Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
S1qgnlqr1V.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_S1qgnlqr1V.exe_154b5bc2c27c2c66339f0b82a5790485a67d77_77b60c57_56b8f93c-6740-4b23-892a-7c4176431c0b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\S1qgnlqr1V.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp5791.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6553.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6583.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC346.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Oct 29 09:18:21 2024, 0x1205a4 type
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dnshost.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3p3ul2mh.cvw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ew4cfgm.cmq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4o20lfje.dzr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfbfqfap.5mo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_guctlh1m.ked.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcttykkr.kgg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxynaech.udj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lyaytfz0.uww.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omybhyip.jhh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wj5e1saj.hif.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0xjcvet.dmh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1kg522k.22f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\catalog.dat
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\task.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\S1qgnlqr1V.exe
|
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
|
||
C:\Users\user\Desktop\S1qgnlqr1V.exe
|
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5791.tmp"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp5BA8.tmp"
|
||
C:\Users\user\Desktop\S1qgnlqr1V.exe
|
C:\Users\user\Desktop\S1qgnlqr1V.exe 0
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
"C:\Program Files (x86)\DNS Host\dnshost.exe" 0
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\S1qgnlqr1V.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
|
||
C:\Users\user\Desktop\S1qgnlqr1V.exe
|
"C:\Users\user\Desktop\S1qgnlqr1V.exe"
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
"C:\Program Files (x86)\DNS Host\dnshost.exe"
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
"C:\Program Files (x86)\DNS Host\dnshost.exe"
|
||
C:\Program Files (x86)\DNS Host\dnshost.exe
|
"C:\Program Files (x86)\DNS Host\dnshost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 1756
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
66.63.187.113
|
|||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
66.63.187.113
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
DNS Host
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
ProgramId
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
FileId
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
LowerCaseLongPath
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
LongPathHash
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Name
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
OriginalFileName
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Publisher
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Version
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
BinFileVersion
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
BinaryType
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
ProductName
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
ProductVersion
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
LinkDate
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
BinProductVersion
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
AppxPackageFullName
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Size
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Language
|
||
\REGISTRY\A\{89f3d2ca-2cfc-3557-c7f2-1b30ca7429cc}\Root\InventoryApplicationFile\s1qgnlqr1v.exe|c622d27f2c758663
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
32A1000
|
trusted library allocation
|
page read and write
|
||
3BDC000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
410B000
|
trusted library allocation
|
page read and write
|
||
41EA000
|
trusted library allocation
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
4B9C000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library section
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page execute and read and write
|
||
4E90000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page execute and read and write
|
||
3174000
|
trusted library allocation
|
page read and write
|
||
4337000
|
trusted library allocation
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
DA30000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
32E3000
|
heap
|
page read and write
|
||
20DA000
|
trusted library allocation
|
page execute and read and write
|
||
32B4000
|
trusted library allocation
|
page read and write
|
||
5A2000
|
unkown
|
page readonly
|
||
699E000
|
stack
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
2379000
|
trusted library allocation
|
page read and write
|
||
1E9000
|
stack
|
page read and write
|
||
5415000
|
heap
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
B34000
|
heap
|
page read and write
|
||
5A30000
|
trusted library section
|
page readonly
|
||
32C0000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
839000
|
stack
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
D7AF000
|
stack
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
5CAD000
|
stack
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
D12E000
|
stack
|
page read and write
|
||
3C39000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
634D000
|
stack
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
1544000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
5A50000
|
heap
|
page read and write
|
||
7EF20000
|
trusted library allocation
|
page execute and read and write
|
||
5080000
|
heap
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page execute and read and write
|
||
937000
|
stack
|
page read and write
|
||
C9BF000
|
stack
|
page read and write
|
||
1076000
|
trusted library allocation
|
page read and write
|
||
31AB000
|
trusted library allocation
|
page read and write
|
||
491E000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
3D85000
|
trusted library allocation
|
page read and write
|
||
51C9000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
28D5000
|
trusted library allocation
|
page read and write
|
||
D7EE000
|
stack
|
page read and write
|
||
C54000
|
trusted library allocation
|
page read and write
|
||
3D95000
|
trusted library allocation
|
page read and write
|
||
763D000
|
