Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3140, EUR.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3140, EUR.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpE737.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lkuPOyvaWlIu.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21y1z2oz.3h0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpwuiogt.yij.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0yqbczp.qe4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mswb0zbg.qqo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n004ova5.pic.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q2vtgbrs.lki.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sh1a2noa.sdj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4ps0e4k.ji4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp4A2.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\3140, EUR.exe
|
"C:\Users\user\Desktop\3140, EUR.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"
|
||
C:\Users\user\Desktop\3140, EUR.exe
|
"C:\Users\user\Desktop\3140, EUR.exe"
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
|
||
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
|
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://www.office.com/lB
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.8.169
|
||
http://quicklyserv.com
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
There are 43 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
quicklyserv.com
|
45.143.99.52
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.8.169
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
45.143.99.52
|
quicklyserv.com
|
Turkey
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.8.169
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3011000
|
trusted library allocation
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
4062000
|
trusted library allocation
|
page read and write
|
||
447D000
|
trusted library allocation
|
page read and write
|
||
337F000
|
trusted library allocation
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
6EB6000
|
trusted library allocation
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
BFB000
|
heap
|
page read and write
|
||
34CC000
|
trusted library allocation
|
page read and write
|
||
760F000
|
stack
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
6E87000
|
trusted library allocation
|
page read and write
|
||
3032000
|
trusted library allocation
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
trusted library allocation
|
page read and write
|
||
4372000
|
trusted library allocation
|
page read and write
|
||
4362000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
heap
|
page read and write
|
||
3035000
|
trusted library allocation
|
page execute and read and write
|
||
7A5C000
|
stack
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
4407000
|
trusted library allocation
|
page read and write
|
||
40E5000
|
trusted library allocation
|
page read and write
|
||
1541000
|
heap
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
41D000
|
remote allocation
|
page execute and read and write
|
||
6946000
|
heap
|
page read and write
|
||
4368000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
trusted library allocation
|
page execute and read and write
|
||
42E3000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
4F46000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
4303000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
4239000
|
trusted library allocation
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
33B8000
|
trusted library allocation
|
page read and write
|
||
29CB000
|
trusted library allocation
|
page read and write
|
||
55A000
|
stack
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
40CA000
|
trusted library allocation
|
page read and write
|
||
34FA000
|
trusted library allocation
|
page read and write
|
||
40B000
|
remote allocation
|
page execute and read and write
|
||
32AA000
|
trusted library allocation
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
4547000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
33DF000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
186D000
|
trusted library allocation
|
page execute and read and write
|
||
30CA000
|
trusted library allocation
|
page read and write
|
||
36E8000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
AC7000
|
trusted library allocation
|
page execute and read and write
|
||
158E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page execute and read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
31EE000
|
trusted library allocation
|
page read and write
|
||
7625000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
6E62000
|
trusted library allocation
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page execute and read and write
|
||
41A3000
|
trusted library allocation
|
page read and write
|
||
5C7D000
|
stack
|
page read and write
|
||
33B4000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
4223000
|
trusted library allocation
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
73EE000
|
stack
|
page read and write
|
||
6BDD000
|
stack
|
page read and write
|
||
2D5A000
|
trusted library allocation
|
page execute and read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page read and write
|
||
4392000
|
trusted library allocation
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
30BA000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
unkown
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
416000
|
remote allocation
|
page execute and read and write
|
||
4039000
|
trusted library allocation
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page execute and read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
4472000
|
trusted library allocation
|
page read and write
|
||
4495000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
4343000
|
trusted library allocation
|
page read and write
|
||
4011000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page execute and read and write
|
||
44CE000
|
trusted library allocation
|
page read and write
|
||
D86E000
|
stack
|
page read and write
|
||
B1D000
|
stack
|
page read and write
|
||
4AEC000
|
stack
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
B9D000
|
trusted library allocation
|
page execute and read and write
|
||
1876000
|
trusted library allocation
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
2E0C000
|
stack
|
page read and write
|
||
7421000
|
heap
|
page read and write
|
||
5A04000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
41E000
|
remote allocation
