Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ekzbwv0.p1r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wjuv0yg.gdq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45trmmj0.et1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4affsnnl.cx0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4k4ffrjg.rsw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5d2ki1vs.kv5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cp2etgf2.dg3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dqkphgh1.ems.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esz3eelj.ihu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghjd1qdr.q0h.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ji3rva4a.kx0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l52mmcxd.dra.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1wssa4w.kiu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nobnflej.mbh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voj25otp.zt1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z53vlonu.rh4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 26 06:29:55
2024, mtime=Thu Sep 26 06:29:55 2024, atime=Thu Sep 26 06:29:55 2024, length=467456, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
|
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\DRAFT
BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DRAFT
BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
104.250.180.178
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.microsoft.dgx
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://crl.microso
|
unknown
|
||
https://aka.ms/pscore6lBdq
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.micr.
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 34 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.250.180.178
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2911000
|
trusted library allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
29D8000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
84D4000
|
heap
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
4D16000
|
trusted library allocation
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
499D000
|
trusted library allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
7F0D000
|
stack
|
page read and write
|
||
2858000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page execute and read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
71FB000
|
heap
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
3147000
|
heap
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
774E000
|
heap
|
page read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
7AD8000
|
trusted library allocation
|
page read and write
|
||
8062000
|
heap
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page execute and read and write
|
||
6C89000
|
stack
|
page read and write
|
||
5286000
|
trusted library allocation
|
page read and write
|
||
4CD9000
|
trusted library allocation
|
page read and write
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
748C000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2E78000
|
stack
|
page read and write
|
||
2FC3000
|
trusted library allocation
|
page execute and read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
815B000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
ABD000
|
heap
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
8640000
|
trusted library allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
8711000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
715A000
|
heap
|
page read and write
|
||
59D0000
|
heap
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
8222000
|
trusted library allocation
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
E87000
|
trusted library allocation
|
page execute and read and write
|
||
A50000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
80ED000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
D4D000
|
trusted library allocation
|
page execute and read and write
|
||
8720000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
862E000
|
stack
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
C64000
|
trusted library allocation
|
page read and write
|
||
833E000
|
heap
|
page read and write
|
||
845C000
|
stack
|
page read and write
|
||
71C0000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
74E4000
|
heap
|
page read and write
|
||
3BD8000
|
trusted library allocation
|
page read and write
|
||
709B000
|
stack
|
page read and write
|
||
2A40000
|
trusted library section
|
page read and write
|
||
5FA000
|
stack
|
page read and write
|
||
767D000
|
stack
|
page read and write
|
||
749E000
|
heap
|
page read and write
|
||
87C9000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2DE5000
|
heap
|
page read and write
|
||
326A000
|
trusted library allocation
|
page execute and read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
6C3A000
|
stack
|
page read and write
|
||
892D000
|
stack
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
84E0000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
2C88000
|
heap
|
page read and write
|
||
7F77000
|
trusted library allocation
|
page read and write
|
||
6C8C000
|
stack
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
4FD5000
|
trusted library allocation
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
4F34000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
heap
|
page execute and read and write
|
||
4BAB000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
48F2000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
heap
|
page execute and read and write
|
||
8354000
|
heap
|
page read and write
|
||
6EAE000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
7486000
|
heap
|
page read and write
|
||
81CE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
4977000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
8472000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
893E000
|
stack
|
page read and write
|
||
6D8D000
|
stack
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4B05000
|
trusted library allocation
|
page read and write
|
||
75D2000
|
heap
|
page read and write
|
||
7755000
|
heap
|
page read and write
|
||
313A000
|
heap
|
page read and write
|
||
78B000
|
stack
|
page read and write
|
||
7F130000
|
trusted library allocation
|
page execute and read and write
|
||
3000000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page readonly
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
6D65000
|
heap
|
page execute and read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
5093000
|
heap
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
318B000
|
heap
