Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rShipmentDocuments.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rShipmentDocuments.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp44A0.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZOlmYtPdlO.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2avoa3gt.4q0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4krynbdl.33r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5t3bh3t3.ehn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jycxlpzp.vxt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_me3gq5m1.waw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skfts1sn.dv5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wysnqmj2.m2l.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xkydfyjv.g11.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp5356.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rShipmentDocuments.exe
|
"C:\Users\user\Desktop\rShipmentDocuments.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rShipmentDocuments.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZOlmYtPdlO" /XML "C:\Users\user\AppData\Local\Temp\tmp44A0.tmp"
|
||
C:\Users\user\Desktop\rShipmentDocuments.exe
|
"C:\Users\user\Desktop\rShipmentDocuments.exe"
|
||
C:\Users\user\Desktop\rShipmentDocuments.exe
|
"C:\Users\user\Desktop\rShipmentDocuments.exe"
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZOlmYtPdlO" /XML "C:\Users\user\AppData\Local\Temp\tmp5356.tmp"
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
"C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe"
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
"C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe"
|
||
C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe
|
"C:\Users\user\AppData\Roaming\ZOlmYtPdlO.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://chrome.google.com/webstore?hl=enp
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/10/2024%20/%2015:30:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
https://www.office.com/p
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/10/2024%20/%2015:40:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
http://crl.microsoft.c62
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
185.230.141.85
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rShipmentDocuments_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZOlmYtPdlO_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
43CD000
|
trusted library allocation
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
906000
|
trusted library allocation
|
page execute and read and write
|
||
4C94000
|
trusted library section
|
page readonly
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
3A47000
|
trusted library allocation
|
page read and write
|
||
AD5F000
|
stack
|
page read and write
|
||
5253000
|
heap
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
5068000
|
trusted library allocation
|
page read and write
|
||
64A5000
|
heap
|
page read and write
|
||
4254000
|
trusted library allocation
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
43C4000
|
trusted library allocation
|
page read and write
|
||
AEA0000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
4133000
|
trusted library allocation
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
1742000
|
trusted library allocation
|
page read and write
|
||
2922000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
FFA000
|
stack
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
42E6000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5A60000
|
trusted library section
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page execute and read and write
|
||
3101000
|
trusted library allocation
|
page read and write
|
||
3F09000
|
trusted library allocation
|
page read and write
|
||
41A8000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
4316000
|
trusted library allocation
|
page read and write
|
||
68D6000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
2F9A000
|
trusted library allocation
|
page read and write
|
||
BB4F000
|
stack
|
page read and write
|
||
43FA000
|
trusted library allocation
|
page read and write
|
||
1770000
|
trusted library allocation
|
page execute and read and write
|
||
3ACD000
|
trusted library allocation
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
1747000
|
trusted library allocation
|
page execute and read and write
|
||
4154000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
trusted library section
|
page read and write
|
||
3F4C000
|
trusted library allocation
|
page read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
4C59000
|
trusted library allocation
|
page read and write
|
||
5A3B000
|
stack
|
page read and write
|
||
42DE000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
6940000
|
trusted library allocation
|
page execute and read and write
|
||
3EE4000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3D46000
|
trusted library allocation
|
page read and write
|
||
3F52000
|
trusted library allocation
|
page read and write
|
||
5430000
|
heap
|
page execute and read and write
|
||
BDCD000
|
stack
|
page read and write
|
||
62FD000
|
stack
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
6D64000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
49A000
|
stack
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page execute and read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
302C000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
heap
|
page read and write
|
||
8E3000
|
trusted library allocation
|
page execute and read and write
|
||
3E87000
|
trusted library allocation
|
page read and write
|
||
7F660000
|
trusted library allocation
|
page execute and read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
3ED4000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page execute and read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
3105000
|
trusted library allocation
|
page read and write
|
||
434E000
|
trusted library allocation
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
174B000
|
trusted library allocation
|
page execute and read and write
|
||
A12000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
2DA8000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
heap
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
5D69000
|
heap
|
page read and write
|
||
4156000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
534E000
|
stack
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
41B7000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
BD8F000
|
stack
|
page read and write
|
||
530B000
|
stack
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page execute and read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
3C7D000
|
trusted library allocation
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
4121000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
2B1E000
|
unkown
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
30DC000
|
trusted library allocation
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
2C88000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
43E8000
|
trusted library allocation
|
page read and write
|
||
80CE000
|
heap
|
page read and write
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
3DFC000
|
trusted library allocation