|
page execute and read and write
|
||
9B3000
|
trusted library allocation
|
page execute and read and write
|
||
5A06000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
stack
|
page read and write
|
||
3809000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
D66C000
|
stack
|
page read and write
|
||
4487000
|
trusted library allocation
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
548E000
|
stack
|
page read and write
|
||
3578000
|
trusted library allocation
|
page read and write
|
||
32B2000
|
trusted library allocation
|
page read and write
|
||
5726000
|
trusted library allocation
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
7600000
|
trusted library section
|
page read and write
|
||
31F2000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
412000
|
remote allocation
|
page execute and read and write
|
||
6F40000
|
trusted library allocation
|
page execute and read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
heap
|
page read and write
|
||
5D30000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
36B9000
|
trusted library allocation
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
6EE2000
|
trusted library allocation
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
42CE000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library section
|
page readonly
|
||
3801000
|
trusted library allocation
|
page read and write
|
||
4557000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
trusted library allocation
|
page execute and read and write
|
||
43A6000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
995E000
|
trusted library allocation
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
3037000
|
trusted library allocation
|
page execute and read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
BB9000
|
heap
|
page read and write
|
||
3517000
|
trusted library allocation
|
page read and write
|
||
32B6000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
6B1E000
|
heap
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
4485000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
7850000
|
trusted library allocation
|
page execute and read and write
|
||
402000
|
unkown
|
page readonly
|
||
C97000
|
heap
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
4E84000
|
heap
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
7340000
|
heap
|
page execute and read and write
|
||
43E3000
|
trusted library allocation
|
page read and write
|
||
32BA000
|
trusted library allocation
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
44E9000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
6B15000
|
heap
|
page read and write
|
||
4101000
|
trusted library allocation
|
page read and write
|
||
4587000
|
trusted library allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
D76C000
|
stack
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
380D000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
41BB000
|
trusted library allocation
|
page read and write
|
||
4144000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
4493000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
448C000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page execute and read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
5CB000
|
heap
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page execute and read and write
|
||
1469000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
413B000
|
trusted library allocation
|
page read and write
|
||
43C000
|
remote allocation
|
page execute and read and write
|
||
E5E000
|
stack
|
page read and write
|
||
453C000
|
trusted library allocation
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
4F4D000
|
trusted library allocation
|
page read and write
|
||
31F6000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4551000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
1177000
|
stack
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
432A000
|
trusted library allocation
|
page read and write
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
31BD000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
AC2000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
6AB1000
|
heap
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
7630000
|
trusted library allocation
|
page execute and read and write
|
||
F7F000
|
stack
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
41F4000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
5744000
|
trusted library allocation
|
page read and write
|
||
456A000
|
trusted library allocation
|
page read and write
|
||
412B000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
411E000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
trusted library allocation
|
page execute and read and write
|
||
2E40000
|
heap
|
page read and write
|
||
4353000
|
trusted library allocation
|
page read and write
|
||
3A21000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page execute and read and write
|
||
AA9000
|
trusted library allocation
|
page read and write
|
||
30DE000
|
unkown
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page execute and read and write
|
||
7435000
|
heap
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page execute and read and write
|
||
5503000
|
heap
|
page read and write
|
||
28BD000
|
stack
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
3089000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
67EE000
|
stack
|
page read and write
|
||
69A4000
|
heap
|
page read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
185D000
|
trusted library allocation
|
page execute and read and write
|
||
365D000
|
trusted library allocation
|
page read and write
|
||
43B3000
|
trusted library allocation
|
page read and write
|
||
437B000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
D3DE000
|
stack
|
page read and write
|
||
32BE000
|
trusted library allocation
|
page read and write
|
||
7007000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3266000
|
trusted library allocation
|
page read and write
|
||
430D000
|
trusted library allocation
|
page read and write
|
||
3259000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
stack
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
699B000
|
heap
|
page read and write
|
||
16CF000
|
stack
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page execute and read and write
|
||
9BD000
|
trusted library allocation
|
page execute and read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
trusted library allocation
|
page read and write
|
||
362F000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
