Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Lipras\pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eedb0q4n.0qa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhjbkeew.l3p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncja2tgz.kc0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3rtzpbz.xok.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vszyjc0t.wog.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wr5worfc.fny.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvpfvf34.2ym.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvoo4mpq.v1s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Lipras'; Add-MpPreference -ExclusionPath 'C:\Users'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Lipras
|
||
C:\Lipras\pdf.exe
|
"C:\Lipras\pdf.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
contemteny.site
|
|||
opposezmny.site
|
|||
servicedny.site
|
|||
goalyfeastz.site
|
|||
authorisev.site
|
|||
faulteyotk.site
|
|||
ponintnykqwm.shop
|
|||
seallysl.site
|
|||
https://seallysl.site/api
|
172.67.180.76
|
||
dilemmadu.site
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://seallysl.site/e
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com
|
unknown
|
||
http://www.enigmaprotector.com/openU
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://seallysl.site/apiH
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://seallysl.site/apQ$
|
unknown
|
||
https://seallysl.site/
|
unknown
|
||
http://github.com
|
unknown
|
||
https://seallysl.site/api$
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://seallysl.site/t
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://seallysl.site/qt
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://seallysl.site/0t
|
unknown
|
||
https://github.com/vonuch1/start/raw/refs/heads/main/khtoawdltrha.exe
|
140.82.121.4
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://raw.githubusercontent.comd
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://github.comd
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://raw.githubusercontent.com/vonuch1/start/refs/heads/main/khtoawdltrha.exe
|
185.199.109.133
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://seallysl.site/apif
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
||
http://www.enigmaprotector.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/vonuch1/start/raw/refs/heads/main/khtoawdltrha.exe#C:
|
unknown
|
There are 59 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
seallysl.site
|
172.67.180.76
|
||
ponintnykqwm.shop
|
unknown
|
||
github.com
|
140.82.121.4
|
||
raw.githubusercontent.com
|
185.199.109.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.180.76
|
seallysl.site
|
United States
|
||
185.199.109.133
|
raw.githubusercontent.com
|
Netherlands
|
||
140.82.121.4
|
github.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
31000
|
unkown
|
page execute and read and write
|
||
586A000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
8E000
|
unkown
|
page execute and write copy
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
7F1B000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
39C8000
|
trusted library allocation
|
page read and write
|
||
6ADB000
|
stack
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
7B0D000
|
stack
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
8990000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page execute and read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
343D000
|
stack
|
page read and write
|
||
3927000
|
trusted library allocation
|
page read and write
|
||
7D8A000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page execute and read and write
|
||
76CF000
|
stack
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
30D000
|
unkown
|
page execute and write copy
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
3883000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
306D000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
7D87000
|
trusted library allocation
|
page read and write
|
||
8DEF000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
7CDF000
|
stack
|
page read and write
|
||
3837000
|
trusted library allocation
|
page read and write
|
||
7E3E000
|
heap
|
page read and write
|
||
3825000
|
trusted library allocation
|
page read and write
|
||
4CD7000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
87C5000
|
heap
|
page read and write
|
||
313E000
|
unkown
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
38D2000
|
trusted library allocation
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
heap
|
page read and write
|
||
3339000
|
trusted library allocation
|
page read and write
|
||
2470000
|
direct allocation
|
page execute and read and write
|
||
87FC000
|
heap
|
page read and write
|
||
27FE000
|
heap
|
page read and write
|
||
68B000
|
trusted library allocation
|
page execute and read and write
|
||
236F000
|
trusted library allocation
|
page read and write
|
||
85D0000
|
trusted library allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
682000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
386B000
|
trusted library allocation
|
page read and write
|
||
87D1000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
7A00000
|
heap
|
page execute and read and write
|
||
798E000
|
stack
|
page read and write
|
||
1F9000
|
stack
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
8790000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
280C000
|
heap
|
page read and write
|
||
384B000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
52C3000
|
trusted library allocation
|
page read and write
|
||
29B5000
|
trusted library allocation
|
page execute and read and write
|
||
81F3000
|
trusted library allocation
|
page read and write
|
||
48AB000
|
stack
|
page read and write
|
||
7B20000
|
trusted library allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
262B000
|
direct allocation
|
page execute and read and write
|
||
68000
|
unkown
|
page readonly
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
2983000
|
trusted library allocation
|
page execute and read and write
|
||
4A36000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
4439000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
6F06000
|
heap
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
6EE1000
|
heap
|
page read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
87FF000
|
heap
|
page read and write
|
||
72DB000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
2372000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
2867000
|
heap
|
page read and write
|
||
87C2000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page execute and read and write
|
||
733E000
|
stack
|
page read and write
|
||
5ED1000
|
trusted library allocation
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
3838000
|
trusted library allocation
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2900000
|
remote allocation
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
3856000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
677000
|
trusted library allocation
|
page execute and read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