|
page read and write
|
||
406B000
|
trusted library allocation
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
1713000
|
trusted library allocation
|
page execute and read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
835E000
|
stack
|
page read and write
|
||
2B5F000
|
unkown
|
page read and write
|
||
2DC9000
|
trusted library allocation
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
10AF000
|
stack
|
page read and write
|
||
1167000
|
stack
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
414E000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
511D000
|
trusted library allocation
|
page read and write
|
||
3F3B000
|
trusted library allocation
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4336000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
69F4000
|
trusted library allocation
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
112D000
|
trusted library allocation
|
page execute and read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
1723000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page execute and read and write
|
||
3050000
|
heap
|
page read and write
|
||
3F9B000
|
trusted library allocation
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
3F75000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
3EA2000
|
trusted library allocation
|
page read and write
|
||
510E000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
43EA000
|
trusted library allocation
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
2DF2000
|
trusted library allocation
|
page read and write
|
||
974000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
42F8000
|
trusted library allocation
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
6DD0000
|
trusted library allocation
|
page execute and read and write
|
||
38AA000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page execute and read and write
|
||
55D0000
|
heap
|
page execute and read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
3B53000
|
trusted library allocation
|
page read and write
|
||
68DF000
|
stack
|
page read and write
|
||
C5FC000
|
stack
|
page read and write
|
||
6990000
|
trusted library allocation
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
B70D000
|
stack
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
334E000
|
trusted library allocation
|
page read and write
|
||
3C34000
|
trusted library allocation
|
page read and write
|
||
438A000
|
trusted library allocation
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
3C1C000
|
trusted library allocation
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
14B3000
|
heap
|
page read and write
|
||
3256000
|
trusted library allocation
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
trusted library allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
4192000
|
trusted library allocation
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
575B000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
3E96000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
3E71000
|
trusted library allocation
|
page read and write
|
||
BECD000
|
stack
|
page read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
42FA000
|
trusted library allocation
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
7492000
|
trusted library allocation
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
171D000
|
trusted library allocation
|
page execute and read and write
|
||
413A000
|
trusted library allocation
|
page read and write
|
||
41F7000
|
trusted library allocation
|
page read and write
|
||
69DB000
|
trusted library allocation
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
AB5E000
|
stack
|
page read and write
|
||
3FBA000
|
trusted library allocation
|
page read and write
|
||
3E9E000
|
trusted library allocation
|
page read and write
|
||
510A000
|
trusted library allocation
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
ED3000
|
heap
|
page read and write
|
||
1496000
|
heap
|
page read and write
|
||
917000
|
trusted library allocation
|
page execute and read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
50F6000
|
trusted library allocation
|
page read and write
|
||
4146000
|
trusted library allocation
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
4409000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
69D7000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
64C6000
|
heap
|
page read and write
|
||
698A000
|
trusted library allocation
|
page read and write
|
||
1234000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
912000
|
trusted library allocation
|
page read and write
|
||
43B9000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
F64000
|
unkown
|
page readonly
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
3D5F000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
9250000
|
heap
|
page read and write
|
||
BC4F000
|
stack
|
page read and write
|
||
A95E000
|
stack
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
5B60000
|
heap
|
page read and write
|
||
C14E000
|
stack
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
439B000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
34FD000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
trusted library allocation
|
page execute and read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
BED0000
|
heap
|
page read and write
|
||
3F95000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
352C000
|
trusted library allocation
|
page read and write
|
||
3CCD000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
trusted library allocation
|
page read and write
|
||
31E000
|
unkown
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
trusted library allocation
|
page execute and read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
B80F000
|
stack
|
page read and write
|
||
3EA8000
|
trusted library allocation
|
page read and write
|
||
AFDE000
|
stack
|
page read and write
|
||
93AE000
|
stack
|
page read and write
|
||
2E8D000
|
trusted library allocation
|
page read and write
|
||
6910000
|
trusted library allocation
|
page execute and read and write
|
||
2D1A000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
176C000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
69E7000
|
trusted library allocation
|
page read and write
|
||
42EA000
|
trusted library allocation
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2C79000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
trusted library allocation
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
6D66000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page execute and read and write
|
||
A1C000
|
heap
|
page read and write
|
||
1233000
|
trusted library allocation
|
page execute and read and write
|
||
18DE000
|
stack
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
4248000
|
trusted library allocation
|
page read and write
|
||
30D8000
|
trusted library allocation
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
3F5D000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
3E9A000
|
trusted library allocation
|
page read and write
|
||
3DBF000
|
trusted library allocation
|
page read and write
|
||
3DCA000
|
trusted library allocation
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
61FD000
|
stack
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
