Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp1B98.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OnCgVRIhY.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aju0ovhc.hm4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bleeyba5.jwl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cubm45qi.tff.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cyybqu4b.t2p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i2b05ib0.lfi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njybn5xo.zbl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tyfheknh.0ir.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3e5u04e.xci.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp2CAF.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
|
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TEKL#U0130F
TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OnCgVRIhY.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OnCgVRIhY" /XML "C:\Users\user\AppData\Local\Temp\tmp1B98.tmp"
|
||
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
|
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
|
||
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
|
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OnCgVRIhY" /XML "C:\Users\user\AppData\Local\Temp\tmp2CAF.tmp"
|
||
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
|
"C:\Users\user\AppData\Roaming\OnCgVRIhY.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20a
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlBcq
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20and%20Time:%2027/09/2024%20/%2004:36:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216865%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20and%20Time:%2026/09/2024%20/%2022:26:13%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216865%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://chrome.google.com/webstore?hl=enx
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.office.com/x
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.8.169
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.office.com/lBcq
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.8.169
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.8.169
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
39C9000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
435000
|
remote allocation
|
page execute and read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
30E2000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
trusted library allocation
|
page execute and read and write
|
||
E4F000
|
stack
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
42E000
|
remote allocation
|
page execute and read and write
|
||
1079000
|
stack
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
12C6000
|
trusted library allocation
|
page execute and read and write
|
||
6BE6000
|
trusted library allocation
|
page read and write
|
||
40C5000
|
trusted library allocation
|
page read and write
|
||
12F4000
|
trusted library allocation
|
page read and write
|
||
4187000
|
trusted library allocation
|
page read and write
|
||
164C000
|
stack
|
page read and write
|
||
5570000
|
trusted library allocation
|
page execute and read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
5205000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
trusted library allocation
|
page read and write
|
||
68C9000
|
heap
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
721F000
|
stack
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library section
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
42A000
|
remote allocation
|
page execute and read and write
|
||
40D3000
|
trusted library allocation
|
page read and write
|
||
40D9000
|
trusted library allocation
|
page read and write
|
||
43E2000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
trusted library allocation
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
||
2F06000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
3342000
|
trusted library allocation
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page execute and read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
F84000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
72FE000
|
heap
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
3008000
|
trusted library allocation
|
page read and write
|
||
12AD000
|
trusted library allocation
|
page execute and read and write
|
||
FA6000
|
trusted library allocation
|
page execute and read and write
|
||
429000
|
remote allocation
|
page execute and read and write
|
||
3FEF000
|
trusted library allocation
|
page read and write
|
||
A37D000
|
stack
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
43F8000
|
trusted library allocation
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
2F33000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
39C1000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
CC9000
|
stack
|
page read and write
|
||
F83000
|
trusted library allocation
|
page execute and read and write
|
||
A9A000
|
stack
|
page read and write
|
||
4399000
|
trusted library allocation
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
27D8000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
trusted library allocation
|
page execute and read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
4435000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page execute and read and write
|
||
1325000
|
trusted library allocation
|
page execute and read and write
|
||
2FB2000
|
trusted library allocation
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
3FD3000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page execute and read and write
|
||
A71C000
|
stack
|
page read and write
|
||
3C56000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page execute and read and write
|
||
4288000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
5595000
|
heap
|
page read and write
|
||
12DD000
|
trusted library allocation
|
page execute and read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
4F42000
|
trusted library allocation
|
page read and write
|
||
41A3000
|
trusted library allocation
|
page read and write
|
||
32BB000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
7F800000
|
trusted library allocation
|
page execute and read and write
|
||
1460000
|
heap
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
FAA000
|
trusted library allocation
|
page execute and read and write
|
||
6950000
|
heap
|
page read and write
|
||
42FA000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
2D27000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page execute and read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
4386000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
30FA000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page execute and read and write
|
||
12CA000
|
trusted library allocation
|
page execute and read and write
|
||
A210000
|
heap
|
page read and write
|
||
51D6000
|
trusted library allocation
|
page read and write
|
||
49FB000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
3FE4000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page execute and read and write
|
||
56AD000
|
stack
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
A61B000
|
stack
|
page read and write
|
||
4316000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
79FF000
|
stack
|
page read and write
|
||
12A4000
|
trusted library allocation
|
page read and write
|
||
3014000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
trusted library allocation
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
519B000
|
stack
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
4277000
|
trusted library allocation
|
page read and write
|
||
115D000
|
heap
|
page read and write
|
||
4216000
|
trusted library allocation
|
page read and write
|
||
4323000
|
trusted library allocation
|
page read and write
|
||
A7B3000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
3223000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2F30000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
436B000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
51DD000
|
trusted library allocation
|
page read and write
|
||
3273000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