trusted library allocation
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
65FE000
|
heap
|
page read and write
|
||
C6A000
|
stack
|
page read and write
|
||
70F000
|
unkown
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
BA4F000
|
stack
|
page read and write
|
||
714000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page execute and read and write
|
||
F3E000
|
stack
|
page read and write
|
||
9F60000
|
trusted library section
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
4E5B000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
B5A000
|
stack
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page execute and read and write
|
||
761000
|
heap
|
page read and write
|
||
4921000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
5186000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
184C000
|
stack
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
CFE0000
|
trusted library allocation
|
page execute and read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
20D2000
|
trusted library allocation
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
507B000
|
stack
|
page read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
CC0E000
|
stack
|
page read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
3DFC000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
967D000
|
stack
|
page read and write
|
||
BD3E000
|
stack
|
page read and write
|
||
3332000
|
trusted library allocation
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
1543000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
8D5C000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
41A7000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
5761000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page execute and read and write
|
||
B83000
|
trusted library allocation
|
page execute and read and write
|
||
CC7B000
|
stack
|
page read and write
|
||
14D3000
|
trusted library allocation
|
page execute and read and write
|
||
32B6000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
trusted library allocation
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
4320000
|
trusted library allocation
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
14FA000
|
trusted library allocation
|
page execute and read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
15A6000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
9050000
|
heap
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
15C2000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
7558000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5A2B000
|
stack
|
page read and write
|
||
2100000
|
trusted library allocation
|
page read and write
|
||
31CC000
|
trusted library allocation
|
page read and write
|
||
70CD000
|
stack
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
154D000
|
trusted library allocation
|
page execute and read and write
|
||
4A4C000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page execute and read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
531D000
|
stack
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
7FB60000
|
trusted library allocation
|
page execute and read and write
|
||
1560000
|
heap
|
page execute and read and write
|
||
57B0000
|
heap
|
page read and write
|
||
BE3F000
|
stack
|
page read and write
|
||
437C000
|
stack
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
707000
|
heap
|
page read and write
|
||
98BE000
|
stack
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
trusted library allocation
|
page execute and read and write
|
||
5731000
|
trusted library allocation
|
page read and write
|
||
BBFE000
|
stack
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page execute and read and write
|
||
3DD000
|
stack
|
page read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
E92000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
stack
|
page read and write
|
||
97BE000
|
stack
|
page read and write
|
||
2385000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
3142000
|
trusted library allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
5AD0000
|
heap
|
page execute and read and write
|
||
26CE000
|
stack
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
C83E000
|
stack
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
2226000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
71D000
|
trusted library allocation
|
page execute and read and write
|
||
CBE000
|
heap
|
page read and write
|
||
3CC6000
|
trusted library allocation
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
5223000
|
heap
|
page read and write
|
||
119D000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
CAC0000
|
trusted library allocation
|
page read and write
|
||
1544000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
67DD000
|
unkown
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
F1A000
|
stack
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
trusted library allocation
|
page read and write
|
||
6E3A000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
15B9000
|
heap
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
1830000
|
trusted library allocation
|
page execute and read and write
|
||
4926000
|
trusted library allocation
|
page read and write
|
||
7FC60000
|
trusted library allocation
|
page execute and read and write
|
||
5A90000
|
trusted library allocation
|
page execute and read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
155C000
|
trusted library allocation
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
3E0C000
|
trusted library allocation
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
3C19000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
C9FE000
|
stack
|
page read and write
|
||
576D000
|
stack
|
page read and write
|
||
2224000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
trusted library allocation
|
page read and write
|
||
16F7000
|
heap
|
page read and write
|
||
1082000
|
trusted library allocation
|
page read and write
|
||
E86000
|
trusted library allocation
|
page execute and read and write
|
||
1485000
|
heap
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
trusted library allocation
|
page execute and read and write
|
||
4D50000
|
heap
|
page read and write
|
||
20D6000
|
trusted library allocation
|
page execute and read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
17A4000
|
trusted library allocation
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
937000
|
stack
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library section
|
page read and write
|
||
2220000
|
trusted library allocation
|
page read and write
|
||
16DD000
|
trusted library allocation
|
page execute and read and write
|
||
543D000
|
stack
|
page read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
3C29000
|
