Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Autofill Manufacturing Sdn Bhd 28-08-2024.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Autofill Manufacturing Sdn Bhd 28-08-2024.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp8289.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GhrKoSGuCdvpJ.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gaiz3yh.3nb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ed1eyoy.dbh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hy4umc5.uqy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dtxhfwmy.4jf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jt3cnewh.wog.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lobd44dl.mhw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmlenjg4.p34.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxkjhyeq.kuf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp9536.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
|
"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill
Manufacturing Sdn Bhd 28-08-2024.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"
|
||
C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
|
"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
|
||
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
|
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"
|
||
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
|
"C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://chrome.google.com/webstore?hl=enp
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://www.office.com/p
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
34B5000
|
trusted library allocation
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
4026000
|
trusted library allocation
|
page read and write
|
||
40AB000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
40C6000
|
trusted library allocation
|
page read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
3037000
|
trusted library allocation
|
page execute and read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
6BB2000
|
trusted library allocation
|
page read and write
|
||
2B3A000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
9B8E000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
6990000
|
trusted library allocation
|
page execute and read and write
|
||
3220000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
526C000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
9F0F000
|
stack
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
3022000
|
trusted library allocation
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
A42000
|
trusted library allocation
|
page read and write
|
||
3DD2000
|
trusted library allocation
|
page read and write
|
||
417E000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
3022000
|
trusted library allocation
|
page read and write
|
||
413000
|
remote allocation
|
page execute and read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
B3B000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
5756000
|
trusted library allocation
|
page read and write
|
||
713F000
|
stack
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page execute and read and write
|
||
144D000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
691D000
|
trusted library allocation
|
page read and write
|
||
301D000
|
trusted library allocation
|
page execute and read and write
|
||
E09000
|
heap
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
A57000
|
trusted library allocation
|
page execute and read and write
|
||
3F5E000
|
trusted library allocation
|
page read and write
|
||
4619000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page execute and read and write
|
||
49E0000
|
trusted library allocation
|
page execute and read and write
|
||
1075000
|
trusted library allocation
|
page execute and read and write
|
||
1428000
|
heap
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
329E000
|
trusted library allocation
|
page read and write
|
||
43D000
|
remote allocation
|
page execute and read and write
|
||
2B60000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
69F7000
|
trusted library allocation
|
page read and write
|
||
104D000
|
trusted library allocation
|
page execute and read and write
|
||
457F000
|
trusted library allocation
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
2FE9000
|
trusted library allocation
|
page read and write
|
||
45A4000
|
trusted library allocation
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
A94E000
|
stack
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
6920000
|
trusted library allocation
|
page execute and read and write
|
||
40AE000
|
trusted library allocation
|
page read and write
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
unkown
|
page read and write
|
||
9CCE000
|
stack
|
page read and write
|
||
15C1000
|
heap
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
3F30000
|
trusted library allocation
|
page read and write
|
||
5A3B000
|
stack
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
690A000
|
trusted library allocation
|
page read and write
|
||
42F9000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
2B46000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
A24000
|
trusted library allocation
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
A52000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
442F000
|
trusted library allocation
|
page read and write
|
||
40BA000
|
trusted library allocation
|
page read and write
|
||
42F000
|
remote allocation
|
page execute and read and write
|
||
139E000
|
heap
|
page read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
3003000
|
trusted library allocation
|
page execute and read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
1336000
|
stack
|
page read and write
|
||
6A7D000
|
stack
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
33DA000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
302E000
|
trusted library allocation
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
9F4B000
|
stack
|
page read and write
|
||
4576000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
33DF000
|
trusted library allocation
|
page read and write
|
||
163B000
|
trusted library allocation
|
page execute and read and write
|
||
1637000
|
trusted library allocation
|
page execute and read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
457A000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FC50000
|
trusted library allocation
|
page execute and read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
3F08000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
3026000
|
trusted library allocation
|
page execute and read and write
|
||
4639000
|
trusted library allocation
|
page read and write
|
||
14FD000
|
trusted library allocation
|
page execute and read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
14F3000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
9F7D000
|
heap
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
1622000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
34A6000
|
trusted library allocation
|
page read and write
|
||
4148000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
4541000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
2ECF000
|
trusted library allocation
|
page read and write
|
||
437C000
|
trusted library allocation
|
page read and write
|
||
43D9000
|
trusted library allocation
|
page read and write
|
||
9C8E000
|
stack
|
page read and write
|
||
45C3000
|
trusted library allocation
|
page read and write
|
||
107B000
|
trusted library allocation
|
page execute and read and write
|
||
64C2000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
427000
|
remote allocation
|
page execute and read and write
|
||
14A0000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
43B3000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
A5B000
|
trusted library allocation
|
page execute and read and write
|
||
303E000
|
unkown
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
13D1000
|
heap
|
page read and write
|
||
339B000
|
trusted library allocation
|
page read and write
|
||
2E9B000
|
trusted library allocation
|
page read and write
|
||
961E000
|
stack
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
162A000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
3028000
|
trusted library allocation