7EBF000
|
heap
|
page read and write
|
||
3857000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
2634000
|
direct allocation
|
page execute and read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
63E000
|
unkown
|
page read and write
|
||
842E000
|
stack
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
trusted library allocation
|
page read and write
|
||
3873000
|
trusted library allocation
|
page read and write
|
||
3828000
|
trusted library allocation
|
page read and write
|
||
2900000
|
remote allocation
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
78E7000
|
heap
|
page read and write
|
||
7C2B000
|
trusted library allocation
|
page read and write
|
||
24D3000
|
heap
|
page read and write
|
||
382C000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
73DA000
|
stack
|
page read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
4645000
|
heap
|
page execute and read and write
|
||
387A000
|
trusted library allocation
|
page read and write
|
||
7E55000
|
heap
|
page read and write
|
||
729D000
|
stack
|
page read and write
|
||
745B000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
43DD000
|
stack
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
3834000
|
trusted library allocation
|
page read and write
|
||
2648000
|
direct allocation
|
page execute and read and write
|
||
84C000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
7762000
|
heap
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
653000
|
trusted library allocation
|
page execute and read and write
|
||
3887000
|
trusted library allocation
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
332D000
|
trusted library allocation
|
page execute and read and write
|
||
3825000
|
trusted library allocation
|
page read and write
|
||
2380000
|
trusted library allocation
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
461C000
|
stack
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
383F000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
2301000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
7010000
|
heap
|
page execute and read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
3921000
|
heap
|
page read and write
|
||
65D000
|
trusted library allocation
|
page execute and read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
89A3000
|
trusted library allocation
|
page read and write
|
||
1EF000
|
unkown
|
page execute and read and write
|
||
78EF000
|
heap
|
page read and write
|
||
6EFC000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
846F000
|
stack
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
4E33000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4DDB000
|
stack
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
567D000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
7EF7000
|
heap
|
page read and write
|
||
8980000
|
trusted library allocation
|
page execute and read and write
|
||
7350000
|
trusted library allocation
|
page execute and read and write
|
||
87E9000
|
heap
|
page read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
8369000
|
stack
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
2DFE000
|
unkown
|
page read and write
|
||
3822000
|
trusted library allocation
|
page read and write
|
||
8855000
|
heap
|
page read and write
|
||
8D6D000
|
stack
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
heap
|
page execute and read and write
|
||
8B4000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
3837000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
27C7000
|
heap
|
page read and write
|
||
3885000
|
trusted library allocation
|
page read and write
|
||
5F3B000
|
trusted library allocation
|
page read and write
|
||
486D000
|
stack
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
389B000
|
trusted library allocation
|
page read and write
|
||
2634000
|
direct allocation
|
page execute and read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
33F8000
|
heap
|
page read and write
|
||
3836000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
30E4000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
2780000
|
trusted library section
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
386A000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
3873000
|
trusted library allocation
|
page read and write
|
||
654000
|
trusted library allocation
|
page read and write
|
||
4942000
|
trusted library allocation
|
page read and write
|
||
8770000
|
heap
|
page read and write
|
||
5459000
|
trusted library allocation
|
page read and write
|
||
7869000
|
heap
|
page read and write
|
||
3873000
|
trusted library allocation
|
page read and write
|
||
48E1000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
89000
|
unkown
|
page execute and write copy
|
||
715D000
|
stack
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
5609000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page execute and read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
8752000
|
trusted library allocation
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
2374000
|
trusted library allocation
|
page read and write
|
||
7E93000
|
heap
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
879C000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
76000
|
unkown
|
page execute and write copy
|
||
5277000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
3A90000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
470D000
|
stack
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
2366000
|
trusted library allocation
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
861F000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page execute and read and write
|
||
3822000
|
trusted library allocation
|
page read and write
|
||
69DA000
|
stack
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
6F18000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
3885000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
heap
|
page read and write
|
||
38A4000
|
trusted library allocation
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
45DC000
|
stack
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
3853000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page execute and read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
3078000
|
heap
|
page read and write
|
||
2804000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
78C5000
|
heap
|
page read and write
|
||
3323000
|
trusted library allocation
|
page execute and read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
heap
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
8B9C000
|
stack
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
3861000
|
trusted library allocation
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
353D000
|
stack
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
4FF3000
|
trusted library allocation
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
3837000
|
trusted library allocation
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
heap
|
page read and write
|
||
7F11000
|
heap
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
38B4000
