Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Urgent inquiry for quotation .exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unprickly
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Urgent inquiry for quotation .exe
|
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20and%20Time:%2008/10/2024%20/%2013:28:15%0D%0ACountry%20Name:%20United%20States%0D%0A[%20632922%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
|
149.154.167.220
|
||
http://microsoft.co
|
unknown
|
||
https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendDocument?chat_id=5013
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
http://mail.vvtrade.vnd
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendDocument?chat_id=5013849544&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
|
149.154.167.220
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20and%20Time:%2008/10/2024%20/%2013:18:36%0D%0ACountry%20Name:%20United%20States%0D%0A[%20632922%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
|
149.154.167.220
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20a
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://mail.vvtrade.vn
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://www.office.com/h
|
unknown
|
||
http://api.telegram.orgd
|
unknown
|
||
https://www.office.com/lBkq
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
mail.vvtrade.vn
|
118.69.190.131
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
118.69.190.131
|
mail.vvtrade.vn
|
Viet Nam
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
31A1000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3BD1000
|
trusted library allocation
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
64CE000
|
stack
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
6717000
|
trusted library allocation
|
page read and write
|
||
3D30000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
5174000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1382000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
33B3000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
heap
|
page read and write
|
||
33BC000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
3F41000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
3F31000
|
heap
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
2F48000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page execute and read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
3385000
|
trusted library allocation
|
page read and write
|
||
5012000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
trusted library allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
6851000
|
heap
|
page read and write
|
||
3DE3000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
43D4000
|
heap
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page execute and read and write
|
||
59EE000
|
stack
|
page read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
6687000
|
trusted library allocation
|
page read and write
|
||
489AFFE000
|
stack
|
page read and write
|
||
C9E000
|
heap
|
page read and write
|
||
6610000
|
trusted library allocation
|
page execute and read and write
|
||
3F65000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
3B9E000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2B97000
|
trusted library allocation
|
page read and write
|
||
485E000
|
direct allocation
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
3665000
|
trusted library allocation
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
158F000
|
stack
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page read and write
|
||
3E61000
|
trusted library allocation
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
500E000
|
trusted library allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
2912000
|
trusted library allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4316000
|
heap
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
4473000
|
trusted library allocation
|
page read and write
|
||
2917000
|
trusted library allocation
|
page execute and read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
640F000
|
stack
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
6BD0000
|
trusted library allocation
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
3C0D000
|
trusted library allocation
|
page read and write
|
||
3106000
|
trusted library allocation
|
page read and write
|
||
3E77000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page execute and read and write
|
||
3DA8000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
14E1D209000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
14E1D263000
|
heap
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
4546000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page execute and read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
6D22000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
489B4FD000
|
stack
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
3E41000
|
trusted library allocation
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
66A4000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
3344000
|
trusted library allocation
|
page read and write
|
||
42E6000
|
trusted library allocation
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
4209000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
heap
|
page read and write
|
||
3DD6000
|
trusted library allocation
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
628D000
|
stack
|
page read and write
|
||
35AD000
|
trusted library allocation
|
page read and write
|
||
3E4D000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
heap
|
page read and write
|
||
489AB0A000
|
stack
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page execute and read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
3D75000
|
trusted library allocation
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
4584000
|
direct allocation
|
page read and write
|
||
668B000
|
trusted library allocation
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
489B6FE000
|
stack
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
D09000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1385000
|
trusted library allocation
|
page execute and read and write
|
||
58B0000
|
heap
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
970000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2F46000
|
heap
|
page read and write
|
||
3DC1000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
485E000
|
direct allocation
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
3E19000
|
trusted library allocation
|
page read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
3216000
|
trusted library allocation
|
page read and write
|
||
3F31000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
44C4000
|
trusted library allocation
|
page read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
3D3F000
|
trusted library allocation
|
page read and write
|
||
290A000
|
trusted library allocation
|
page execute and read and write
|
||
1700000
|
heap
|
page read and write
|
||
4538000
|
trusted library allocation
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
3F11000
|
heap
|
page read and write
|
||
3C10000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
44F7000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3F99000
|
heap
|
page read and write
|
||
4643000
|
direct allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
6813000
|
heap
|
page read and write
|
||
448B000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
3F89000
|
heap
|
page read and write
|
||
173C000
|
stack
|
page read and write
|
||
14E1D4B0000
|
heap
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page execute and read and write
|
||
F10000
|
heap
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
3DC3000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
3E30000
|
heap
|
page read and write
|
||
3BCF000
|
trusted library allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
