Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER628D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Sep 26 07:26:07 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64C1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6510.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k3srmay.njf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2kjh2l1s.oq1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sgbyx4z.na4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xmbsoyw.evx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3k35ztk.tpn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ccpktzlr.d4q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_flyghtq1.x2t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ikzmqees.beb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3nwbpja.nqc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbfhnphb.hh1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_secaqxsi.gvo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2n5vvuf.dz5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vgyfj0rh.ays.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vukss2gq.2sc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vywkdah3.ars.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnv41itx.bec.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 26 06:22:28
2024, mtime=Thu Sep 26 06:22:28 2024, atime=Thu Sep 26 06:22:28 2024, length=489984, window=hide
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\DRAFT
BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DRAFT
BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7600 -s 2028
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
104.250.180.178
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 4 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.250.180.178
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
ProgramId
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
FileId
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
LongPathHash
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Name
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
OriginalFileName
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Publisher
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Version
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
BinFileVersion
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
BinaryType
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
ProductName
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
ProductVersion
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
LinkDate
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
BinProductVersion
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
AppxPackageFullName
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Size
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Language
|
||
\REGISTRY\A\{b4af7896-53d0-3d41-234d-3fefd4c6dcc6}\Root\InventoryApplicationFile\draft bl - cls93|6bcd13af8f317138
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DE1000
|
trusted library allocation
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
34BE000
|
stack
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
610A000
|
stack
|
page read and write
|
||
915E000
|
stack
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page read and write
|
||
3780000
|
trusted library allocation
|
page execute and read and write
|
||
7FB4000
|
heap
|
page read and write
|
||
5074000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library section
|
page read and write
|
||
6E1F000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
170C000
|
stack
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
8880000
|
trusted library allocation
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
8970000
|
heap
|
page read and write
|
||
249C000
|
stack
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
3740000
|
heap
|
page readonly
|
||
712B000
|
stack
|
page read and write
|
||
6FFC000
|
stack
|
page read and write
|
||
4509000
|
stack
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
4490000
|
heap
|
page execute and read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
6647000
|
heap
|
page read and write
|
||
4CAF000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
5605000
|
heap
|
page read and write
|
||
6C5B000
|
stack
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
7D6D000
|
trusted library allocation
|
page read and write
|
||
4B6B000
|
trusted library allocation
|
page read and write
|
||
7E0A000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page execute and read and write
|
||
4565000
|
heap
|
page execute and read and write
|
||
5330000
|
trusted library section
|
page readonly
|
||
8722000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
7D0A000
|
trusted library allocation
|
page read and write
|
||
5B9F000
|
stack
|
page read and write
|
||
5B31000
|
trusted library allocation
|
page read and write
|
||
8A70000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
85F0000
|
trusted library allocation
|
page read and write
|
||
3636000
|
heap
|
page read and write
|
||
8120000
|
trusted library allocation
|
page execute and read and write
|
||
783B000
|
trusted library allocation
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
126C000
|
heap
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
41B4000
|
trusted library allocation
|
page read and write
|
||
3697000
|
heap
|
page read and write
|
||
7ECC000
|
heap
|
page read and write
|
||
796A000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
44CD000
|
stack
|
page read and write
|
||
7F2C000
|
heap
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
7AA2000
|
heap
|
page read and write
|
||
703C000
|
stack
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
5318000
|
trusted library allocation
|
page read and write
|
||
8C7E000
|
stack
|
page read and write
|
||
4C9E000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
8920000
|
trusted library allocation
|
page execute and read and write
|
||
6FD9000
|
heap
|
page read and write
|
||
713A000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