|
trusted library allocation
|
page read and write
|
||
83ED000
|
stack
|
page read and write
|
||
7E5D000
|
heap
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
3324000
|
trusted library allocation
|
page read and write
|
||
386A000
|
trusted library allocation
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
85CD000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
89000
|
unkown
|
page execute and read and write
|
||
869E000
|
stack
|
page read and write
|
||
883C000
|
heap
|
page read and write
|
||
9C7000
|
heap
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
235E000
|
trusted library allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
7E59000
|
heap
|
page read and write
|
||
2960000
|
trusted library section
|
page read and write
|
||
927000
|
heap
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
3864000
|
trusted library allocation
|
page read and write
|
||
8784000
|
heap
|
page read and write
|
||
328000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
5605000
|
trusted library allocation
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
78DD000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page execute and read and write
|
||
3829000
|
trusted library allocation
|
page read and write
|
||
3836000
|
trusted library allocation
|
page read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
6A9D000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
85CB000
|
trusted library allocation
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
38A4000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
heap
|
page execute and read and write
|
||
36EE000
|
stack
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
62000
|
unkown
|
page readonly
|
||
770E000
|
stack
|
page read and write
|
||
24F0000
|
direct allocation
|
page execute and read and write
|
||
53FE000
|
stack
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
596E000
|
trusted library allocation
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
298D000
|
trusted library allocation
|
page execute and read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
3838000
|
trusted library allocation
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
792C000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
8794000
|
heap
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
387B000
|
trusted library allocation
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
31000
|
unkown
|
page execute and write copy
|
||
8AF000
|
heap
|
page read and write
|
||
8780000
|
heap
|
page read and write
|
||
33D8000
|
trusted library allocation
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
4C1C000
|
stack
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
27BB000
|
heap
|
page read and write
|
||
78D9000
|
heap
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
2624000
|
direct allocation
|
page execute and read and write
|
||
2398000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
3890000
|
trusted library allocation
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
2369000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
3978000
|
trusted library allocation
|
page read and write
|
||
386C000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
594C000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
6F3A000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
5025000
|
trusted library allocation
|
page read and write
|
||
2634000
|
direct allocation
|
page execute and read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
3884000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
39F8000
|
trusted library allocation
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
5895000
|
heap
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
78F5000
|
heap
|
page read and write
|
||
7E30000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
78B2000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page execute and read and write
|
||
7850000
|
heap
|
page read and write
|
||
334A000
|
trusted library allocation
|
page execute and read and write
|
||
3899000
|
trusted library allocation
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
2628000
|
direct allocation
|
page execute and read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
23A8000
|
trusted library allocation
|
page read and write
|
||
2416000
|
trusted library allocation
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
direct allocation
|
page execute and read and write
|
||
79CE000
|
stack
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
3856000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
3A20000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
2D38000
|
stack
|
page read and write
|
||
382E000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
4E4A000
|
trusted library allocation
|
page read and write
|
||
387E000
|
trusted library allocation
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page execute and read and write
|
||
86F0000
|
trusted library allocation
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
242B000
|
trusted library allocation
|
page read and write
|
||
3836000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
3FE000
|
unkown
|
page read and write
|
||
3355000
|
trusted library allocation
|
page execute and read and write
|
||
2790000
|
heap
|
page read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
7944000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
7E61000
|
heap
|
page read and write
|
||
5C0F000
|
stack
|
page read and write
|
||
241A000
|
trusted library allocation
|
page read and write
|
||
387F000
|
trusted library allocation
|
page read and write
|
||
2386000
|
trusted library allocation
|
page read and write
|
||
886F000
|
heap
|
page read and write
|
||
8CE9000
|
stack
|
page read and write
|
||
865E000
|
stack
|
page read and write
|
||
2A87000
|
heap
|
page read and write
|
||
4620000
|
trusted library allocation
|
page read and write
|
||
6FD2000
|
trusted library allocation
|
page read and write
|
||
1CF000
|
unkown
|
page execute and read and write
|
||
8DC000
|
heap
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
38CC000
|
trusted library allocation
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
382C000
|
trusted library allocation
|
page read and write
|
||
6A5B000
|
stack
|
page read and write
|
||
3008000
|
heap
|
page read and write
|
||
3921000
|
trusted library allocation
|
page read and write
|
||
23A4000
|
trusted library allocation
|
page read and write
|
||
2308000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
81F0000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
3863000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
85A0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
66D000
|
trusted library allocation
|
page execute and read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
21DE000
|
stack
|
page read and write
|
||
38C5000
|
trusted library allocation
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
22DE000
|
stack
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
2630000
|
direct allocation
|
page execute and read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