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page execute and read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
3070000
|
trusted library allocation
|
page execute and read and write
|
||
87B7000
|
heap
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
72AA000
|
stack
|
page read and write
|
||
51D0000
|
heap
|
page execute and read and write
|
||
752D000
|
heap
|
page read and write
|
||
5D99000
|
stack
|
page read and write
|
||
86BD000
|
stack
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
45A1000
|
trusted library allocation
|
page read and write
|
||
85A9000
|
stack
|
page read and write
|
||
803C000
|
heap
|
page read and write
|
||
495C000
|
stack
|
page read and write
|
||
4E33000
|
heap
|
page read and write
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
76DA000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library section
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
703C000
|
stack
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
82EC000
|
heap
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page execute and read and write
|
||
885E000
|
stack
|
page read and write
|
||
850B000
|
trusted library allocation
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
7522000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
8085000
|
heap
|
page read and write
|
||
734F000
|
stack
|
page read and write
|
||
74E9000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
6B0F000
|
stack
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
3259000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
8BEE000
|
stack
|
page read and write
|
||
718C000
|
stack
|
page read and write
|
||
80B7000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
7F758000
|
trusted library allocation
|
page execute and read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
heap
|
page read and write
|
||
4D24000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
80E7000
|
heap
|
page read and write
|
||
7207000
|
heap
|
page read and write
|
||
6EEA000
|
stack
|
page read and write
|
||
725E000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
D53000
|
trusted library allocation
|
page read and write
|
||
4CDB000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
6F9A000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page readonly
|
||
80FD000
|
heap
|
page read and write
|
||
77A6000
|
heap
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page execute and read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
trusted library allocation
|
page execute and read and write
|
||
80DF000
|
heap
|
page read and write
|
||
6E3A000
|
stack
|
page read and write
|
||
2F44000
|
heap
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
2E0D000
|
stack
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
878D000
|
stack
|
page read and write
|
||
7F50000
|
heap
|
page read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
CA7000
|
trusted library allocation
|
page execute and read and write
|
||
5747000
|
trusted library allocation
|
page read and write
|
||
88B3000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
7E9B000
|
trusted library allocation
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
7F148000
|
trusted library allocation
|
page execute and read and write
|
||
722F000
|
stack
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page execute and read and write
|
||
2C00000
|
heap
|
page read and write
|
||
71B4000
|
heap
|
page read and write
|
||
74CB000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
7458000
|
heap
|
page read and write
|
||
5216000
|
trusted library allocation
|
page read and write
|
||
83C4000
|
heap
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
CA2000
|
trusted library allocation
|
page read and write
|
||
2ECA000
|
trusted library allocation
|
page execute and read and write
|
||
5744000
|
trusted library allocation
|
page read and write
|
||
84C0000
|
heap
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
8034000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
2966000
|
heap
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
889C000
|
stack
|
page read and write
|
||
52E6000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
531C000
|
trusted library allocation
|
page read and write
|
||
7591000
|
heap
|
page read and write
|
||
2EAD000
|
trusted library allocation
|
page execute and read and write
|
||
83A4000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
F4C000
|
stack
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
25BC000
|
stack
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page execute and read and write
|
||
67FD000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page execute and read and write
|
||
752E000
|
stack
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
2FEA000
|
trusted library allocation
|
page execute and read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
7F740000
|
trusted library allocation
|
page execute and read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
7219000
|
heap
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page execute and read and write
|
||
7499000
|
heap
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
741D000
|
heap
|
page read and write
|
||
856D000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
835D000
|
stack
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
5754000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5B19000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
4F2000
|
unkown
|
page readonly
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
88BE000
|
stack
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
71C0000
|
trusted library section
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
820E000
|
stack
|
page read and write
|
||
7055000
|
heap
|
page execute and read and write
|
||
CEE000
|
stack
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
8A1D000
|
stack
|
page read and write
|
||
52EA000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
7538000
|
heap
|
page read and write
|
||
58F8000
|
trusted library allocation
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
74BB000
|
heap
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
744D000
|
heap
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
8028000
|
heap
|
page read and write
|
||
74F3000
|
heap
|
page read and write
|
||
836C000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
8D2D000
|
stack
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
8210000
|
heap
|
page read and write
|
||
8705000
|
heap
|
page read and write
|
||
86E4000
|
heap
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