8A60000
|
trusted library allocation
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
638C000
|
stack
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
8930000
|
trusted library allocation
|
page read and write
|
||
8AE0000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
663D000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
37D0000
|
heap
|
page read and write
|
||
8FD0000
|
trusted library allocation
|
page execute and read and write
|
||
1364000
|
heap
|
page read and write
|
||
1756000
|
heap
|
page read and write
|
||
108B000
|
stack
|
page read and write
|
||
4A28000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
5546000
|
trusted library allocation
|
page read and write
|
||
6FF2000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page execute and read and write
|
||
1218000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
773F000
|
heap
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
872D000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
7C24000
|
heap
|
page read and write
|
||
7A7F000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
77D6000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
7F000000
|
trusted library allocation
|
page execute and read and write
|
||
3475000
|
heap
|
page read and write
|
||
8499000
|
stack
|
page read and write
|
||
8BA6000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page execute and read and write
|
||
3238000
|
heap
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
2ACD000
|
trusted library allocation
|
page execute and read and write
|
||
3470000
|
heap
|
page read and write
|
||
7022000
|
heap
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page readonly
|
||
551C000
|
stack
|
page read and write
|
||
35A9000
|
trusted library allocation
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
6631000
|
heap
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page execute and read and write
|
||
73BE000
|
stack
|
page read and write
|
||
1162000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
634B000
|
stack
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
45F6000
|
trusted library allocation
|
page read and write
|
||
5116000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page execute and read and write
|
||
7700000
|
heap
|
page read and write
|
||
2C9B000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
15DD000
|
trusted library allocation
|
page execute and read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
70C5000
|
heap
|
page read and write
|
||
8A4E000
|
stack
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
8B9E000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
321A000
|
trusted library allocation
|
page execute and read and write
|
||
6C9B000
|
stack
|
page read and write
|
||
265C000
|
stack
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
7E30000
|
heap
|
page read and write
|
||
2888000
|
heap
|
page read and write
|
||
4CA7000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
893B000
|
trusted library allocation
|
page read and write
|
||
8E80000
|
trusted library allocation
|
page read and write
|
||
8AD8000
|
heap
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
7F04000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page execute and read and write
|
||
13CE000
|
stack
|
page read and write
|
||
8D10000
|
trusted library allocation
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
7BB0000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
7BF7000
|
heap
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
42B0000
|
heap
|
page read and write
|
||
4F09000
|
trusted library allocation
|
page read and write
|
||
7F018000
|
trusted library allocation
|
page execute and read and write
|
||
287E000
|
stack
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
1188000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
366A000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
8AE4000
|
heap
|
page read and write
|
||
7140000
|
heap
|
page execute and read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
8330000
|
trusted library allocation
|
page read and write
|
||
734A000
|
stack
|
page read and write
|
||
8678000
|
heap
|
page read and write
|
||
4EBB000
|
trusted library allocation
|
page read and write
|
||
7329000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
74D2000
|
trusted library allocation
|
page read and write
|
||
6FA9000
|
heap
|
page read and write
|
||
6A8D000
|
stack
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
2CB6000
|
trusted library allocation
|
page read and write
|
||
3750000
|
heap
|
page execute and read and write
|
||
132C000
|
heap
|
page read and write
|
||
4BC6000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
8BFE000
|
stack
|
page read and write
|
||
8AD0000
|
heap
|
page read and write
|
||
6738000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page execute and read and write
|
||
4A10000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
32A9000
|
stack
|
page read and write
|
||
792F000
|
stack
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
8ADC000
|
heap
|
page read and write
|
||
31D0000
|
trusted library section
|
page read and write
|
||
290C000
|
heap
|
page read and write
|
||
64BD000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
792D000
|
stack
|
page read and write
|
||
70AD000
|
heap
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
6496000
|
trusted library allocation
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
6EE2000
|
heap
|
page read and write
|
||
36D5000
|
heap
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
8910000
|
heap
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
75FB000
|
stack
|
page read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
7F1B000
|
heap
|
page read and write
|
||
870E000
|
heap
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page execute and read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
362A000
|
heap
|
page read and write
|
||
7C36000
|
heap
|
page read and write
|
||
4C66000
|
trusted library allocation
|
page read and write
|
||