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
5762000
|
trusted library allocation
|
page read and write
|
||
4DBD000
|
stack
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
2D2D000
|
stack
|
page read and write
|
||
7FC20000
|
trusted library allocation
|
page execute and read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
353B000
|
trusted library allocation
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
65B0000
|
trusted library section
|
page read and write
|
||
2E17000
|
trusted library allocation
|
page read and write
|
||
4C0B000
|
stack
|
page read and write
|
||
3486000
|
trusted library allocation
|
page read and write
|
||
3E49000
|
trusted library allocation
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
6940000
|
trusted library allocation
|
page execute and read and write
|
||
435C000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
A5CE000
|
stack
|
page read and write
|
||
34BE000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
A34E000
|
stack
|
page read and write
|
||
65EC000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
4571000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
stack
|
page read and write
|
||
3048000
|
heap
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
42F5000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
1066000
|
trusted library allocation
|
page execute and read and write
|
||
1072000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
A4A000
|
trusted library allocation
|
page execute and read and write
|
||
143B000
|
heap
|
page read and write
|
||
3E20000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
trusted library allocation
|
page read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library section
|
page read and write
|
||
3541000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
4584000
|
trusted library allocation
|
page read and write
|
||
34B9000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
6AD3000
|
heap
|
page read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
2D6A000
|
stack
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
4CB5000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
3EAB000
|
trusted library allocation
|
page read and write
|
||
40A5000
|
trusted library allocation
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
9F50000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
A6CE000
|
stack
|
page read and write
|
||
A2D000
|
trusted library allocation
|
page execute and read and write
|
||
303B000
|
trusted library allocation
|
page execute and read and write
|
||
5290000
|
heap
|
page read and write
|
||
6930000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
A23000
|
trusted library allocation
|
page execute and read and write
|
||
2E23000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
161D000
|
trusted library allocation
|
page execute and read and write
|
||
6ADC000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
32AD000
|
trusted library allocation
|
page read and write
|
||
2EFC000
|
trusted library allocation
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
4478000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
2B1A000
|
stack
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
6918000
|
trusted library allocation
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
40E7000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
34AF000
|
trusted library allocation
|
page read and write
|
||
A060000
|
trusted library allocation
|
page execute and read and write
|
||
3E75000
|
trusted library allocation
|
page read and write
|
||
3289000
|
trusted library allocation
|
page read and write
|
||
24A9000
|
trusted library allocation
|
page read and write
|
||
765E000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
heap
|
page execute and read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page execute and read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
7050000
|
trusted library allocation
|
page execute and read and write
|
||
13B5000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page execute and read and write
|
||
32B1000
|
trusted library allocation
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
432A000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
4272000
|
trusted library allocation
|
page read and write
|
||
6EDE000
|
stack
|
page read and write
|
||
32DC000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
4021000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
stack
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
4095000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
trusted library allocation
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
4597000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
44BF000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
A24F000
|
stack
|
page read and write
|
||
1044000
|
trusted library allocation
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
heap
|
page read and write
|
||
40B3000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
9F66000
|
heap
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
9A4E000
|
stack
|
page read and write
|
||
5BE5000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
105D000
|
trusted library allocation
|
page execute and read and write
|
||
6A9A000
|
heap
|
page read and write
|
||
3DD0000
|
trusted library allocation
|
page read and write
|
||
42CB000
|
trusted library allocation
|
page read and write
|
||
6AEA000
|
heap
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
456D000
|
trusted library allocation
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
51DD000
|
stack
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
33D2000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
331B000
|
trusted library allocation
|
page read and write
|
||
B73000
|
heap
|
page read and write
|
||
660E000
|
heap
|
page read and write
|
||
40D3000
|
trusted library allocation
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
4168000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
7652000
|
trusted library allocation
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
45B1000
|
trusted library allocation
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
1635000
|
trusted library allocation
|
page execute and read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
9F58000
|
heap
|
page read and write
|
||
92000
|
unkown
|
page readonly
|
||
573B000
|
trusted library allocation
|
page read and write
|
||
3545000
|
trusted library allocation
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
6980000
|
trusted library allocation
|
page execute and read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
77B8000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page execute and read and write
|
||
3F1D000
|
trusted library allocation
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
A80C000
|
stack
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page read and write
|
||
44EB000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
5258000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
45ED000
|
trusted library allocation
|
page read and write
|
||
69FA000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
stack
|
page read and write
|
||
45D4000
|
trusted library allocation
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
trusted library allocation
|
page read and write
|
||
A84E000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
A44E000
|
stack
|
page read and write
|
||
40FE000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
184F000
|
stack
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
45B8000
|
trusted library allocation
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
A14E000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
6916000
|
trusted library allocation
|
page read and write
|
||
3385000
|
trusted library allocation
|
page read and write
|
||
24BE000
|
trusted library allocation
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
unkown
|
page read and write
|
||
45CA000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
heap
|
page read and write
|
||
43EE000
|
trusted library allocation
|
page read and write
|
||
4103000
|
trusted library allocation
|
page read and write
|
||
6AC8000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
