Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nowe zam#U00f3wienie.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nowe zam#U00f3wienie.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp5F3C.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F6F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Nov 19 07:47:46 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90E7.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9117.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99BF.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Nov 19 07:47:49 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B37.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B77.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fUamrQdFSPAg.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5tjvzgyz.32y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gj2gwolf.n1w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gziroowc.esv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxxar0jn.iro.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psp0fd04.24h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q2bdyvxf.ehs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbmunj44.ph3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1wu0u1r.54j.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp6A86.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\nowe zam#U00f3wienie.exe
|
"C:\Users\user\Desktop\nowe zam#U00f3wienie.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nowe zam#U00f3wienie.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fUamrQdFSPAg" /XML "C:\Users\user\AppData\Local\Temp\tmp5F3C.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
|
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fUamrQdFSPAg" /XML "C:\Users\user\AppData\Local\Temp\tmp6A86.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7852 -s 1556
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 8180 -s 1560
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://checkip.dyndns.org/
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
checkip.dyndns.com
|
132.226.247.73
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
132.226.8.169
|
unknown
|
United States
|
||
193.122.6.168
|
unknown
|
United States
|
||
193.122.130.0
|
unknown
|
United States
|
||
158.101.44.242
|
unknown
|
United States
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProgramId
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
FileId
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LongPathHash
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Name
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
OriginalFileName
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Publisher
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Version
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinFileVersion
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinaryType
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProductName
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
ProductVersion
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
LinkDate
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
BinProductVersion
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
AppxPackageFullName
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Size
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Language
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
IsOsComponent
|
||
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 27 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
403000
|
remote allocation
|
page execute and read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
163D000
|
trusted library allocation
|
page execute and read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
4F00000
|
heap
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
333F000
|
trusted library allocation
|
page read and write
|
||
337D000
|
trusted library allocation
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
7540000
|
heap
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
BB4E000
|
stack
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
AD2E000
|
stack
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
566E000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3391000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page execute and read and write
|
||
74E0000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
4489000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
AFAD000
|
stack
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1253000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
B90E000
|
stack
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
5914000
|
trusted library section
|
page readonly
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
4B85000
|
heap
|
page read and write
|
||
42C8000
|
trusted library allocation
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
1690000
|
trusted library allocation
|
page execute and read and write
|
||
B2EE000
|
stack
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
3425000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
79B000
|
trusted library allocation
|
page execute and read and write
|
||
BA4E000
|
stack
|
page read and write
|
||
865000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
trusted library allocation
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
1662000
|
trusted library allocation
|
page read and write
|
||
2CB7000
|
trusted library allocation
|
page execute and read and write
|
||
2668000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
stack
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
3437000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
3355000
|
trusted library allocation
|
page read and write
|
||
76D000
|
trusted library allocation
|
page execute and read and write
|
||
1190000
|
heap
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
569D000
|
stack
|
page read and write
|
||
6662000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
5910000
|
trusted library section
|
page readonly
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
1875000
|
trusted library allocation
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
343D000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
BF0C000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
3369000
|
trusted library allocation
|
page read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
3453000
|
trusted library allocation
|
page read and write
|
||
B58E000
|
stack
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
78A000
|
trusted library allocation
|
page execute and read and write
|
||
2C7E000
|
unkown
|
page read and write
|
||
627F000
|
stack
|
page read and write
|
||
6A40000
|
heap
|
page read and write
|
||
613F000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
33C9000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
heap
|
page read and write
|
||
344D000
|
trusted library allocation
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
164D000
|
trusted library allocation
|
page execute and read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
786000
|
trusted library allocation
|
page execute and read and write
|
||
911000
|
heap
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
133E000
|
unkown
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
B0AD000
|
stack
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
530C000
|
stack
|
page read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
764000
|