497E000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
4D4B000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
6ACA000
|
stack
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
89E3000
|
trusted library allocation
|
page read and write
|
||
8C3D000
|
stack
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library section
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
4AC7000
|
heap
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page read and write
|
||
7E07000
|
trusted library allocation
|
page read and write
|
||
7F94000
|
heap
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
3768000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
4BBE000
|
trusted library allocation
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
heap
|
page read and write
|
||
7FC8000
|
heap
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
44A1000
|
trusted library allocation
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page execute and read and write
|
||
7024000
|
heap
|
page read and write
|
||
431C000
|
stack
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
7FDC0000
|
trusted library allocation
|
page execute and read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
9059000
|
stack
|
page read and write
|
||
2952000
|
heap
|
page read and write
|
||
7360000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
3076000
|
heap
|
page read and write
|
||
4E33000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
4CEB000
|
trusted library allocation
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
2BCC000
|
stack
|
page read and write
|
||
64D9000
|
trusted library allocation
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
662E000
|
heap
|
page read and write
|
||
8540000
|
heap
|
page read and write
|
||
8A0E000
|
stack
|
page read and write
|
||
8B7E000
|
stack
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
732D000
|
stack
|
page read and write
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
stack
|
page read and write
|
||
8BA1000
|
heap
|
page read and write
|
||
7EDC000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
86A2000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
28F6000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page execute and read and write
|
||
82BE000
|
stack
|
page read and write
|
||
858E000
|
stack
|
page read and write
|
||
35C7000
|
heap
|
page read and write
|
||
51EC000
|
trusted library allocation
|
page read and write
|
||
7570000
|
heap
|
page execute and read and write
|
||
52D0000
|
trusted library allocation
|
page execute and read and write
|
||
6209000
|
stack
|
page read and write
|
||
8CBF000
|
stack
|
page read and write
|
||
7E70000
|
heap
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
6D1D000
|
stack
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
89E0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
7800000
|
heap
|
page execute and read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
1133000
|
trusted library allocation
|
page execute and read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
heap
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
8CD2000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
4C17000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
4BD3000
|
trusted library allocation
|
page read and write
|
||
8B6B000
|
heap
|
page read and write
|
||
7067000
|
heap
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
77C6000
|
heap
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
heap
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
3225000
|
trusted library allocation
|
page execute and read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
42C8000
|
trusted library allocation
|
page read and write
|
||
64B1000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
6FDB000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
787B000
|
stack
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
7F8A000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
6617000
|
heap
|
page read and write
|
||
7F1C000
|
heap
|
page read and write
|
||
7D80000
|
heap
|
page read and write
|
||
28AB000
|
heap
|
page read and write
|
||
6F9D000
|
stack
|
page read and write
|
||
8E83000
|
trusted library allocation
|
page read and write
|
||
7EC4000
|
heap
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page execute and read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
2906000
|
heap
|
page read and write
|
||
1152000
|
trusted library allocation
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
4BCA000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
8CFE000
|
stack
|
page read and write
|
||
25E5000
|
heap
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
7DCF000
|
stack
|
page read and write
|
||
871A000
|
heap
|
page read and write
|
||
7EC8000
|
heap
|
page read and write
|
||
7D40000
|
heap
|
page execute and read and write
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
1143000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
893D000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
7042000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
5E5C000
|
stack
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
5647000
|
trusted library allocation
|
page read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
4180000
|
heap
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
24D8000
|
stack
|
page read and write
|
||
6B4C000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
698D000
|
stack
|
page read and write
|
||
71FF000
|
stack
|
page read and write
|
||
7897000
|
trusted library allocation
|
page read and write
|
||
72CB000
|
stack
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
3685000
|
heap
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
7290000
|
trusted library allocation
|
page execute and read and write
|
||
85D0000
|
heap
|
page read and write
|
||
70A7000
|
heap
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
7A3E000
|
stack
|
page read and write
|
||
290E000
|
heap
|
page read and write
|
||
41DA000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7C7C000
|
heap
|