6DBB000
|
stack
|
page read and write
|
||
F86000
|
trusted library allocation
|
page read and write
|
||
7747000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
6BFC000
|
stack
|
page read and write
|
||
52DE000
|
heap
|
page read and write
|
||
4430000
|
trusted library allocation
|
page execute and read and write
|
||
5E00000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
83B2000
|
heap
|
page read and write
|
||
795B000
|
stack
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page execute and read and write
|
||
83B8000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
5A1A000
|
stack
|
page read and write
|
||
6AC2000
|
trusted library allocation
|
page read and write
|
||
7568000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
8130000
|
heap
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
73BA000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
503A000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page execute and read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
782A000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
7F4F000
|
stack
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
82C0000
|
heap
|
page read and write
|
||
825E000
|
stack
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
6B4C000
|
stack
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
8713000
|
trusted library allocation
|
page read and write
|
||
4FD7000
|
trusted library allocation
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
46F6000
|
trusted library allocation
|
page read and write
|
||
8520000
|
trusted library allocation
|
page execute and read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
4AFD000
|
trusted library allocation
|
page read and write
|
||
8ADE000
|
stack
|
page read and write
|
||
77FD000
|
stack
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
4E09000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page readonly
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
5060000
|
trusted library allocation
|
page execute and read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page execute and read and write
|
||
8332000
|
heap
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
7E9D000
|
trusted library allocation
|
page read and write
|
||
83EE000
|
stack
|
page read and write
|
||
7379000
|
trusted library allocation
|
page read and write
|
||
857D000
|
stack
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page execute and read and write
|
||
276E000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
82EB000
|
trusted library allocation
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
82E3000
|
heap
|
page read and write
|
||
7F120000
|
trusted library allocation
|
page execute and read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
705D000
|
stack
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
7A1D000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page execute and read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
74B4000
|
heap
|
page read and write
|
||
8715000
|
heap
|
page read and write
|
||
5C9C000
|
stack
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
7205000
|
heap
|
page read and write
|
||
701F000
|
stack
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
2FC8000
|
heap
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
C9A000
|
trusted library allocation
|
page execute and read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
8022000
|
heap
|
page read and write
|
||
5891000
|
trusted library allocation
|
page read and write
|
||
8740000
|
trusted library allocation
|
page execute and read and write
|
||
52D9000
|
trusted library allocation
|
page read and write
|
||
F81000
|
trusted library allocation
|
page read and write
|
||
7827000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
746E000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
73CD000
|
stack
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
74F0000
|
heap
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
4CB8000
|
trusted library allocation
|
page read and write
|
||
8512000
|
heap
|
page read and write
|
||
71D5000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page execute and read and write
|
||
2E70000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page execute and read and write
|
||
2BF7000
|
heap
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
25F8000
|
stack
|
page read and write
|
||
83A0000
|
heap
|
page read and write
|
||
74AA000
|
heap
|
page read and write
|
||
5020000
|
trusted library section
|
page readonly
|
||
82ED000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
heap
|
page execute and read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
87A3000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
4B9C000
|
stack
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
CAB000
|
trusted library allocation
|
page execute and read and write
|
||
B0A000
|
heap
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
4A8D000
|
stack
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
80FA000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
851F000
|
heap
|
page read and write
|
||
7557000
|
trusted library allocation
|
page read and write
|
||
456C000
|
stack
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
4FBA000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
802C000
|
heap
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page execute and read and write
|
||
2F97000
|
heap
|
page read and write
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
7FD70000
|
trusted library allocation
|
page execute and read and write
|
||
83D3000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
71CD000
|
heap
|
page read and write
|
||
8A9E000
|
stack
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
heap
|
page read and write
|
||
8BA0000
|
trusted library allocation
|
page execute and read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
2DE9000
|
heap
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
83A7000
|
heap
|
page read and write
|
||
3318000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
755A000
|
trusted library allocation
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
5C5D000
|
stack
|
page read and write
|
||
87B0000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page execute and read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
71DE000
|
heap
|
page read and write
|
||
4590000
|
heap
|
page execute and read and write
|
||
4DFB000
|
trusted library allocation
|
page read and write
|
||
699D000
|
stack
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