34C2000
|
trusted library allocation
|
page read and write
|
||
331E000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
A48E000
|
stack
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
3E95000
|
trusted library allocation
|
page read and write
|
||
43C000
|
remote allocation
|
page execute and read and write
|
||
3F5A000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
464F000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
57A3000
|
heap
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
6602000
|
heap
|
page read and write
|
||
410E000
|
trusted library allocation
|
page read and write
|
||
33FD000
|
trusted library allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
6F70000
|
heap
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
74DF000
|
stack
|
page read and write
|
||
672E000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
5740000
|
heap
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
14F4000
|
trusted library allocation
|
page read and write
|
||
44D5000
|
trusted library allocation
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
9DCF000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
442B000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
trusted library allocation
|
page read and write
|
||
45CF000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
trusted library section
|
page readonly
|
||
67BE000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
7310000
|
heap
|
page read and write
|
||
45C5000
|
trusted library allocation
|
page read and write
|
||
32E4000
|
trusted library allocation
|
page read and write
|
||
3284000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
B51000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page execute and read and write
|
||
A46000
|
trusted library allocation
|
page execute and read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
40F2000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page execute and read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
460C000
|
stack
|
page read and write
|
||
3F8F000
|
trusted library allocation
|
page read and write
|
||
4438000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
4315000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
411C000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
7090000
|
trusted library allocation
|
page execute and read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
4019000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
34E3000
|
trusted library allocation
|
page read and write
|
||
32D8000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library section
|
page readonly
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
3032000
|
trusted library allocation
|
page read and write
|
||
42A000
|
remote allocation
|
page execute and read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page execute and read and write
|
||
3E36000
|
trusted library allocation
|
page read and write
|
||
317F000
|
unkown
|
page read and write
|
||
3293000
|
trusted library allocation
|
page read and write
|
||
41DB000
|
trusted library allocation
|
page read and write
|
||
4346000
|
trusted library allocation
|
page read and write
|
||
64EF000
|
heap
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
44F7000
|
trusted library allocation
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
6A67000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
A58E000
|
stack
|
page read and write
|
||
42D8000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
353F000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
44BD000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
trusted library allocation
|
page read and write
|
||
6906000
|
trusted library allocation
|
page read and write
|
||
5733000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1626000
|
trusted library allocation
|
page execute and read and write
|
||
333C000
|
trusted library allocation
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
1062000
|
trusted library allocation
|
page read and write
|
||
9B4E000
|
stack
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
B5D000
|
trusted library allocation
|
page read and write
|
||
349B000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5751000
|
trusted library allocation
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
7200000
|
trusted library section
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
444B000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
4559000
|
trusted library allocation
|
page read and write
|
||
9E0E000
|
stack
|
page read and write
|
||
42E000
|
remote allocation
|
page execute and read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
2FB6000
|
trusted library allocation
|
page read and write
|
||
458B000
|
trusted library allocation
|
page read and write
|
||
106A000
|
trusted library allocation
|
page execute and read and write
|
||
300D000
|
trusted library allocation
|
page execute and read and write
|
||
1740000
|
heap
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
3D61000
|
trusted library allocation
|
page read and write
|
||
2E6D000
|
trusted library allocation
|
page read and write
|
||
13B7000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
2DD6000
|
trusted library allocation
|
page read and write
|
||
B56000
|
trusted library allocation
|
page read and write
|
||
7177000
|
trusted library allocation
|
page read and write
|
||
40A0000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page execute and read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
1E9000
|
stack
|
page read and write
|
||
2E0F000
|
trusted library allocation
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
1043000
|
trusted library allocation
|
page execute and read and write
|
||
991E000
|
stack
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
A70B000
|
stack
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
1632000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
2F02000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
6970000
|
trusted library allocation
|
page execute and read and write
|
||
44F2000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
6904000
|
trusted library allocation
|
page read and write
|
||
64E4000
|
heap
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
33D4000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
574E000
|
trusted library allocation
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page execute and read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
409C000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
13AF000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
367D000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page execute and read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
A04C000
|
stack
|
page read and write
|
||
429000
|
remote allocation
|
page execute and read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
6628000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page execute and read and write
|
||
647F000
|
stack
|
page read and write
|
||
2ADD000
|
stack
|
page read and write
|
||
1546000
|
heap
|
page read and write
|
||
3078000
|
trusted library allocation
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
307B000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
4014000
|
trusted library allocation
|
page read and write
|
||
408F000
|
trusted library allocation
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
302A000
|
trusted library allocation
|
page execute and read and write
|
||
56E2000
|
trusted library allocation
|
page read and write
|
||
65FF000
|
stack
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
702D000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
1077000
|
trusted library allocation
|
page execute and read and write
|
||
637E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page execute and read and write
|
||
5800000
|
trusted library allocation
|
page execute and read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
trusted library allocation
|
page execute and read and write
|
||
4560000
|
trusted library allocation
|
page read and write
|
||
4E5D000
|
stack
|
page read and write
|
||
328E000
|
trusted library allocation
|
page read and write
|
There are 719 hidden memdumps, click here to show them.