and read and write
|
||
4D86000
|
trusted library allocation
|
page read and write
|
||
65F8000
|
trusted library allocation
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
3D23000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
4E24000
|
heap
|
page read and write
|
||
49F000
|
unkown
|
page readonly
|
||
8A8A000
|
trusted library allocation
|
page read and write
|
||
BD33DAF000
|
stack
|
page read and write
|
||
50CC000
|
direct allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
94A0000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
6BEC000
|
stack
|
page read and write
|
||
69AA000
|
trusted library allocation
|
page read and write
|
||
944C000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
6F6E000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
9556000
|
heap
|
page read and write
|
||
2658000
|
trusted library allocation
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
295C000
|
trusted library allocation
|
page read and write
|
||
94DD000
|
heap
|
page read and write
|
||
272C000
|
stack
|
page read and write
|
||
3BD1000
|
trusted library allocation
|
page read and write
|
||
2B28AD25000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
2D4E000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
trusted library allocation
|
page read and write
|
||
527A000
|
heap
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page execute and read and write
|
||
3D3A000
|
trusted library allocation
|
page read and write
|
||
1E74A840000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
5226000
|
heap
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
2BAB000
|
trusted library allocation
|
page read and write
|
||
2E6B000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
6D94000
|
trusted library allocation
|
page read and write
|
||
94D7000
|
heap
|
page read and write
|
||
7E4A9FC000
|
stack
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page readonly
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
3DFA000
|
trusted library allocation
|
page read and write
|
||
8A8F000
|
trusted library allocation
|
page read and write
|
||
3B92000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
9433000
|
heap
|
page read and write
|
||
3CB2000
|
trusted library allocation
|
page read and write
|
||
300B000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
4E9000
|
unkown
|
page readonly
|
||
4BC000
|
unkown
|
page read and write
|
||
3C87000
|
trusted library allocation
|
page read and write
|
||
3AC8000
|
trusted library allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page execute and read and write
|
||
26D0000
|
direct allocation
|
page read and write
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
94F8000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
3B2F000
|
trusted library allocation
|
page read and write
|
||
393C000
|
trusted library allocation
|
page read and write
|
||
6F51000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
heap
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
3E1F000
|
trusted library allocation
|
page read and write
|
||
3CAA000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3906000
|
trusted library allocation
|
page read and write
|
||
128D5550000
|
heap
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
67EC000
|
stack
|
page read and write
|
||
2E61000
|
trusted library allocation
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
226A2310000
|
heap
|
page read and write
|
||
4BF000
|
unkown
|
page readonly
|
||
4BF000
|
unkown
|
page readonly
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
3B8A000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
3B48000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
80C20FD000
|
stack
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
4F8000
|
unkown
|
page readonly
|
||
5100000
|
trusted library allocation
|
page execute and read and write
|
||
3DAB000
|
trusted library allocation
|
page read and write
|
||
941E000
|
heap
|
page read and write
|
||
3CB7000
|
trusted library allocation
|
page read and write
|
||
3B52000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
3DED000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page execute and read and write
|
||
4E47000
|
trusted library allocation
|
page read and write
|
||
3948000
|
trusted library allocation
|
page read and write
|
||
2550000
|
direct allocation
|
page read and write
|
||
3D06000
|
trusted library allocation
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
3BA5000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page write copy
|
||
3C9B000
|
trusted library allocation
|
page read and write
|
||
226A0A4A000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
66AA000
|
stack
|
page read and write
|
||
22024F10000
|
heap
|
page read and write
|
||
226A0B40000
|
heap
|
page read and write
|
||
2416000
|
heap
|
page read and write
|
||
215B624B000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page execute and read and write
|
||
2BF1000
|
trusted library allocation
|
page read and write
|
||
3B36000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
There are 672 hidden memdumps, click here to show them.