3F04000
|
heap
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
619B000
|
heap
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
3BFD000
|
trusted library allocation
|
page read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
62CE000
|
stack
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
357F000
|
trusted library allocation
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
2C73000
|
trusted library allocation
|
page read and write
|
||
427F000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
28E4000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page execute and read and write
|
||
3E29000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
441000
|
system
|
page execute and read and write
|
||
312D000
|
trusted library allocation
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
135D000
|
trusted library allocation
|
page execute and read and write
|
||
3F95000
|
heap
|
page read and write
|
||
2BC4000
|
trusted library allocation
|
page read and write
|
||
3F10000
|
heap
|
page read and write
|
||
3E40000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page execute and read and write
|
||
368E000
|
stack
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
3DCC000
|
trusted library allocation
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
4437000
|
trusted library allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
28FD000
|
trusted library allocation
|
page execute and read and write
|
||
3F95000
|
heap
|
page read and write
|
||
34F6000
|
trusted library allocation
|
page read and write
|
||
3DF8000
|
heap
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
3C97000
|
trusted library allocation
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page execute and read and write
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
489B1FF000
|
stack
|
page read and write
|
||
4643000
|
direct allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
6750000
|
trusted library allocation
|
page execute and read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
4334000
|
heap
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
3E7E000
|
trusted library allocation
|
page read and write
|
||
3E54000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3F30000
|
heap
|
page read and write
|
||
3287000
|
trusted library allocation
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
4502000
|
trusted library allocation
|
page read and write
|
||
13F6000
|
heap
|
page read and write
|
||
3E65000
|
trusted library allocation
|
page read and write
|
||
489B7FB000
|
stack
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
4355000
|
trusted library allocation
|
page read and write
|
||
138B000
|
trusted library allocation
|
page execute and read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
3F84000
|
heap
|
page execute and read and write
|
||
485E000
|
direct allocation
|
page read and write
|
||
3E19000
|
heap
|
page read and write
|
||
3D93000
|
trusted library allocation
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
3D44000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
13C0000
|
heap
|
page read and write
|
||
3B49000
|
trusted library allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page execute and read and write
|
||
99A000
|
heap
|
page read and write
|
||
3DEC000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
5032000
|
trusted library allocation
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page execute and read and write
|
||
3F6B000
|
heap
|
page read and write
|
||
325C000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
3E15000
|
heap
|
page read and write
|
||
6204000
|
heap
|
page read and write
|
||
3F64000
|
heap
|
page execute and read and write
|
||
50E0000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
6D47000
|
trusted library allocation
|
page read and write
|
||
14E1D1D0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5A50000
|
heap
|
page execute and read and write
|
||
2970000
|
heap
|
page execute and read and write
|
||
100000
|
heap
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
3E36000
|
trusted library allocation
|
page read and write
|
||
32AB000
|
trusted library allocation
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9CE000
|
stack
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
4643000
|
direct allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
heap
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
485E000
|
direct allocation
|
page read and write
|
||
CAA000
|
heap
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
441B000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
5D1F000
|
stack
|
page read and write
|
||
5186000
|
trusted library allocation
|
page read and write
|
||
443000
|
system
|
page execute and read and write
|
||
3C8D000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
3B41000
|
heap
|
page read and write
|
||
3D40000
|
heap
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
35DB000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
3E0F000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4643000
|
direct allocation
|
page read and write
|
||
125000
|
heap
|
page read and write
|
||
3E39000
|
trusted library allocation
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
3F69000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
3E05000
|
trusted library allocation
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
3E86000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3DE3000
|
heap
|
page read and write
|
||
61D7000
|
heap
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
F90000
|
heap
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
3F93000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
14E1EBE0000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3F94000
|
heap
|
page execute and read and write
|
||
121E000
|
stack
|
page read and write
|
||
3D6F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page execute and read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
6CF6000
|
trusted library allocation
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
3E19000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
3DE8000
|
heap
|
page read and write
|
||
3E6F000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page execute and read and write
|
||
5763000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
4643000
|
direct allocation
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
3EE6000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
3DE6000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
3FC3000
|
heap
|
page read and write
|
||
5A3A000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
500B000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
501A000
|
trusted library allocation
|
page read and write
|
||
2B9B000
|
trusted library allocation
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
1353000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
1372000
|
trusted library allocation
|
page read and write
|
||
3CEA000
|
trusted library allocation
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
heap
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
518D000
|
trusted library allocation
|
page read and write
|
||
6D25000
|
trusted library allocation
|
page read and write
|
||
3C34000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3BC5000
|
trusted library allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
heap
|
page read and write
|
||
3394000
|
trusted library allocation
|
page read and write
|
||
3B9A000
|
trusted library allocation
|
page read and write
|
||
1354000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
3DE1000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2C82000
|
trusted library allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
42CF000
|
trusted library allocation
|
page read and write
|
||
14E1D300000
|
heap
|
page read and write
|
||
348A000