page read and write
|
||
789A000
|
trusted library allocation
|
page read and write
|
||
77F2000
|
heap
|
page read and write
|
||
6ABD000
|
stack
|
page read and write
|
||
7793000
|
heap
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
6FD4000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
48AA000
|
trusted library allocation
|
page read and write
|
||
A5D0000
|
heap
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
6FE3000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
7F3E000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page execute and read and write
|
||
136E000
|
stack
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
89CD000
|
stack
|
page read and write
|
||
8D0F000
|
trusted library allocation
|
page read and write
|
||
706E000
|
heap
|
page read and write
|
||
737E000
|
trusted library allocation
|
page read and write
|
||
443C000
|
stack
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
76FA000
|
stack
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
stack
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
64A2000
|
trusted library allocation
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
851D000
|
stack
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
7055000
|
heap
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page execute and read and write
|
||
700F000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
8660000
|
heap
|
page read and write
|
||
84CF000
|
stack
|
page read and write
|
||
8139000
|
trusted library allocation
|
page read and write
|
||
8B48000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
7340000
|
trusted library allocation
|
page read and write
|
||
77A8000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
15E2000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
trusted library section
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
7FA4000
|
heap
|
page read and write
|
||
7137000
|
trusted library allocation
|
page read and write
|
||
8ECE000
|
stack
|
page read and write
|
||
114D000
|
trusted library allocation
|
page execute and read and write
|
||
84CD000
|
stack
|
page read and write
|
||
8B1D000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
7D9D000
|
stack
|
page read and write
|
||
2969000
|
heap
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
70EF000
|
stack
|
page read and write
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
8610000
|
trusted library allocation
|
page execute and read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
74AC000
|
stack
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
7D8E000
|
stack
|
page read and write
|
||
83AE000
|
stack
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
7170000
|
heap
|
page execute and read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
69B0000
|
heap
|
page read and write
|
||
7375000
|
trusted library allocation
|
page read and write
|
||
7316000
|
trusted library allocation
|
page read and write
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
5717000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page read and write
|
||
8CF0000
|
trusted library allocation
|
page execute and read and write
|
||
84FE000
|
stack
|
page read and write
|
||
866C000
|
heap
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
8B38000
|
heap
|
page read and write
|
||
71D0000
|
trusted library section
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
6717000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
8BAC000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page execute and read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page execute and read and write
|
||
286E000
|
stack
|
page read and write
|
||
7F00000
|
heap
|
page read and write
|
||
8273000
|
trusted library allocation
|
page read and write
|
||
7350000
|
trusted library allocation
|
page read and write
|
||
77B6000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
7FE4000
|
heap
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
5CDD000
|
stack
|
page read and write
|
||
7DEE000
|
stack
|
page read and write
|
||
7D6B000
|
trusted library allocation
|
page read and write
|
||
4AE4000
|
trusted library allocation
|
page read and write
|
||
7D2B000
|
trusted library allocation
|
page read and write
|
||
5343000
|
heap
|
page read and write
|
||
7F57000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
6489000
|
stack
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
778E000
|
heap
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
1657000
|
heap
|
page read and write
|
||
86FA000
|
heap
|
page read and write
|
||
77DE000
|
heap
|
page read and write
|
||
7F0C000
|
heap
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page execute and read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
4E97000
|
trusted library allocation
|
page read and write
|
||
73FF000
|
stack
|
page read and write
|
||
15C3000
|
trusted library allocation
|
page execute and read and write
|
||
435C000
|
stack
|
page read and write
|
||
8BB9000
|
stack
|
page read and write
|
||
7250000
|
trusted library allocation
|
page execute and read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
2756000
|
heap
|
page read and write
|
||
783D000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
7003000
|
heap
|
page read and write
|
||
8BC3000
|
heap
|
page read and write
|
||
724D000
|
stack
|
page read and write
|
||
3DE9000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
859E000
|
stack
|
page read and write
|
||
7F18000
|
heap
|
page read and write
|
||
6780000
|
trusted library allocation
|
page execute and read and write
|
||
11B3000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
7E4D000
|
stack
|
page read and write
|
||
911E000
|
stack
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
41E5000
|
trusted library allocation
|
page execute and read and write
|
||
67E0000
|
heap
|
page read and write
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page execute and read and write
|
||
2910000
|
heap
|
page read and write
|
||
69A5000
|
heap
|
page execute and read and write
|
||
64F0000
|
heap
|
page read and write