trusted library allocation
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
51B2000
|
trusted library allocation
|
page read and write
|
||
A38D000
|
stack
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
333C000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
1530000
|
trusted library allocation
|
page execute and read and write
|
||
12F8000
|
stack
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
9D90000
|
heap
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
447B000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5736000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
CAFE000
|
stack
|
page read and write
|
||
2746000
|
trusted library allocation
|
page read and write
|
||
4301000
|
trusted library allocation
|
page read and write
|
||
20EB000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
BA6000
|
trusted library allocation
|
page execute and read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
D56E000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2341000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
trusted library allocation
|
page execute and read and write
|
||
654E000
|
stack
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1546000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page execute and read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
78EF000
|
stack
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
6FCD000
|
stack
|
page read and write
|
||
17BC000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
DA2C000
|
stack
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
3D75000
|
trusted library allocation
|
page read and write
|
||
106E000
|
trusted library allocation
|
page read and write
|
||
15AD000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
1608000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
7430000
|
heap
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page execute and read and write
|
||
4E20000
|
heap
|
page read and write
|
||
95DE000
|
stack
|
page read and write
|
||
5270000
|
trusted library allocation
|
page execute and read and write
|
||
415F000
|
trusted library allocation
|
page read and write
|
||
2D0B000
|
trusted library allocation
|
page read and write
|
||
D02E000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
490B000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
3191000
|
trusted library allocation
|
page read and write
|
||
BE7B000
|
stack
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
B8D000
|
trusted library allocation
|
page execute and read and write
|
||
161B000
|
heap
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
51AD000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
C5D000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page execute and read and write
|
||
5772000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
3D1D000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
BABE000
|
stack
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
FB8000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
175A000
|
trusted library allocation
|
page read and write
|
||
CB3E000
|
stack
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
5672000
|
trusted library allocation
|
page read and write
|
||
6F3C000
|
stack
|
page read and write
|
||
257B000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
195F000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
98FE000
|
stack
|
page read and write
|
||
D8EE000
|
stack
|
page read and write
|
||
1740000
|
trusted library allocation
|
page execute and read and write
|
||
12F7000
|
stack
|
page read and write
|
||
5742000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
stack
|
page read and write
|
||
C9B000
|
stack
|
page read and write
|
||
624E000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
139D000
|
trusted library allocation
|
page execute and read and write
|
||
977E000
|
stack
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
5766000
|
trusted library allocation
|
page read and write
|
||
2BF7000
|
heap
|
page read and write
|
||
31AD000
|
trusted library allocation
|
page read and write
|
||
1859000
|
trusted library allocation
|
page read and write
|
||
13AA000
|
trusted library allocation
|
page execute and read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
296B000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
trusted library allocation
|
page execute and read and write
|
||
BBBE000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
3951000
|
trusted library allocation
|
page read and write
|
||
1384000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page execute and read and write
|
||
2160000
|
trusted library allocation
|
page execute and read and write
|
||
16C3000
|
trusted library allocation
|
page execute and read and write
|
||
1040000
|
heap
|
page read and write
|
||
4E7D000
|
trusted library allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1755000
|
trusted library allocation
|
page read and write
|
||
124C000
|
stack
|
page read and write
|
||
D28E000
|
stack
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4F80000
|
trusted library section
|
page readonly
|
||
AA8000
|
heap
|
page read and write
|
||
5A00000
|
heap
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page execute and read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page execute and read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
BBB000
|
trusted library allocation
|
page execute and read and write
|
||
B84000
|
trusted library allocation
|
page read and write
|
||
4305000
|
trusted library allocation
|
page read and write
|
||
492D000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
316D000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
6E3F000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page execute and read and write
|
||
B94000
|
heap
|
page read and write
|
||
6091000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
31CE000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
7F050000
|
trusted library allocation
|
page execute and read and write
|
||
353B000
|
trusted library allocation
|
page read and write
|
||
CC3F000
|
stack
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
78EF000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
679E000
|
unkown
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
20E2000
|
trusted library allocation
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
stack
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
681D000
|
unkown
|
page read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
7F8F0000
|
trusted library allocation
|
page execute and read and write
|
||
5184000
|
trusted library allocation
|
page read and write
|
||
3C49000
|
trusted library allocation
|
page read and write
|
||
312E000