E1F000
|
stack
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
D060000
|
trusted library allocation
|
page execute and read and write
|
||
700A000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page execute and read and write
|
||
26C0000
|
heap
|
page execute and read and write
|
||
42ED000
|
trusted library allocation
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
6930000
|
heap
|
page read and write
|
||
42EF000
|
trusted library allocation
|
page read and write
|
||
BA6000
|
trusted library allocation
|
page read and write
|
||
75FE000
|
stack
|
page read and write
|
||
BB6000
|
trusted library allocation
|
page execute and read and write
|
||
B94000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
7350000
|
trusted library allocation
|
page read and write
|
||
4FE3000
|
heap
|
page execute and read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
267C000
|
stack
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page execute and read and write
|
||
B0E000
|
heap
|
page read and write
|
||
43EF000
|
trusted library allocation
|
page read and write
|
||
3289000
|
trusted library allocation
|
page read and write
|
||
97D000
|
stack
|
page read and write
|
||
4BA000
|
stack
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
40CE000
|
trusted library allocation
|
page read and write
|
||
1487000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
32A6000
|
trusted library allocation
|
page read and write
|
||
D0EE000
|
stack
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page execute and read and write
|
||
B30000
|
heap
|
page read and write
|
||
7240000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
4554000
|
trusted library allocation
|
page read and write
|
||
43F8000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
41C6000
|
trusted library allocation
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
39FD000
|
trusted library allocation
|
page read and write
|
||
1853000
|
trusted library allocation
|
page execute and read and write
|
||
7400000
|
heap
|
page read and write
|
||
50B4000
|
trusted library section
|
page readonly
|
||
566D000
|
stack
|
page read and write
|
||
5D35000
|
heap
|
page read and write
|
||
44D1000
|
trusted library allocation
|
page read and write
|
||
40CC000
|
trusted library allocation
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
2F00000
|
heap
|
page execute and read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
4396000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
434A000
|
trusted library allocation
|
page read and write
|
||
4542000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
30C2000
|
trusted library allocation
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
41C4000
|
trusted library allocation
|
page read and write
|
||
431B000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
411000
|
remote allocation
|
page execute and read and write
|
||
4292000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
73F1000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
trusted library allocation
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
45A4000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
4FD0000
|
heap
|
page execute and read and write
|
||
51D0000
|
heap
|
page execute and read and write
|
||
6B12000
|
heap
|
page read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
6F45000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4585000
|
trusted library allocation
|
page read and write
|
||
444000
|
remote allocation
|
page execute and read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
7075000
|
trusted library allocation
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
442000
|
remote allocation
|
page execute and read and write
|
||
44F4000
|
trusted library allocation
|
page read and write
|
||
519B000
|
stack
|
page read and write
|
||
33B6000
|
trusted library allocation
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
42FA000
|
trusted library allocation
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
heap
|
page read and write
|
||
2E58000
|
trusted library allocation
|
page read and write
|
||
42F000
|
remote allocation
|
page execute and read and write
|
||
4FD3000
|
heap
|
page execute and read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
9FD0000
|
trusted library section
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
6C6F000
|
stack
|
page read and write
|
||
4154000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
heap
|
page execute and read and write
|
||
42E8000
|
trusted library allocation
|
page read and write
|
||
1239000
|
stack
|
page read and write
|
||
35A5000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
4479000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
414000
|
remote allocation
|
page execute and read and write
|
||
724E000
|
heap
|
page read and write
|
||
33B2000
|
trusted library allocation
|
page read and write
|
||
D39E000
|
stack
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
4162000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
D4DF000
|
stack
|
page read and write
|
||
319E000
|
trusted library allocation
|
page read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page execute and read and write
|
||
777E000
|
stack
|
page read and write
|
||
432D000
|
trusted library allocation
|
page read and write
|
||
457F000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library section
|
page readonly
|
||
4808000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
6A9F000
|
stack
|
page read and write
|
||
409000
|
remote allocation
|
page execute and read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
443000
|
remote allocation
|
page execute and read and write
|
||
32DB000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
445C000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
30C6000
|
trusted library allocation
|
page read and write
|
||
2D6B000
|
trusted library allocation
|
page execute and read and write
|
||
415A000
|
trusted library allocation
|
page read and write
|
||
39F9000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
5DA6000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
107A000
|
stack
|
page read and write
|
||
741E000
|
heap
|
page read and write
|
||
44B1000
|
trusted library allocation
|
page read and write
|
||
329E000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
43AA000
|
trusted library allocation
|
page read and write
|
||
417000
|
remote allocation
|
page execute and read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
5014000
|