29D6000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
51FD000
|
trusted library allocation
|
page read and write
|
||
71A4000
|
heap
|
page read and write
|
||
54E0000
|
trusted library section
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page read and write
|
||
711B000
|
stack
|
page read and write
|
||
52DE000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
71E5000
|
heap
|
page read and write
|
||
E8B000
|
trusted library allocation
|
page execute and read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
8591000
|
heap
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
heap
|
page execute and read and write
|
||
870D000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
C92000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
6DCC000
|
stack
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
8700000
|
heap
|
page read and write
|
||
871D000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
82FC000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
285C000
|
stack
|
page read and write
|
||
2F3C000
|
heap
|
page read and write
|
||
47EC000
|
stack
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
799F000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
84E2000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
heap
|
page read and write
|
||
7FAC8000
|
trusted library allocation
|
page execute and read and write
|
||
732E000
|
stack
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
76EF000
|
heap
|
page read and write
|
||
C96000
|
trusted library allocation
|
page execute and read and write
|
||
DAE000
|
heap
|
page read and write
|
||
8140000
|
trusted library allocation
|
page execute and read and write
|
||
75AF000
|
stack
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
2ED5000
|
trusted library allocation
|
page execute and read and write
|
||
82E0000
|
heap
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
7F928000
|
trusted library allocation
|
page execute and read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
841E000
|
stack
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page execute and read and write
|
||
88E0000
|
trusted library allocation
|
page execute and read and write
|
||
E8E000
|
heap
|
page read and write
|
||
8768000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page execute and read and write
|
||
7503000
|
heap
|
page read and write
|
||
7550000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
85EE000
|
stack
|
page read and write
|
||
86E0000
|
heap
|
page read and write
|
||
7552000
|
heap
|
page read and write
|
||
8382000
|
heap
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
7F70000
|
trusted library allocation
|
page read and write
|
||
7440000
|
heap
|
page execute and read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
3919000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
776C000
|
heap
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
529D000
|
stack
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
527A000
|
trusted library allocation
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
F6B000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
heap
|
page read and write
|
||
7762000
|
heap
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
E76000
|
trusted library allocation
|
page execute and read and write
|
||
7757000
|
heap
|
page read and write
|
||
77CC000
|
heap
|
page read and write
|
||
71AB000
|
stack
|
page read and write
|
||
84E0000
|
heap
|
page read and write
|
||
8400000
|
trusted library allocation
|
page read and write
|
||
7850000
|
heap
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
6DFD000
|
stack
|
page read and write
|
||
3118000
|
heap
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
71AA000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page execute and read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
3243000
|
trusted library allocation
|
page execute and read and write
|
||
5050000
|
heap
|
page read and write
|
||
775B000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
85BF000
|
stack
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
867E000
|
stack
|
page read and write
|
||
8DAF000
|
stack
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
6FBF000
|
stack
|
page read and write
|
||
719D000
|
heap
|
page read and write
|
||
3244000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
heap
|
page execute and read and write
|
||
4B51000
|
trusted library allocation
|
page read and write
|
||
76D7000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
6DEB000
|
stack
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
7880000
|
heap
|
page execute and read and write
|
||
82F0000
|
trusted library allocation
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
860E000
|
stack
|
page read and write
|
||
7320000
|
heap
|
page read and write
|
||
7FC0000
|
trusted library allocation
|
page read and write
|
||
6200000
|
heap
|
page read and write
|
||
856E000
|
stack
|
page read and write
|
||
8710000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
7FD0000
|
trusted library allocation
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
8CAB000
|
stack
|
page read and write
|
||
4E23000
|
trusted library allocation
|
page read and write
|
||
3B9B000
|
trusted library allocation
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
3275000
|
trusted library allocation
|
page execute and read and write
|
||
74AA000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
716D000
|
stack
|
page read and write
|
||
8410000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
718C000
|
heap
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
573F000
|
stack
|
page read and write
|
||
85AC000
|
heap
|
page read and write
|
||
82D0000
|
trusted library allocation
|
page execute and read and write
|
||
719B000
|
stack
|
page read and write
|
||
8A53000
|
trusted library allocation
|
page read and write
|
||
8B1E000
|
stack
|
page read and write
|
||
2C79000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
839F000
|
heap
|
page read and write
|
||
84E4000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
74DA000
|
heap
|
page read and write
|
||
86E8000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
8C6D000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
71A0000
|
heap
|
page read and write
|
||
6B3B000
|
stack
|
page read and write
|
||
86D0000
|
heap
|
page read and write
|
||
6FF2000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
4908000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
84D0000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page execute and read and write
|
||