|
||
1156000
|
trusted library allocation
|
page execute and read and write
|
||
7360000
|
heap
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
7F80000
|
trusted library section
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
64B6000
|
trusted library allocation
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
8D09000
|
trusted library allocation
|
page read and write
|
||
8D20000
|
trusted library allocation
|
page read and write
|
||
4C33000
|
trusted library allocation
|
page read and write
|
||
4377000
|
heap
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
855E000
|
stack
|
page read and write
|
||
6B8C000
|
stack
|
page read and write
|
||
572E000
|
trusted library allocation
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
727D000
|
stack
|
page read and write
|
||
6AFB000
|
stack
|
page read and write
|
||
2C7B000
|
stack
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
299C000
|
heap
|
page read and write
|
||
746D000
|
stack
|
page read and write
|
||
28C8000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
2699000
|
stack
|
page read and write
|
||
7010000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
4A00000
|
heap
|
page readonly
|
||
35D5000
|
trusted library allocation
|
page execute and read and write
|
||
36E1000
|
heap
|
page read and write
|
||
3594000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
heap
|
page execute and read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
664D000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page execute and read and write
|
||
2EAA000
|
trusted library allocation
|
page read and write
|
||
4290000
|
heap
|
page readonly
|
||
2984000
|
heap
|
page read and write
|
||
7C7A000
|
heap
|
page read and write
|
||
41C0000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
13F7000
|
heap
|
page read and write
|
||
624C000
|
stack
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
6CDD000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
7F14000
|
heap
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
7785000
|
heap
|
page read and write
|
||
8AD4000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
8A6E000
|
stack
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
7840000
|
trusted library allocation
|
page execute and read and write
|
||
43FC000
|
stack
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
85C2000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
7C94000
|
heap
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
4BCF000
|
trusted library allocation
|
page read and write
|
||
5656000
|
trusted library allocation
|
page read and write
|
||
6494000
|
trusted library allocation
|
page read and write
|
||
41E2000
|
trusted library allocation
|
page read and write
|
||
4A1A000
|
trusted library allocation
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
850E000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page execute and read and write
|
||
7602000
|
heap
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
7ED4000
|
heap
|
page read and write
|
||
113D000
|
trusted library allocation
|
page execute and read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
70AF000
|
heap
|
page read and write
|
||
115A000
|
trusted library allocation
|
page execute and read and write
|
||
45DC000
|
trusted library allocation
|
page read and write
|
||
722C000
|
stack
|
page read and write
|
||
69CB000
|
stack
|
page read and write
|
||
82FF000
|
stack
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page execute and read and write
|
||
2F3D000
|
stack
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
7F02000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
8102000
|
trusted library allocation
|
page read and write
|
||
7EF08000
|
trusted library allocation
|
page execute and read and write
|
||
4CA3000
|
trusted library allocation
|
page read and write
|
||
7E7E000
|
stack
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
77D8000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
25DF000
|
stack
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
8B90000
|
heap
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
8728000
|
heap
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
3593000
|
trusted library allocation
|
page execute and read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page execute and read and write
|
||
81BC000
|
stack
|
page read and write
|
||
743D000
|
stack
|
page read and write
|
||
6BFA000
|
stack
|
page read and write
|
||
15C4000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
4AB5000
|
heap
|
page execute and read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
2992000
|
heap
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
79AD000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
157E000
|
stack
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
649B000
|
trusted library allocation
|
page read and write
|
||
5CBB000
|
trusted library allocation
|
page read and write
|
||
8B89000
|
heap
|
page read and write
|
||
8980000
|
heap
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
6FC8000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
7DDF000
|
stack
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
A7CE000
|
stack
|
page read and write
|
||
31F3000
|
trusted library allocation
|
page execute and read and write
|
||
7EC0000
|
heap
|
page read and write
|
||
6177000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
1134000
|
trusted library allocation
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library allocation
|
page read and write
|
||
736C000
|
stack
|
page read and write
|
||
616F000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
7FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
7F890000
|
trusted library allocation
|
page execute and read and write
|
||
817E000
|
stack
|
page read and write
|
||
3368000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
813F000
|
trusted library allocation
|
page read and write
|
||
5728000
|
trusted library allocation
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
8B12000
|
heap
|
page read and write
|