heap
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
6EE5000
|
trusted library allocation
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
571A000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
unkown
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
54EB000
|
stack
|
page read and write
|
||
459C000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page execute and read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
3A39000
|
trusted library allocation
|
page read and write
|
||
368B000
|
trusted library allocation
|
page read and write
|
||
7024000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
4F3A000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
34E8000
|
trusted library allocation
|
page read and write
|
||
40DF000
|
trusted library allocation
|
page read and write
|
||
69BA000
|
heap
|
page read and write
|
||
5208000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
2909000
|
trusted library allocation
|
page read and write
|
||
335D000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page execute and read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
7410000
|
heap
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
1860000
|
trusted library allocation
|
page read and write
|
||
1854000
|
trusted library allocation
|
page read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
29C9000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
33BC000
|
trusted library allocation
|
page read and write
|
||
AC5000
|
trusted library allocation
|
page execute and read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
1872000
|
trusted library allocation
|
page read and write
|
||
4578000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
stack
|
page read and write
|
||
4394000
|
trusted library allocation
|
page read and write
|
||
BA9000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
4583000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
trusted library allocation
|
page read and write
|
||
434D000
|
trusted library allocation
|
page read and write
|
||
16D9000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
heap
|
page read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
743B000
|
heap
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
trusted library allocation
|
page execute and read and write
|
||
32A2000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
4389000
|
trusted library allocation
|
page read and write
|
||
4F9A000
|
trusted library allocation
|
page read and write
|
||
7B5C000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
43B5000
|
trusted library allocation
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
427000
|
remote allocation
|
page execute and read and write
|
||
1810000
|
heap
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
4595000
|
trusted library allocation
|
page read and write
|
||
6F19000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
499C000
|
stack
|
page read and write
|
||
85A000
|
stack
|
page read and write
|
||
5D05000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
42DC000
|
trusted library allocation
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page execute and read and write
|
||
413E000
|
trusted library allocation
|
page read and write
|
||
42A000
|
remote allocation
|
page execute and read and write
|
||
7017000
|
trusted library allocation
|
page read and write
|
||
413000
|
remote allocation
|
page execute and read and write
|
||
187A000
|
trusted library allocation
|
page execute and read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
6E94000
|
trusted library allocation
|
page read and write
|
||
40A000
|
remote allocation
|
page execute and read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
47D000
|
stack
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
429000
|
remote allocation
|
page execute and read and write
|
||
4305000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
12F5000
|
heap
|
page read and write
|
||
57F3000
|
heap
|
page read and write
|
||
43B5000
|
trusted library allocation
|
page read and write
|
||
40ED000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page execute and read and write
|
||
957000
|
stack
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4502000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page execute and read and write
|
||
2D52000
|
trusted library allocation
|
page read and write
|
||
30DC000
|
stack
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
43D000
|
remote allocation
|
page execute and read and write
|
||
BE5000
|
heap
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
stack
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
4462000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
32F6000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page execute and read and write
|
||
29E0000
|
heap
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
4365000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
44F2000
|
trusted library allocation
|
page read and write
|
||
4358000
|
trusted library allocation
|
page read and write
|
||
B93000
|
trusted library allocation
|
page execute and read and write
|
||
354A000
|
trusted library allocation
|
page read and write
|
||
1496000
|
heap
|
page read and write
|
||
BC2000
|
trusted library allocation
|
page read and write
|
||
D1DE000
|
stack
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
2D56000
|
trusted library allocation
|
page execute and read and write
|
||
5BA0000
|
trusted library allocation
|
page execute and read and write
|
||
415000
|
remote allocation
|
page execute and read and write
|
||
324F000
|
trusted library allocation
|
page read and write
|
||
3228000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page execute and read and write
|
||
44BF000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
trusted library allocation
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
42F1000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
trusted library allocation
|
page execute and read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
40F5000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
heap
|
page read and write
|
||
33E3000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
3269000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
569A000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
344A000
|
trusted library allocation
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
3039000
|
stack
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
There are 779 hidden memdumps, click here to show them.