Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
GeriOdemeBildirimi942.rar.xlxs.pdf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GeriOdemeBildirimi942.rar.xlxs.pdf.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\SOFcFE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\SOFcFE.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SOFcFE.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0kwp5mcr.1ew.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2udamgpn.4ht.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cfeqqlb.miq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xrtsjvy.xpt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2teh2jh.fsg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ore2exho.n4u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vo3sef0r.azf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wpwtzsyd.zea.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
|
"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"
|
||
C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
|
"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
|
||
C:\Users\user\AppData\Roaming\SOFcFE.exe
|
C:\Users\user\AppData\Roaming\SOFcFE.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"
|
||
C:\Users\user\AppData\Roaming\SOFcFE.exe
|
"C:\Users\user\AppData\Roaming\SOFcFE.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20a
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://awaratrendz.com
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
awaratrendz.com
|
119.18.54.39
|
||
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
119.18.54.39
|
awaratrendz.com
|
India
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.8.169
|
unknown
|
United States
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C21000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
46FA000
|
trusted library allocation
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
trusted library allocation
|
page read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
435000
|
remote allocation
|
page execute and read and write
|
||
2E90000
|
heap
|
page execute and read and write
|
||
6C30000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
51F3000
|
heap
|
page read and write
|
||
4166000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
6B76000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
CBCE000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
30CA000
|
stack
|
page read and write
|
||
2CCF000
|
trusted library allocation
|
page read and write
|
||
512A000
|
trusted library allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
6644000
|
heap
|
page read and write
|
||
528E000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
3E2C000
|
trusted library allocation
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
3087000
|
trusted library allocation
|
page read and write
|
||
146D000
|
trusted library allocation
|
page read and write
|
||
C6CE000
|
stack
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
1461000
|
trusted library allocation
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
CC0E000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3DB9000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
stack
|
page read and write
|
||
6B75000
|
trusted library allocation
|
page read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
262E000
|
stack
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
25C7000
|
trusted library allocation
|
page execute and read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library section
|
page readonly
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
heap
|
page read and write
|
||
3FE8000
|
trusted library allocation
|
page read and write
|
||
516F000
|
trusted library allocation
|
page read and write
|
||
4113000
|
trusted library allocation
|
page read and write
|
||
3EDF000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
6BE9000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
102D000
|
trusted library allocation
|
page execute and read and write
|
||
30EA000
|
trusted library allocation
|
page read and write
|
||
4129000
|
trusted library allocation
|
page read and write
|
||
C70E000
|
stack
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
511E000
|
trusted library allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
2CD7000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page read and write
|
||
10EF000
|
heap
|
page read and write
|
||
5628000
|
trusted library allocation
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page execute and read and write
|
||
259D000
|
trusted library allocation
|
page execute and read and write
|
||
4CF5000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
CA8C000
|
stack
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
4097000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
3CEF000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
3E7B000
|
trusted library allocation
|
page read and write
|
||
3FC9000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
30BC000
|
trusted library allocation
|
page read and write
|
||
3C2F000
|
trusted library allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
4169000
|
trusted library allocation
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
3ED5000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2C7D000
|
trusted library allocation
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
5370000
|
trusted library section
|
page readonly
|
||
4E30000
|
trusted library allocation
|
page execute and read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
5170000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
3DB2000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
3E47000
|
trusted library allocation
|
page read and write
|
||
6688000
|
heap
|
page read and write
|
||
5626000
|
trusted library allocation
|
page read and write
|
||
C48E000
|
stack
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
2D05000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
593D000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page execute and read and write
|
||
1016000
|
heap
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page execute and read and write
|
||
5296000
|
trusted library allocation
|
page read and write
|
||
2E73000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2EF5000
|
trusted library allocation
|
page read and write
|
||
5060000
|
trusted library allocation
|
page execute and read and write
|
||
2DE8000
|
trusted library allocation
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
heap
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
7062000
|
trusted library allocation
|
page read and write
|
||
3F94000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
538E000
|
heap
|
page read and write
|
||
3E45000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page read and write
|
||
2D64000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
C84E000
|
stack
|
page read and write
|
||
51ED000
|
stack
|
page read and write
|
||
4F9C000
|
stack
|
page read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
275E000
|
trusted library allocation
|
page read and write
|
||
25AD000
|
trusted library allocation
|
page execute and read and write
|
||
527D000
|
stack
|
page read and write
|
||
CDD000
|
stack
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
3E72000
|
trusted library allocation
|
page read and write
|
||
4046000
|
trusted library allocation
|
page read and write
|
||
2C2C000
|
stack
|
page read and write
|
||
6B67000
|
trusted library allocation
|
page read and write
|
||
68AF000
|
stack
|
page read and write
|
||
2FAE000
|
unkown
|
page read and write
|
||
5795000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
6BB2000
|
trusted library allocation
|
page read and write
|
||
5616000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
2E85000
|
trusted library allocation
|
page read and write
|
||
527B000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
2ABC000
|
stack
|
page read and write
|
||
139D000
|
trusted library allocation
|
page execute and read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