3D58000
|
trusted library allocation
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
6D6A000
|
trusted library allocation
|
page read and write
|
||
13C2000
|
trusted library allocation
|
page read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
6ED2000
|
trusted library allocation
|
page read and write
|
||
B21E000
|
stack
|
page read and write
|
||
3CEA000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
C63D000
|
stack
|
page read and write
|
||
902000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page execute and read and write
|
||
3F6A000
|
trusted library allocation
|
page read and write
|
||
4359000
|
trusted library allocation
|
page read and write
|
||
3CE3000
|
trusted library allocation
|
page read and write
|
||
29FA000
|
trusted library allocation
|
page execute and read and write
|
||
DAE000
|
stack
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
172D000
|
trusted library allocation
|
page execute and read and write
|
||
2D0000
|
heap
|
page read and write
|
||
3D06000
|
trusted library allocation
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
57F0000
|
trusted library section
|
page readonly
|
||
444000
|
remote allocation
|
page execute and read and write
|
||
43BC000
|
trusted library allocation
|
page read and write
|
||
141C000
|
heap
|
page read and write
|
||
421A000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
43A8000
|
trusted library allocation
|
page read and write
|
||
6EA6000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1123000
|
trusted library allocation
|
page execute and read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
6D7D000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
heap
|
page read and write
|
||
91B000
|
trusted library allocation
|
page execute and read and write
|
||
3249000
|
trusted library allocation
|
page read and write
|
||
3DF8000
|
trusted library allocation
|
page read and write
|
||
502D000
|
stack
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
2F2E000
|
trusted library allocation
|
page read and write
|
||
13B2000
|
trusted library allocation
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
3E04000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page execute and read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
68C0000
|
trusted library allocation
|
page read and write
|
||
33BD000
|
trusted library allocation
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
9214000
|
heap
|
page read and write
|
||
13BA000
|
trusted library allocation
|
page execute and read and write
|
||
B44F000
|
stack
|
page read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
276E000
|
stack
|
page read and write
|
||
91D0000
|
heap
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
heap
|
page execute and read and write
|
||
4357000
|
trusted library allocation
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
576E000
|
trusted library allocation
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page execute and read and write
|
||
8F3000
|
trusted library allocation
|
page read and write
|
||
123D000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
7F3F000
|
stack
|
page read and write
|
||
31E3000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
41AF000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
13C7000
|
trusted library allocation
|
page execute and read and write
|
||
3D04000
|
trusted library allocation
|
page read and write
|
||
40CD000
|
trusted library allocation
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
2DFA000
|
trusted library allocation
|
page read and write
|
||
173A000
|
trusted library allocation
|
page execute and read and write
|
||
27F0000
|
heap
|
page read and write
|
||
68D4000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
3E9C000
|
trusted library allocation
|
page read and write
|
||
1714000
|
trusted library allocation
|
page read and write
|
||
3D42000
|
trusted library allocation
|
page read and write
|
||
3030000
|
trusted library allocation
|
page execute and read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
4ECB000
|
stack
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
102C000
|
stack
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
3E75000
|
trusted library allocation
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
43B6000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
34CF000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
3EAA000
|
trusted library allocation
|
page read and write
|
||
4123000
|
trusted library allocation
|
page read and write
|
||
540B000
|
stack
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
4148000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page execute and read and write
|
||
5C40000
|
heap
|
page read and write
|
||
68E6000
|
trusted library allocation
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page read and write
|
||
42F6000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
68E0000
|
heap
|
page read and write
|
||
940000
|
trusted library allocation
|
page execute and read and write
|
||
3F07000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
30D4000
|
trusted library allocation
|
page read and write
|
||
558D000
|
trusted library allocation
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
BC8E000
|
stack
|
page read and write
|
||
3EFF000
|
trusted library allocation
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4196000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
heap
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
6950000
|
trusted library allocation
|
page execute and read and write
|
||
5673000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
50FB000
|
trusted library allocation
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
557A000
|
trusted library allocation
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
C47E000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
26A000
|
stack
|
page read and write
|
||
13CB000
|
trusted library allocation
|
page execute and read and write
|
||
1736000
|
trusted library allocation
|
page execute and read and write
|
||
3E77000
|
trusted library allocation
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
3D30000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
5903000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
7F830000
|
trusted library allocation
|
page execute and read and write
|
||
3C11000
|
trusted library allocation
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
CA8000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
18E8000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3819000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
3CF8000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
3FB2000
|
trusted library allocation
|
page read and write
|
||
B48C000
|
stack
|
page read and write
|
||
C10E000
|
stack
|
page read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
22D000
|
stack
|
page read and write
|
||
3327000
|
trusted library allocation
|
page read and write
|
||
5111000
|
trusted library allocation
|
page read and write
|
||
3CD3000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
68ED000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page read and write
|
||
B0DE000
|
stack
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page read and write