trusted library allocation
|
page read and write
|
||
B0B1000
|
heap
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
6C35000
|
heap
|
page read and write
|
||
B42E000
|
stack
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
341F000
|
trusted library allocation
|
page read and write
|
||
588D000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
145E000
|
unkown
|
page read and write
|
||
42E7000
|
trusted library allocation
|
page read and write
|
||
63CC000
|
heap
|
page read and write
|
||
3449000
|
trusted library allocation
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
233A000
|
stack
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
heap
|
page read and write
|
||
341B000
|
trusted library allocation
|
page read and write
|
||
65BF000
|
stack
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
537000
|
stack
|
page read and write
|
||
12FF000
|
unkown
|
page read and write
|
||
B44E000
|
stack
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
2551000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
33C5000
|
trusted library allocation
|
page read and write
|
||
1667000
|
trusted library allocation
|
page execute and read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
33AB000
|
trusted library allocation
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
3397000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
B56F000
|
stack
|
page read and write
|
||
6C16000
|
heap
|
page read and write
|
||
1810000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
B2B000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
337F000
|
trusted library allocation
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
33F5000
|
trusted library allocation
|
page read and write
|
||
97E0000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
97E8000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
266A000
|
trusted library allocation
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
2D2A000
|
heap
|
page read and write
|
||
141E000
|
unkown
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
B81C000
|
stack
|
page read and write
|
||
763000
|
trusted library allocation
|
page execute and read and write
|
||
1297000
|
trusted library allocation
|
page execute and read and write
|
||
8A4000
|
heap
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
heap
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page execute and read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
B32E000
|
stack
|
page read and write
|
||
5600000
|
heap
|
page execute and read and write
|
||
343B000
|
trusted library allocation
|
page read and write
|
||
1633000
|
trusted library allocation
|
page execute and read and write
|
||
631E000
|
stack
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
333B000
|
trusted library allocation
|
page read and write
|
||
33CD000
|
trusted library allocation
|
page read and write
|
||
242C000
|
stack
|
page read and write
|
||
1254000
|
trusted library allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
18A7000
|
heap
|
page read and write
|
||
5654000
|
trusted library allocation
|
page read and write
|
||
8470000
|
trusted library section
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
797000
|
trusted library allocation
|
page execute and read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
3383000
|
trusted library allocation
|
page read and write
|
||
AF6F000
|
stack
|
page read and write
|
||
BE0C000
|
stack
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
8D8F000
|
stack
|
page read and write
|
||
42F4000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
trusted library allocation
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library section
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
33DB000
|
trusted library allocation
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
33D5000
|
trusted library allocation
|
page read and write
|
||
33CB000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
33DF000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
2440000
|
heap
|
page execute and read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
33D7000
|
trusted library allocation
|
page read and write
|
||
AE2E000
|
stack
|
page read and write
|
||
33C7000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
B7D0000
|
heap
|
page read and write
|
||
13DD000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
4422000
|
trusted library allocation
|
page read and write
|
||
77D000
|
trusted library allocation
|
page execute and read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
33E3000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
BF4D000
|
stack
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
C08E000
|
stack
|
page read and write
|
||
435A000
|
trusted library allocation
|
page read and write
|
||
49B6000
|
trusted library allocation
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
trusted library allocation
|
page read and write
|
||
3211000
|
trusted library allocation
|
page read and write
|
||
3435000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
3457000
|
trusted library allocation
|
page read and write
|
||
298D000
|
stack
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
1643000
|
trusted library allocation
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
1652000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
33C3000
|
trusted library allocation
|
page read and write
|
||
7900000
|
trusted library allocation
|
page execute and read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page execute and read and write
|
||
5370000
|
heap
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
C04E000
|
stack
|
page read and write
|
||
499B000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page execute and read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
33B3000
|
trusted library allocation
|
page read and write
|
||
33A5000
|
trusted library allocation
|
page read and write
|
||
3427000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
unkown
|
page read and write
|
||
333D000
|
trusted library allocation
|
page read and write
|
||
1806000
|
trusted library allocation
|
page read and write
|
||
49B1000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
BA0E000
|
stack
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page execute and read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page execute and read and write
|
||
1820000
|
heap
|
page read and write
|
||
B68E000
|
stack
|
page read and write
|
||
810000
|
trusted library allocation
|
page execute and read and write
|
||
3365000
|
trusted library allocation
|
page read and write
|
||
782000
|
trusted library allocation
|
page read and write
|
||
335D000
|
trusted library allocation
|
page read and write
|
||
B1ED000
|
stack
|
page read and write
|
||
AE6E000
|
stack
|
page read and write
|
||
3395000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2E1D000
|
stack
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
3339000
|
trusted library allocation
|
page read and write
|
||
B6CD000
|
stack
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
C18F000
|
stack
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
344B000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
300A000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
3371000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
3761000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
3357000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
336B000
|