trusted library allocation
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
6668000
|
heap
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
2786000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
4038000
|
trusted library allocation
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
3E5B000
|
trusted library allocation
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
6BB5000
|
trusted library allocation
|
page read and write
|
||
13B7000
|
trusted library allocation
|
page execute and read and write
|
||
C80E000
|
stack
|
page read and write
|
||
2E24000
|
trusted library allocation
|
page read and write
|
||
38E2000
|
trusted library allocation
|
page read and write
|
||
2E96000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
3EC8000
|
trusted library allocation
|
page read and write
|
||
38A9000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
2F41000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
144B000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
104A000
|
trusted library allocation
|
page execute and read and write
|
||
103D000
|
trusted library allocation
|
page execute and read and write
|
||
639E000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
7585000
|
heap
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
418A000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
982000
|
unkown
|
page readonly
|
||
4EC0000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
665B000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
1024000
|
trusted library allocation
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
2F27000
|
trusted library allocation
|
page read and write
|
||
2FEC000
|
trusted library allocation
|
page read and write
|
||
6B64000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
664C000
|
heap
|
page read and write
|
||
B4A000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
2594000
|
trusted library allocation
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
7130000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
3DD5000
|
trusted library allocation
|
page read and write
|
||
2947000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6BAB000
|
heap
|
page read and write
|
||
9CC0000
|
trusted library allocation
|
page execute and read and write
|
||
52FE000
|
stack
|
page read and write
|
||
AE9000
|
stack
|
page read and write
|
||
C32E000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4326000
|
trusted library allocation
|
page read and write
|
||
73C8F000
|
unkown
|
page readonly
|
||
5790000
|
heap
|
page read and write
|
||
4EC3000
|
heap
|
page read and write
|
||
25B6000
|
trusted library allocation
|
page execute and read and write
|
||
2E90000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
511B000
|
trusted library allocation
|
page read and write
|
||
C94E000
|
stack
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
3EE5000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
trusted library allocation
|
page read and write
|
||
3E28000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
112A000
|
trusted library allocation
|
page execute and read and write
|
||
C98C000
|
stack
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page read and write
|
||
D0CF000
|
stack
|
page read and write
|
||
13B5000
|
trusted library allocation
|
page execute and read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page execute and read and write
|
||
3D42000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
40B6000
|
trusted library allocation
|
page read and write
|
||
3E5D000
|
trusted library allocation
|
page read and write
|
||
4014000
|
trusted library allocation
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
2DD9000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
308B000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page execute and read and write
|
||
6BA6000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
4D98000
|
trusted library allocation
|
page read and write
|
||
512E000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
CACE000
|
stack
|
page read and write
|
||
3FCF000
|
trusted library allocation
|
page read and write
|
||
413B000
|
trusted library allocation
|
page read and write
|
||
671D000
|
stack
|
page read and write
|
||
3FBC000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
1273000
|
trusted library allocation
|
page execute and read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
C66D000
|
stack
|
page read and write
|
||
3FA7000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
499B000
|
stack
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
2DDD000
|
trusted library allocation
|
page read and write
|
||
5156000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
276D000
|
trusted library allocation
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page execute and read and write
|
||
5880000
|
trusted library allocation
|
page execute and read and write
|
||
3008000
|
trusted library allocation
|
page read and write
|
||
3E83000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
25CB000
|
trusted library allocation
|
page execute and read and write
|
||
58A000
|
stack
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
75A5000
|
heap
|
page read and write
|
||
CF8C000
|
stack
|
page read and write
|
||
2CDB000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
2F23000
|
trusted library allocation
|
page read and write
|
||
3C49000
|
trusted library allocation
|
page read and write
|
||
6B91000
|
heap
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
342A000
|
heap
|
page read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
2FBC000
|
trusted library allocation
|
page read and write
|
||
3F1E000
|
trusted library allocation
|
page read and write
|
||
26A8000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
73C70000
|
unkown
|
page readonly
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
2B12000
|
trusted library allocation
|
page read and write
|
||
666D000
|
heap
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
3F19000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page execute and read and write
|
||
3D06000
|
trusted library allocation
|
page read and write
|
||
5E6F000
|
heap
|
page read and write
|
||
429000
|
remote allocation
|
page execute and read and write
|
||
64DE000
|
stack
|
page read and write
|
||
2EA7000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
4034000
|
trusted library allocation
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
3ECF000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
heap
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
3F30000
|
trusted library allocation
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page execute and read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
307C000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
528A000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
2F5C000
|
trusted library allocation
|
page read and write
|
||
6B27000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
105B000
|
trusted library allocation
|
page execute and read and write
|
||
266C000
|
stack
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
FF3000
|
trusted library allocation
|
page execute and read and write
|
||
2B24000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
C5CE000
|
stack
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
3DA5000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
FFD000
|
trusted library allocation
|
page execute and read and write
|
||
1052000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
2F45000
|
trusted library allocation
|
page read and write
|
||
328F000
|
unkown
|
page read and write
|
||
3D62000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
91F000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
126A000
|
heap
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
trusted library allocation
|
page read and write
|
||
1126000
|
trusted library allocation
|
page execute and read and write
|
||
10CF000
|
heap
|
page read and write
|
||
3C34000
|
trusted library allocation
|
page read and write
|
||