||
BE7000
|
stack
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
4560000
|
heap
|
page execute and read and write
|
||
840D000
|
stack
|
page read and write
|
||
8664000
|
heap
|
page read and write
|
||
41B3000
|
trusted library allocation
|
page execute and read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
6C1D000
|
stack
|
page read and write
|
||
41BD000
|
trusted library allocation
|
page execute and read and write
|
||
8F0E000
|
stack
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
AEA000
|
stack
|
page read and write
|
||
6C9D000
|
stack
|
page read and write
|
||
4BC2000
|
trusted library allocation
|
page read and write
|
||
1167000
|
trusted library allocation
|
page execute and read and write
|
||
41B0000
|
trusted library allocation
|
page read and write
|
||
326C000
|
stack
|
page read and write
|
||
7099000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
901D000
|
stack
|
page read and write
|
||
80C2000
|
trusted library allocation
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
46D6000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
heap
|
page read and write
|
||
722A000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
7049000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page execute and read and write
|
||
28EA000
|
heap
|
page read and write
|
||
8674000
|
heap
|
page read and write
|
||
80F0000
|
trusted library allocation
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
77AD000
|
heap
|
page read and write
|
||
7F20000
|
heap
|
page read and write
|
||
699B000
|
stack
|
page read and write
|
||
5737000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
7E7E000
|
stack
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
8870000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
7FDB8000
|
trusted library allocation
|
page execute and read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
8670000
|
heap
|
page read and write
|
||
7FDD8000
|
trusted library allocation
|
page execute and read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page execute and read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
8CBD000
|
stack
|
page read and write
|
||
7C29000
|
heap
|
page read and write
|
||
75AD000
|
stack
|
page read and write
|
||
7C3D000
|
heap
|
page read and write
|
||
7FA8000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
5023000
|
trusted library allocation
|
page read and write
|
||
8A80000
|
trusted library allocation
|
page read and write
|
||
116B000
|
trusted library allocation
|
page execute and read and write
|
||
6600000
|
heap
|
page read and write
|
||
7E2F000
|
stack
|
page read and write
|
||
783E000
|
stack
|
page read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
8B30000
|
trusted library allocation
|
page execute and read and write
|
||
2880000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
844B000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
7D2D000
|
trusted library allocation
|
page read and write
|
||
36B8000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7D07000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
37D8000
|
heap
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page execute and read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
7390000
|
trusted library allocation
|
page execute and read and write
|
||
8A2E000
|
stack
|
page read and write
|
||
7F9E000
|
heap
|
page read and write
|
||
8B2A000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
6E92000
|
heap
|
page read and write
|
||
8668000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
359D000
|
trusted library allocation
|
page execute and read and write
|
||
64C2000
|
trusted library allocation
|
page read and write
|
||
2AC3000
|
trusted library allocation
|
page execute and read and write
|
||
31FD000
|
trusted library allocation
|
page execute and read and write
|
||
7F30000
|
trusted library allocation
|
page read and write
|
||
702D000
|
heap
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
7C6F000
|
stack
|
page read and write
|
||
7FD10000
|
trusted library allocation
|
page execute and read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
7F7E000
|
heap
|
page read and write
|
||
185D000
|
stack
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
7F64000
|
heap
|
page read and write
|
||
747B000
|
stack
|
page read and write
|
||
7BC9000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page execute and read and write
|
||
7EEF0000
|
trusted library allocation
|
page execute and read and write
|
||
7F42000
|
heap
|
page read and write
|
||
2AF5000
|
trusted library allocation
|
page execute and read and write
|
||
7F93000
|
heap
|
page read and write
|
||
5CC3000
|
trusted library allocation
|
page read and write
|
||
779C000
|
heap
|
page read and write
|
||
8333000
|
trusted library allocation
|
page read and write
|
||
8360000
|
trusted library allocation
|
page execute and read and write
|
||
5720000
|
heap
|
page read and write
|
||
4CAB000
|
trusted library allocation
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
7BEF000
|
heap
|
page read and write
|
||
8D00000
|
trusted library allocation
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
859C000
|
stack
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
5FC1000
|
trusted library allocation
|
page read and write
|
||
7575000
|
heap
|
page execute and read and write
|
||
7C12000
|
heap
|
page read and write
|
||
695D000
|
stack
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
5CA3000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
unkown
|
page readonly
|
||
7710000
|
heap
|
page read and write
|
||
7A63000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
7028000
|
heap
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
5246000
|
trusted library allocation
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
7FD0000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
700A000
|
heap
|
page read and write
|
||
7775000
|
heap
|
page read and write
|
||
41A0000
|
trusted library allocation
|
page read and write
|
There are 1003 hidden memdumps, click here to show them.