trusted library allocation
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
1656000
|
trusted library allocation
|
page execute and read and write
|
||
128A000
|
trusted library allocation
|
page execute and read and write
|
||
947000
|
heap
|
page read and write
|
||
33BF000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
F2A000
|
heap
|
page read and write
|
||
56DD000
|
stack
|
page read and write
|
||
2FE7000
|
trusted library allocation
|
page read and write
|
||
337B000
|
trusted library allocation
|
page read and write
|
||
6462000
|
trusted library allocation
|
page read and write
|
||
D97000
|
stack
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
1804000
|
trusted library allocation
|
page read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
3F37000
|
trusted library allocation
|
page read and write
|
||
1292000
|
trusted library allocation
|
page read and write
|
||
33BD000
|
trusted library allocation
|
page read and write
|
||
336D000
|
trusted library allocation
|
page read and write
|
||
129B000
|
trusted library allocation
|
page execute and read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
5B5D000
|
stack
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
heap
|
page read and write
|
||
335B000
|
trusted library allocation
|
page read and write
|
||
186B000
|
stack
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page execute and read and write
|
||
773000
|
trusted library allocation
|
page read and write
|
||
464C000
|
stack
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
85DE000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
1634000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
4F3C000
|
heap
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
4B5B000
|
stack
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
33FD000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
33EB000
|
trusted library allocation
|
page read and write
|
||
3337000
|
trusted library allocation
|
page read and write
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
B85E000
|
stack
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page execute and read and write
|
||
B95E000
|
stack
|
page read and write
|
||
2E93000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page read and write
|
||
565B000
|
trusted library allocation
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
4B60000
|
trusted library section
|
page readonly
|
||
4F40000
|
heap
|
page read and write
|
||
3343000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
5274000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
7517000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
166B000
|
trusted library allocation
|
page execute and read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
4994000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
5773000
|
heap
|
page read and write
|
||
2358000
|
trusted library allocation
|
page read and write
|
||
33B7000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
heap
|
page execute and read and write
|
||
FE6000
|
heap
|
page read and write
|
||
335F000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
4A73000
|
heap
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
3423000
|
trusted library allocation
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
4A02000
|
trusted library allocation
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
B46E000
|
stack
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
6C5F000
|
heap
|
page read and write
|
||
B7CD000
|
stack
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page execute and read and write
|
||
112C000
|
stack
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page execute and read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
62E0000
|
heap
|
page read and write
|
||
4F09000
|
heap
|
page read and write
|
||
617E000
|
stack
|
page read and write
|
||
74FD000
|
heap
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
371F000
|
trusted library allocation
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
4287000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4424000
|
trusted library allocation
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
576B000
|
stack
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
stack
|
page read and write
|
||
49BD000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
3E09000
|
trusted library allocation
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page execute and read and write
|
||
3F31000
|
trusted library allocation
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
570F000
|
stack
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
29CA000
|
stack
|
page read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
3334000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
stack
|
page read and write
|
||
B54F000
|
stack
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
B71B000
|
stack
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
5710000
|
heap
|
page execute and read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
1286000
|
trusted library allocation
|
page execute and read and write
|
||
7FE000
|
stack
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
33F3000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
2FEA000
|
trusted library allocation
|
page read and write
|
||
2E9B000
|
trusted library allocation
|
page read and write
|
||
33BB000
|
trusted library allocation
|
page read and write
|
||
3367000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page execute and read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page execute and read and write
|
||
3284000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
49AE000
|
trusted library allocation
|
page read and write
|
||
5B60000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
165A000
|
trusted library allocation
|
page execute and read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
338D000
|
trusted library allocation
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
64B5000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
3385000
|
trusted library allocation
|
page read and write
|
||
339D000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
43DF000
|
trusted library allocation
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
792000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
263F000
|
unkown
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
33EF000
|
trusted library allocation
|
page read and write
|
||
3443000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
3058000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page execute and read and write
|
||
B570000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
trusted library allocation
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
ACEE000
|
stack
|
page read and write
|
||
342D000
|
trusted library allocation
|
page read and write
|
||
BCCE000
|
stack
|
page read and write
|
||
339B000
|
trusted library allocation
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
BDCF000
|
stack
|
page read and write
|
||
122000
|
unkown
|
page readonly
|
||
63C8000
|
heap
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page execute and read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
125D000
|
trusted library allocation
|
page execute and read and write
|
||
EF7000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3399000
|
trusted library allocation
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
There are 596 hidden memdumps, click here to show them.