5175000
|
heap
|
page read and write
|
||
302F000
|
trusted library allocation
|
page read and write
|
||
3F24000
|
trusted library allocation
|
page read and write
|
||
3D91000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
trusted library allocation
|
page execute and read and write
|
||
9280000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
2F49000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
532D000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
689F000
|
stack
|
page read and write
|
||
CE8C000
|
stack
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
536C000
|
stack
|
page read and write
|
||
B09000
|
stack
|
page read and write
|
||
3D16000
|
trusted library allocation
|
page read and write
|
||
25BA000
|
trusted library allocation
|
page execute and read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
5136000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
1046000
|
trusted library allocation
|
page execute and read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
9285000
|
trusted library allocation
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
1466000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
5050000
|
heap
|
page read and write
|
||
CD0F000
|
stack
|
page read and write
|
||
662D000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
13AA000
|
trusted library allocation
|
page execute and read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
664F000
|
heap
|
page read and write
|
||
CD4E000
|
stack
|
page read and write
|
||
3F4A000
|
trusted library allocation
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
42F000
|
remote allocation
|
page execute and read and write
|
||
2E08000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
A000000
|
trusted library section
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
2E9E000
|
trusted library allocation
|
page read and write
|
||
928F000
|
trusted library allocation
|
page read and write
|
||
142B000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
40FA000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
CFCE000
|
stack
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
CE4E000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
5E50000
|
heap
|
page read and write
|
||
2593000
|
trusted library allocation
|
page execute and read and write
|
||
5380000
|
heap
|
page read and write
|
||
6BA9000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library section
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
3C21000
|
trusted library allocation
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
2C92000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
513D000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page execute and read and write
|
||
2766000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
3F98000
|
trusted library allocation
|
page read and write
|
||
998C000
|
trusted library allocation
|
page read and write
|
||
5614000
|
trusted library allocation
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
529D000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
25C2000
|
trusted library allocation
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
2E8B000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
13B2000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page execute and read and write
|
||
676E000
|
stack
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
9260000
|
trusted library allocation
|
page execute and read and write
|
||
3F42000
|
trusted library allocation
|
page read and write
|
||
42E000
|
remote allocation
|
page execute and read and write
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
2F47000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
113B000
|
trusted library allocation
|
page execute and read and write
|
||
6B50000
|
trusted library allocation
|
page execute and read and write
|
||
25B2000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
1023000
|
trusted library allocation
|
page execute and read and write
|
||
12CE000
|
stack
|
page read and write
|
||
3EDA000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
1057000
|
trusted library allocation
|
page execute and read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
heap
|
page read and write
|
||
75BE000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
4043000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
3DFD000
|
trusted library allocation
|
page read and write
|
||
145E000
|
trusted library allocation
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
73C86000
|
unkown
|
page readonly
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
409D000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
1487000
|
heap
|
page read and write
|
||
3ECC000
|
trusted library allocation
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
2D29000
|
trusted library allocation
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
5630000
|
heap
|
page execute and read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
6BA4000
|
trusted library allocation
|
page read and write
|
||
9CD0000
|
trusted library allocation
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
1122000
|
trusted library allocation
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
6B0B000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
2784000
|
trusted library allocation
|
page read and write
|
||
43AC000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
1135000
|
trusted library allocation
|
page execute and read and write
|
||
65E0000
|
heap
|
page read and write
|
||
10F1000
|
heap
|
page read and write
|
||
562D000
|
trusted library allocation
|
page read and write
|
||
404C000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
3F6A000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page execute and read and write
|
||
9270000
|
trusted library allocation
|
page read and write
|
||
13A2000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page execute and read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2E3A000
|
stack
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
3FFD000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
6B77000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
40A0000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page execute and read and write
|
||
6638000
|
heap
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
3DAC000
|
trusted library allocation
|
page read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
527E000
|
trusted library allocation
|
page read and write
|
||
C86E000
|
stack
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
12AF000
|
stack
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
6B07000
|
trusted library allocation
|
page read and write
|
||
5131000
|
trusted library allocation
|
page read and write
|
||
443000
|
remote allocation
|
page execute and read and write
|
||
C94E000
|
stack
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
5291000
|
trusted library allocation
|
page read and write
|
||
408A000
|
trusted library allocation
|
page read and write
|
||
CA4F000
|
stack
|
page read and write
|
||
3F34000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page execute and read and write
|
||
8F7000
|
stack
|
page read and write
|
||
324E000
|
unkown
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
5116000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
unkown
|
page read and write
|
||
4D82000
|
trusted library allocation
|
page read and write
|
||
759E000
|
heap
|
page read and write
|
||
1137000
|
trusted library allocation
|
page execute and read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
13BB000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
3FB4000
|
trusted library allocation
|
page read and write
|
||
3F2B000
|
trusted library allocation
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
73C71000
|
unkown
|
page execute read
|
||
5142000
|
trusted library allocation
|
page read and write
|
||
4090000
|
trusted library allocation
|
page read and write
|
||
C58F000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
There are 734 hidden memdumps, click here to show them.