7C2D000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
67A000
|
trusted library allocation
|
page execute and read and write
|
||
8B00000
|
trusted library allocation
|
page read and write
|
||
7340000
|
heap
|
page read and write
|
||
4C7D000
|
stack
|
page read and write
|
||
78A000
|
stack
|
page read and write
|
||
886B000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page execute and read and write
|
||
56BE000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
774F000
|
stack
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
6F42000
|
heap
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
793000
|
heap
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
8DAE000
|
stack
|
page read and write
|
||
3881000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
8817000
|
heap
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
7F1D8000
|
trusted library allocation
|
page execute and read and write
|
||
2AB8000
|
heap
|
page read and write
|
||
78CD000
|
heap
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
8CE000
|
heap
|
page read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
385D000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
792A000
|
heap
|
page read and write
|
||
826D000
|
stack
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
7E36000
|
heap
|
page read and write
|
||
387B000
|
trusted library allocation
|
page read and write
|
||
8D2E000
|
stack
|
page read and write
|
||
2634000
|
direct allocation
|
page execute and read and write
|
||
86E0000
|
trusted library allocation
|
page read and write
|
||
878C000
|
heap
|
page read and write
|
||
3829000
|
trusted library allocation
|
page read and write
|
||
6D92000
|
heap
|
page read and write
|
||
386C000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
884D000
|
heap
|
page read and write
|
||
880C000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
29AA000
|
trusted library allocation
|
page execute and read and write
|
||
8DB000
|
heap
|
page read and write
|
||
7ED9000
|
heap
|
page read and write
|
||
79000
|
unkown
|
page execute and write copy
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
7F1C0000
|
trusted library allocation
|
page execute and read and write
|
||
2634000
|
direct allocation
|
page execute and read and write
|
||
38D4000
|
trusted library allocation
|
page read and write
|
||
739D000
|
stack
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
4E05000
|
heap
|
page execute and read and write
|
||
8D1000
|
heap
|
page read and write
|
||
236B000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
2EC000
|
stack
|
page read and write
|
||
85C0000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
3958000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
7F020000
|
trusted library allocation
|
page execute and read and write
|
||
8BC000
|
heap
|
page read and write
|
||
8C60000
|
trusted library allocation
|
page execute and read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
23C1000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
8845000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
86AA000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
7E6D000
|
heap
|
page read and write
|
||
7CE0000
|
heap
|
page read and write
|
||
7930000
|
heap
|
page read and write
|
||
68B000
|
stack
|
page read and write
|
||
2623000
|
direct allocation
|
page execute and read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
52EC000
|
trusted library allocation
|
page read and write
|
||
2377000
|
trusted library allocation
|
page read and write
|
||
384C000
|
trusted library allocation
|
page read and write
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
3845000
|
trusted library allocation
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
8B10000
|
trusted library allocation
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
3888000
|
trusted library allocation
|
page read and write
|
||
78F2000
|
heap
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
2395000
|
trusted library allocation
|
page read and write
|
||
86A7000
|
trusted library allocation
|
page read and write
|
||
6F56000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
1D4000
|
unkown
|
page execute and read and write
|
||
5171000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
heap
|
page read and write
|
||
7F038000
|
trusted library allocation
|
page execute and read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
8858000
|
heap
|
page read and write
|
||
83AE000
|
stack
|
page read and write
|
||
6F1B000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page execute and read and write
|
||
8DC000
|
heap
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
78ED000
|
heap
|
page read and write
|
||
475B000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page readonly
|
||
2900000
|
remote allocation
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
6067000
|
trusted library allocation
|
page read and write
|
||
3A25000
|
trusted library allocation
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
6F3F000
|
heap
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
6B68000
|
heap
|
page read and write
|
||
2170000
|
trusted library allocation
|
page read and write
|
||
8798000
|
heap
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
384C000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
80AC000
|
stack
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
7F02000
|
heap
|
page read and write
|
||
382A000
|
trusted library allocation
|
page read and write
|
||
8B5E000
|
stack
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
78C8000
|
heap
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
885C000
|
heap
|
page read and write
|
||
806E000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
6F14000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
3874000
|
trusted library allocation
|
page read and write
|
||
387F000
|
trusted library allocation
|
page read and write
|
||
7E65000
|
heap
|
page read and write
|
||
2630000
|
direct allocation
|
page execute and read and write
|
||
2190000
|
heap
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
389B000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
8700000
|
trusted library allocation
|
page read and write
|
||
3860000
|
trusted library allocation
|
page read and write
|
||
8220000
|
trusted library allocation
|
page execute and read and write
|
||
2798000
|
heap
|
page read and write
|
||
23D9000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
387B000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
388B000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page readonly
|
||
33FF000
|
stack
|
page read and write
|
||
2363000
|
trusted library allocation
|
page read and write
|
||
687000
|
trusted library allocation
|
page execute and read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
3867000
|
trusted library allocation
|
page read and write
|
||
7E69000
|
heap
|
page read and write
|
||
3890000
|
trusted library allocation
|
page read and write
|
There are 858 hidden memdumps, click here to show them.