|
trusted library allocation
|
page read and write
|
||
127F000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
3879000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
138D000
|
trusted library allocation
|
page execute and read and write
|
||
20C3000
|
trusted library allocation
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
418B000
|
trusted library allocation
|
page read and write
|
||
303E000
|
unkown
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
42EF000
|
trusted library allocation
|
page read and write
|
||
E8A000
|
trusted library allocation
|
page execute and read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
1735000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page execute and read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
710000
|
trusted library allocation
|
page read and write
|
||
237C000
|
trusted library allocation
|
page read and write
|
||
9B9E000
|
stack
|
page read and write
|
||
A10D000
|
stack
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
D18E000
|
stack
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
7F170000
|
trusted library allocation
|
page execute and read and write
|
||
2200000
|
trusted library allocation
|
page execute and read and write
|
||
6D40000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
1587000
|
trusted library allocation
|
page execute and read and write
|
||
20C0000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
D52E000
|
stack
|
page read and write
|
||
3B97000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
5677000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library section
|
page readonly
|
||
286E000
|
stack
|
page read and write
|
||
BF80000
|
trusted library allocation
|
page read and write
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
2951000
|
trusted library allocation
|
page read and write
|
||
1383000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
F86000
|
trusted library allocation
|
page execute and read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
105B000
|
trusted library allocation
|
page read and write
|
||
C8BE000
|
stack
|
page read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
158D000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
521B000
|
stack
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
2372000
|
trusted library allocation
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
D42D000
|
stack
|
page read and write
|
||
16CD000
|
trusted library allocation
|
page execute and read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
CD7D000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
C64E000
|
stack
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
20E7000
|
trusted library allocation
|
page execute and read and write
|
||
572E000
|
trusted library allocation
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
518B000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
CB0E000
|
stack
|
page read and write
|
||
6425000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
9C9D000
|
stack
|
page read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
32D5000
|
trusted library allocation
|
page read and write
|
||
3C4B000
|
trusted library allocation
|
page read and write
|
||
4FF5000
|
heap
|
page read and write
|
||
574B000
|
trusted library allocation
|
page read and write
|
||
76DD000
|
heap
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
3C81000
|
trusted library allocation
|
page read and write
|
||
4E7D000
|
stack
|
page read and write
|
||
107D000
|
trusted library allocation
|
page read and write
|
||
307F000
|
unkown
|
page read and write
|
||
713000
|
trusted library allocation
|
page execute and read and write
|
||
76B8000
|
heap
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
3C69000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
3338000
|
trusted library allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
16E6000
|
trusted library allocation
|
page execute and read and write
|
||
68B8000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
507C000
|
stack
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
3210000
|
trusted library allocation
|
page execute and read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
1626000
|
heap
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
16FB000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
4878000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
519E000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page execute and read and write
|
||
71BC000
|
stack
|
page read and write
|
||
4955000
|
trusted library allocation
|
page read and write
|
||
D6AE000
|
stack
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
3890000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
stack
|
page read and write
|
||
4A83000
|
heap
|
page read and write
|
||
608F000
|
stack
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
6740000
|
heap
|
page read and write
|
||
5813000
|
heap
|
page read and write
|
||
687D000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page execute and read and write
|
||
502000
|
unkown
|
page readonly
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
4E95000
|
trusted library allocation
|
page read and write
|
||
839000
|
stack
|
page read and write
|
||
4E6E000
|
trusted library allocation
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library section
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
EE7000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page execute and read and write
|
||
9FCD000
|
stack
|
page read and write
|
||
5570000
|
trusted library section
|
page read and write
|
||
5A40000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page execute and read and write
|
||
1415000
|
heap
|
page read and write
|
||
6763000
|
heap
|
page read and write
|
||
172C000
|
stack
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
9ECD000
|
stack
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page execute and read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
4E03000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
643F000
|
unkown
|
page read and write
|
||
500D000
|
trusted library allocation
|
page read and write
|
||
127C000
|
trusted library allocation
|
page read and write
|
||
17BF000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
6CFC000
|
stack
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
1071000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
16C4000
|
trusted library allocation
|
page read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
1553000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
A3CD000
|
stack
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
FD9000
|
stack
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