82F8000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
8322000
|
heap
|
page read and write
|
||
754E000
|
heap
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
7F7A000
|
trusted library allocation
|
page read and write
|
||
4DE2000
|
trusted library allocation
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
5DA6000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
8692000
|
trusted library allocation
|
page read and write
|
||
86BE000
|
stack
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
50D8000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
6F6C000
|
stack
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
4E8D000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
84D8000
|
heap
|
page read and write
|
||
72A0000
|
heap
|
page execute and read and write
|
||
4CA6000
|
trusted library allocation
|
page read and write
|
||
7F910000
|
trusted library allocation
|
page execute and read and write
|
||
CF0000
|
heap
|
page read and write
|
||
87BD000
|
heap
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
897F000
|
stack
|
page read and write
|
||
7198000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
8D6E000
|
stack
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page execute and read and write
|
||
6DAD000
|
stack
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
887B000
|
stack
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
5236000
|
trusted library allocation
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page execute and read and write
|
||
EF0000
|
trusted library allocation
|
page execute and read and write
|
||
563E000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page execute and read and write
|
||
7100000
|
trusted library allocation
|
page execute and read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
7380000
|
trusted library allocation
|
page execute and read and write
|
||
482C000
|
stack
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
8743000
|
heap
|
page read and write
|
||
8ADE000
|
stack
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
858B000
|
heap
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
4D65000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
8CEE000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
8372000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
69DB000
|
stack
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
75BE000
|
stack
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page execute and read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
74B1000
|
heap
|
page read and write
|
||
75FF000
|
stack
|
page read and write
|
||
74DE000
|
heap
|
page read and write
|
||
832E000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
850D000
|
trusted library allocation
|
page read and write
|
||
4AB5000
|
heap
|
page execute and read and write
|
||
E19000
|
heap
|
page read and write
|
||
815D000
|
trusted library allocation
|
page read and write
|
||
86BF000
|
stack
|
page read and write
|
||
742D000
|
heap
|
page read and write
|
||
452C000
|
stack
|
page read and write
|
||
7713000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page execute and read and write
|
||
4B0F000
|
trusted library allocation
|
page read and write
|
||
8290000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
84EC000
|
heap
|
page read and write
|
||
8719000
|
heap
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
873F000
|
stack
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
8519000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
74F9000
|
heap
|
page read and write
|
||
8C29000
|
stack
|
page read and write
|
||
84E8000
|
heap
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
7500000
|
heap
|
page read and write
|
||
88F0000
|
trusted library allocation
|
page read and write
|
||
C8D000
|
trusted library allocation
|
page execute and read and write
|
||
85A2000
|
heap
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
6808000
|
heap
|
page read and write
|
||
67E9000
|
heap
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
555F000
|
trusted library allocation
|
page read and write
|
||
4891000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
7796000
|
heap
|
page read and write
|
||
C63000
|
trusted library allocation
|
page execute and read and write
|
||
8700000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page readonly
|
||
7E60000
|
heap
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
25FD000
|
stack
|
page read and write
|
||
2A8B000
|
heap
|
page read and write
|
||
8490000
|
trusted library allocation
|
page execute and read and write
|
||
574C000
|
trusted library allocation
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
716B000
|
stack
|
page read and write
|
||
4604000
|
trusted library allocation
|
page read and write
|
||
2778000
|
trusted library allocation
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
7153000
|
heap
|
page read and write
|
||
2AB8000
|
stack
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
501B000
|
stack
|
page read and write
|
||
C6D000
|
trusted library allocation
|
page execute and read and write
|
||
7500000
|
trusted library allocation
|
page execute and read and write
|
||
324D000
|
trusted library allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
4AF9000
|
stack
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
trusted library allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
73D0000
|
heap
|
page execute and read and write
|
||
839E000
|
stack
|
page read and write
|
||
72C1000
|
heap
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
749A000
|
heap
|
page read and write
|
||
82F0000
|
heap
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
69E5000
|
heap
|
page execute and read and write
|
||
859D000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
8500000
|
trusted library allocation
|
page execute and read and write
|
||
4CD5000
|
trusted library allocation
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute and read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
7050000
|
heap
|
page execute and read and write
|
||
776F000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
82E8000
|
heap
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
8709000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2EC7000
|
heap
|
page read and write
|
||
88FD000
|
stack
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
80C0000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
7472000
|
heap
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
726D000
|
stack
|
page read and write
|
There are 992 hidden memdumps, click here to show them.