9F3D000
|
stack
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
32ED000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
12D7000
|
trusted library allocation
|
page execute and read and write
|
||
41BC000
|
trusted library allocation
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
31E4000
|
trusted library allocation
|
page read and write
|
||
4E7D000
|
trusted library allocation
|
page read and write
|
||
5333000
|
heap
|
page read and write
|
||
A7C4000
|
heap
|
page read and write
|
||
52ED000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
32BE000
|
trusted library allocation
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
4301000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
14EC000
|
stack
|
page read and write
|
||
2AFB000
|
heap
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
42EF000
|
trusted library allocation
|
page read and write
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
42E8000
|
trusted library allocation
|
page read and write
|
||
726F000
|
stack
|
page read and write
|
||
12BD000
|
trusted library allocation
|
page execute and read and write
|
||
52A0000
|
trusted library allocation
|
page execute and read and write
|
||
350A000
|
heap
|
page read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
4329000
|
trusted library allocation
|
page read and write
|
||
C91000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page read and write
|
||
4AFC000
|
stack
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
4439000
|
trusted library allocation
|
page read and write
|
||
12C2000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
40B000
|
remote allocation
|
page execute and read and write
|
||
10D6000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
440B000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
EE7000
|
heap
|
page read and write
|
||
40A000
|
remote allocation
|
page execute and read and write
|
||
757E000
|
stack
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
12F2000
|
trusted library allocation
|
page read and write
|
||
40CB000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
42C000
|
remote allocation
|
page execute and read and write
|
||
51E2000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
A68E000
|
stack
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
430B000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
30BD000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
31B9000
|
trusted library allocation
|
page read and write
|
||
4CD8000
|
trusted library allocation
|
page read and write
|
||
2A17000
|
trusted library allocation
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
1316000
|
trusted library allocation
|
page execute and read and write
|
||
4183000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page execute and read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
30B8000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
A04E000
|
stack
|
page read and write
|
||
3F74000
|
trusted library allocation
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
6860000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
348C000
|
trusted library allocation
|
page read and write
|
||
A00E000
|
stack
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
3FDA000
|
trusted library allocation
|
page read and write
|
||
40AD000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
4451000
|
trusted library allocation
|
page read and write
|
||
A252000
|
heap
|
page read and write
|
||
1307000
|
trusted library allocation
|
page execute and read and write
|
||
5340000
|
heap
|
page read and write
|
||
72D8000
|
heap
|
page read and write
|
||
2762000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
heap
|
page execute and read and write
|
||
7230000
|
heap
|
page read and write
|
||
130D000
|
trusted library allocation
|
page execute and read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
4075000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
69AE000
|
heap
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
A140000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page execute and read and write
|
||
31AB000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page execute and read and write
|
||
2F50000
|
heap
|
page execute and read and write
|
||
412E000
|
trusted library allocation
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
A20D000
|
stack
|
page read and write
|
||
51D0000
|
trusted library section
|
page read and write
|
||
2F0D000
|
trusted library allocation
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
12D2000
|
trusted library allocation
|
page read and write
|
||
3046000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page execute and read and write
|
||
40D1000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
566D000
|
stack
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
3354000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
trusted library allocation
|
page read and write
|
||
40D000
|
remote allocation
|
page execute and read and write
|
||
AA1C000
|
stack
|
page read and write
|
||
A47E000
|
stack
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
heap
|
page read and write
|
||
A85E000
|
stack
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
F93000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
9F9D000
|
stack
|
page read and write
|
||
72BD000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
4134000
|
trusted library allocation
|
page read and write
|
||
1177000
|
stack
|
page read and write
|
||
418A000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
3C13000
|
trusted library allocation
|
page read and write
|
||
A91B000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
3F03000
|
trusted library allocation
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
6C0B000
|
trusted library allocation
|
page read and write
|
||
6862000
|
heap
|
page read and write
|
||
3E31000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
7192000
|
trusted library allocation
|
page read and write
|
||
4395000
|
trusted library allocation
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
12DB000
|
trusted library allocation
|
page execute and read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
30F2000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
3196000
|
trusted library allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
5292000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page execute and read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
2A79000
|
stack
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
40D7000
|
trusted library allocation
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
318A000
|
trusted library allocation
|
page read and write
|
||
33AB000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
4062000
|
trusted library allocation
|
page read and write
|
||
334E000
|
trusted library allocation
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
6D37000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
unkown
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
612000
|
unkown
|
page readonly
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
32C9000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
trusted library allocation
|
page read and write
|
||
51FF000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
4E54000
|
trusted library allocation
|
page read and write
|
||
74A000
|
stack
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
4326000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
30EE000
|
trusted library allocation
|
page read and write
|
||
FB7000
|
heap
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
3F88000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
4358000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
439000
|
remote allocation
|
page execute and read and write
|
||
EEB000
|
heap
|
page read and write
|
||
415C000
|
trusted library allocation
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
A33E000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
132B000
|
trusted library allocation
|
page execute and read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
31E5000
|
trusted library allocation
|
page read and write
|
||
A7A6000
|
heap
|