|
||
6ED5000
|
trusted library allocation
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
13FA000
|
heap
|
page read and write
|
||
69AC000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page execute and read and write
|
||
C00D000
|
stack
|
page read and write
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
4089000
|
trusted library allocation
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
29ED000
|
trusted library allocation
|
page execute and read and write
|
||
B11E000
|
stack
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
3DC8000
|
trusted library allocation
|
page read and write
|
||
B34E000
|
stack
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
279A000
|
stack
|
page read and write
|
||
5572000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
521E000
|
heap
|
page read and write
|
||
3CF6000
|
trusted library allocation
|
page read and write
|
||
30DC000
|
trusted library allocation
|
page read and write
|
||
B5CE000
|
stack
|
page read and write
|
||
32AE000
|
trusted library allocation
|
page read and write
|
||
564D000
|
stack
|
page read and write
|
||
577D000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
8074000
|
heap
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library section
|
page readonly
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
6949000
|
heap
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page execute and read and write
|
||
4324000
|
trusted library allocation
|
page read and write
|
||
3023000
|
trusted library allocation
|
page read and write
|
||
C4FB000
|
stack
|
page read and write
|
||
42D7000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
B58C000
|
stack
|
page read and write
|
||
13FE000
|
heap
|
page read and write
|
||
4190000
|
trusted library allocation
|
page read and write
|
||
657D000
|
stack
|
page read and write
|
||
3E8E000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
stack
|
page read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
4D93000
|
heap
|
page read and write
|
||
3D02000
|
trusted library allocation
|
page read and write
|
||
AD9D000
|
stack
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
2C8C000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
64DA000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
2EFD000
|
trusted library allocation
|
page read and write
|
||
976000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
AC5F000
|
stack
|
page read and write
|
||
1124000
|
trusted library allocation
|
page read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
1069000
|
stack
|
page read and write
|
||
3216000
|
trusted library allocation
|
page read and write
|
||
3C39000
|
trusted library allocation
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
30CC000
|
trusted library allocation
|
page read and write
|
||
4387000
|
trusted library allocation
|
page read and write
|
||
3E1C000
|
trusted library allocation
|
page read and write
|
||
3FAB000
|
trusted library allocation
|
page read and write
|
||
3EA6000
|
trusted library allocation
|
page read and write
|
||
19E7000
|
heap
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page execute and read and write
|
||
B6CF000
|
stack
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
9F9000
|
stack
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page execute and read and write
|
||
68E8000
|
trusted library allocation
|
page read and write
|
||
2DC1000
|
trusted library allocation
|
page read and write
|
||
5070000
|
trusted library allocation
|
page execute and read and write
|
||
189E000
|
stack
|
page read and write
|
||
D45000
|
trusted library allocation
|
page read and write
|
||
35F000
|
unkown
|
page read and write
|
||
4083000
|
trusted library allocation
|
page read and write
|
||
6E84000
|
trusted library allocation
|
page read and write
|
||
3EE6000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
677F000
|
stack
|
page read and write
|
||
3F99000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
43AC000
|
trusted library allocation
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
19A5000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
3F6D000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page execute and read and write
|
||
4152000
|
trusted library allocation
|
page read and write
|
||
411D000
|
trusted library allocation
|
page read and write
|
||
296A000
|
heap
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
3F38000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
3D48000
|
trusted library allocation
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
490B000
|
stack
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
1732000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
5116000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
trusted library allocation
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
4142000
|
trusted library allocation
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
13B6000
|
trusted library allocation
|
page execute and read and write
|
||
51FE000
|
stack
|
page read and write
|
||
64A3000
|
heap
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
2FF5000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
55A6000
|
trusted library allocation
|
page read and write
|
||
3CFA000
|
trusted library allocation
|
page read and write
|
||
80C3000
|
heap
|
page read and write
|
||
90A000
|
trusted library allocation
|
page execute and read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
277B000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page execute and read and write
|
||
355A000
|
trusted library allocation
|
page read and write
|
||
597000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2E2C000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
57A0000
|
heap
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
3D22000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page execute and read and write
|
||
7870000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
42EC000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
AE9D000
|
stack
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
3CF2000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
68DA000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page execute and read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
trusted library allocation
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page execute and read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
5720000
|
heap
|
page read and write
|
||
8081000
|
heap
|
page read and write
|
||
5D8E000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
C73F000
|
stack
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
5754000
|
trusted library allocation
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page read and write
|
||
C37E000
|
stack
|
page read and write
|
||
43DD000
|
trusted library allocation
|
page read and write
|
||
6A45000
|
trusted library allocation
|
page read and write
|
||
4172000
|
trusted library allocation
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
3225000
|
trusted library allocation
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
2CB9000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
There are 769 hidden memdumps, click here to show them.