3C09000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
B93000
|
trusted library allocation
|
page read and write
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
4E76000
|
trusted library allocation
|
page read and write
|
||
16F2000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
431B000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
7530000
|
heap
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
62B0000
|
heap
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
CD80000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
4D60000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
20CD000
|
trusted library allocation
|
page execute and read and write
|
||
16EA000
|
trusted library allocation
|
page execute and read and write
|
||
703D000
|
stack
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
4149000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
4C5B000
|
stack
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
9AAB000
|
trusted library allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
62A0000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
58A3000
|
heap
|
page read and write
|
||
7694000
|
heap
|
page read and write
|
||
D66E000
|
stack
|
page read and write
|
||
155F000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
E7D000
|
trusted library allocation
|
page execute and read and write
|
||
51C5000
|
trusted library allocation
|
page read and write
|
||
F63000
|
trusted library allocation
|
page execute and read and write
|
||
540E000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
C53000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
CAC3000
|
trusted library allocation
|
page read and write
|
||
16EF000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page execute and read and write
|
||
756C000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
F8A000
|
trusted library allocation
|
page execute and read and write
|
||
7A7000
|
heap
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
5010000
|
trusted library allocation
|
page execute and read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1576000
|
trusted library allocation
|
page execute and read and write
|
||
1840000
|
heap
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page execute and read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
688B000
|
heap
|
page read and write
|
||
173A000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
3DEC000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
4309000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
BB7000
|
trusted library allocation
|
page execute and read and write
|
||
6D55000
|
heap
|
page read and write
|
||
1855000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
77A0000
|
trusted library allocation
|
page execute and read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
70F2000
|
trusted library allocation
|
page read and write
|
||
CD83000
|
trusted library allocation
|
page read and write
|
||
16EC000
|
trusted library allocation
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
CD0F000
|
stack
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
270C000
|
stack
|
page read and write
|
||
53FB000
|
stack
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
157A000
|
trusted library allocation
|
page execute and read and write
|
||
FCE000
|
stack
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
BF83000
|
trusted library allocation
|
page read and write
|
||
E97000
|
trusted library allocation
|
page execute and read and write
|
||
52C0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
BF7C000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7F9B0000
|
trusted library allocation
|
page execute and read and write
|
||
16D4000
|
trusted library allocation
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
4932000
|
trusted library allocation
|
page read and write
|
||
934E000
|
stack
|
page read and write
|
||
6D58000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
A00D000
|
stack
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page execute and read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
32C7000
|
heap
|
page read and write
|
||
E73000
|
trusted library allocation
|
page read and write
|
||
4E42000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
5801000
|
trusted library allocation
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
D65000
|
stack
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page execute and read and write
|
||
5780000
|
heap
|
page execute and read and write
|
||
4A65000
|
heap
|
page read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
182C000
|
stack
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
6C9F000
|
stack
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
B85E000
|
stack
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page execute and read and write
|
||
6DFD000
|
stack
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
7546000
|
heap
|
page read and write
|
||
924E000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page execute and read and write
|
||
40C7000
|
trusted library allocation
|
page read and write
|
||
158B000
|
trusted library allocation
|
page execute and read and write
|
||
4B57000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
DA33000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
2744000
|
trusted library allocation
|
page read and write
|
||
620F000
|
stack
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
4339000
|
trusted library allocation
|
page read and write
|
||
F97000
|
trusted library allocation
|
page execute and read and write
|
||
2210000
|
trusted library allocation
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
BCFE000
|
stack
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
16D6000
|
trusted library allocation
|
page read and write
|
||
D92C000
|
stack
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1582000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page execute and read and write
|
||
57B3000
|
heap
|
page read and write
|
||
B9D000
|
trusted library allocation
|
page execute and read and write
|
||
16F7000
|
trusted library allocation
|
page execute and read and write
|
||
186F000
|
stack
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
4175000
|
trusted library allocation
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
651F000
|
stack
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
7F8C0000
|
trusted library allocation
|
page execute and read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
674D000
|
heap
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
trusted library allocation
|
page execute and read and write
|
||
49E2000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
There are 977 hidden memdumps, click here to show them.