|
trusted library allocation
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3BD3000
|
trusted library allocation
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
2D2A000
|
trusted library allocation
|
page read and write
|
||
14E1D29C000
|
heap
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
3F8C000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
14E1D0F0000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
44FA000
|
trusted library allocation
|
page read and write
|
||
434B000
|
heap
|
page read and write
|
||
1482000
|
heap
|
page read and write
|
||
3F40000
|
heap
|
page read and write
|
||
1376000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
heap
|
page read and write
|
||
3CC6000
|
trusted library allocation
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
137A000
|
trusted library allocation
|
page execute and read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
2B87000
|
trusted library allocation
|
page read and write
|
||
485E000
|
direct allocation
|
page read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
14E1D4B5000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
444000
|
system
|
page execute and read and write
|
||
3F85000
|
heap
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3C13000
|
trusted library allocation
|
page read and write
|
||
6A8F000
|
stack
|
page read and write
|
||
3D55000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
30E4000
|
heap
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
6CD4000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
4423000
|
trusted library allocation
|
page read and write
|
||
3E46000
|
heap
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3DBB000
|
heap
|
page read and write
|
||
489B2FE000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
43A9000
|
trusted library allocation
|
page read and write
|
||
6840000
|
heap
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
F2A000
|
stack
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
3FB2000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
100000
|
heap
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
648F000
|
stack
|
page read and write
|
||
3AC5000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
2B47000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
44D8000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
2F30000
|
direct allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
2B93000
|
trusted library allocation
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
4AE8000
|
trusted library allocation
|
page read and write
|
||
3CD2000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
31FD000
|
trusted library allocation
|
page read and write
|
||
502D000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
440000
|
system
|
page execute and read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
3DC5000
|
heap
|
page read and write
|
||
3E62000
|
heap
|
page read and write
|
||
5188000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
6DA0000
|
heap
|
page read and write
|
||
485E000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6600000
|
trusted library allocation
|
page execute and read and write
|
||
630E000
|
stack
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
66F5000
|
trusted library allocation
|
page read and write
|
||
3C25000
|
trusted library allocation
|
page read and write
|
||
3F16000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
3524000
|
trusted library allocation
|
page read and write
|
||
2915000
|
trusted library allocation
|
page execute and read and write
|
||
14E1D200000
|
heap
|
page read and write
|
||
3322000
|
trusted library allocation
|
page read and write
|
||
5046000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
61A8000
|
heap
|
page read and write
|
||
5026000
|
trusted library allocation
|
page read and write
|
||
3258000
|
trusted library allocation
|
page read and write
|
||
3244000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
heap
|
page read and write
|
||
47E9000
|
direct allocation
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
7B9000
|
stack
|
page read and write
|
||
44F0000
|
direct allocation
|
page read and write
|
||
5006000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page execute and read and write
|
||
3F85000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
1387000
|
trusted library allocation
|
page execute and read and write
|
||
120000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
3F90000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
42F4000
|
trusted library allocation
|
page read and write
|
||
3B80000
|
direct allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
3C30000
|
heap
|
page read and write
|
||
3F60000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
4402000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
517A000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
3DB1000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
489B5FE000
|
stack
|
page read and write
|
||
14E1D4BD000
|
heap
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
291B000
|
trusted library allocation
|
page execute and read and write
|
||
2F30000
|
heap
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
4527000
|
trusted library allocation
|
page read and write
|
||
3E29000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
2D5B000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
3D63000
|
trusted library allocation
|
page read and write
|
||
4BBC000
|
stack
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
4385000
|
trusted library allocation
|
page read and write
|
||
67CF000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4583000
|
direct allocation
|
page read and write
|
||
3E27000
|
heap
|
page read and write
|
||
3C40000
|
heap
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
3DFD000
|
heap
|
page read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
3FB3000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
3FB2000
|
heap
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
14E1EFB0000
|
heap
|
page read and write
|
||
434C000
|
trusted library allocation
|
page read and write
|
||
3AEB000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
4520000
|
direct allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
489AEFE000
|
stack
|
page read and write
|
||
44F3000
|
trusted library allocation
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
3BC3000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
3C2C000
|
trusted library allocation
|
page read and write
|
||
4433000
|
trusted library allocation
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
4643000
|
direct allocation
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
3E25000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
3F95000
|
heap
|
page read and write
|
||
3E8A000
|
heap
|
page read and write
|
||
3E9D000
|
heap
|
page read and write
|
||
3F41000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page execute and read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
trusted library allocation
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
3FB2000
|
heap
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
3694000
|
trusted library allocation
|
page read and write
|
||
2B59000
|
trusted library allocation
|
page read and write
|
||
14E1D235000
|
heap
|
page read and write
|
||
3BEF000
|
trusted library allocation
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2906000
|
trusted library allocation
|
page execute and read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
479E000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
heap
|
page read and write
|
||
3E3D000
|
heap
|
page read and write
|
||
3F65000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
44DE000
|
trusted library allocation
|
page read and write
|
||
442000
|
system
|
page execute and read and write
|
There are 803 hidden memdumps, click here to show them.