page read and write
|
||
414A000
|
trusted library allocation
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
51FD000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
12D4000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
421A000
|
trusted library allocation
|
page read and write
|
||
12A3000
|
trusted library allocation
|
page execute and read and write
|
||
3018000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
3092000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
3F23000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
trusted library allocation
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
51BB000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
trusted library allocation
|
page read and write
|
||
300C000
|
trusted library allocation
|
page read and write
|
||
6ED3000
|
trusted library allocation
|
page read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
trusted library allocation
|
page execute and read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
A40E000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
4E5B000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
30B4000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
6A8D000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page execute and read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
43E3000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
4144000
|
trusted library allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
758A000
|
trusted library allocation
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
130B000
|
trusted library allocation
|
page execute and read and write
|
||
1193000
|
heap
|
page read and write
|
||
309F000
|
trusted library allocation
|
page read and write
|
||
2767000
|
trusted library allocation
|
page execute and read and write
|
||
2D0E000
|
unkown
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
276B000
|
trusted library allocation
|
page execute and read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
438000
|
remote allocation
|
page execute and read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
7FA30000
|
trusted library allocation
|
page execute and read and write
|
||
B97000
|
stack
|
page read and write
|
||
A89E000
|
stack
|
page read and write
|
||
3DEF000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
6BED000
|
trusted library allocation
|
page read and write
|
||
A44E000
|
stack
|
page read and write
|
||
41E000
|
remote allocation
|
page execute and read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
42FC000
|
trusted library allocation
|
page read and write
|
||
12E3000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
40CE000
|
trusted library allocation
|
page read and write
|
||
404C000
|
trusted library allocation
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page execute and read and write
|
||
F4E000
|
heap
|
page read and write
|
||
40C2000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
694F000
|
stack
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
heap
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
55A6000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library section
|
page readonly
|
||
68D8000
|
heap
|
page read and write
|
||
432B000
|
trusted library allocation
|
page read and write
|
||
A58E000
|
stack
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
43F8000
|
trusted library allocation
|
page read and write
|
||
423F000
|
trusted library allocation
|
page read and write
|
||
30AA000
|
trusted library allocation
|
page read and write
|
||
3FF2000
|
trusted library allocation
|
page read and write
|
||
55AD000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
3DAC000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page execute and read and write
|
||
6BE8000
|
trusted library allocation
|
page read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page execute and read and write
|
||
336F000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
12D3000
|
trusted library allocation
|
page execute and read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page execute and read and write
|
||
6E7A000
|
trusted library allocation
|
page read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
43EC000
|
trusted library allocation
|
page read and write
|
||
59EA000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
590F000
|
stack
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
4336000
|
trusted library allocation
|
page read and write
|
||
3269000
|
trusted library allocation
|
page read and write
|
||
42F000
|
remote allocation
|
page execute and read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
40C000
|
remote allocation
|
page execute and read and write
|
||
5740000
|
heap
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
F9D000
|
trusted library allocation
|
page execute and read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
C93000
|
heap
|
page read and write
|
||
A75E000
|
stack
|
page read and write
|
||
43DB000
|
trusted library allocation
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
A54E000
|
stack
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
43CA000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
766F000
|
stack
|
page read and write
|
||
3217000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
12FD000
|
trusted library allocation
|
page execute and read and write
|
||
A13D000
|
stack
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
665D000
|
stack
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
3F7B000
|
trusted library allocation
|
page read and write
|
||
55E3000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
43B5000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
40A1000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
4069000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
2B6B000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
32C4000
|
trusted library allocation
|
page read and write
|
||
A7A0000
|
heap
|
page read and write
|
||
69BC000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
AB5E000
|
stack
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
1290000
|
heap
|
page read and write
|
||
3FE0000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
AA5D000
|
stack
|
page read and write
|
||
131A000
|
trusted library allocation
|
page execute and read and write
|
||
1327000
|
trusted library allocation
|
page execute and read and write
|
||
4157000
|
trusted library allocation
|
page read and write
|
||
4E76000
|
trusted library allocation
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
1312000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page execute and read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
3FCC000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
5320000
|
trusted library section
|
page readonly
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
4324000
|
trusted library allocation
|
page read and write
|
||
4268000
|
trusted library allocation
|
page read and write
|
||
5305000
|
heap
|
page read and write
|
||
531C000
|
stack
|
page read and write
|
||
4467000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
stack
|
page read and write
|
||
2FDF000
|
unkown
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
trusted library allocation
|
page read and write
|
||
40B5000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
4343000
|
trusted library allocation
|
page read and write
|
||
4405000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
40BB000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
27CE000
|
stack
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
41A6000
|
trusted library allocation
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
42B000
|
remote allocation
|
page execute and read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
3FF8000
|
trusted library allocation
|
page read and write
|
||
4306000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
4350000
|
trusted library allocation
|
page read and write
|
||
3FE9000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
trusted library allocation
|
page read and write
|
||
30EC000
|
trusted library allocation
|
page read and write
|
There are 746 hidden memdumps, click here to show them.