Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpB8C6.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HJnkiZjAPsec.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cqcx0lfj.plp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfvikkux.lpe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wu4lludl.4lu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zygjjui0.t3g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpCB45.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
|
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HJnkiZjAPsec" /XML "C:\Users\user\AppData\Local\Temp\tmpB8C6.tmp"
|
||
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
|
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe"
|
||
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
|
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HJnkiZjAPsec" /XML "C:\Users\user\AppData\Local\Temp\tmpCB45.tmp"
|
||
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
|
"C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://www.office.com/H
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://kafs.co.ug
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://mail.kafs.co.ug
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.81$
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20and%20Time:%2025/10/2024%20/%2019:19:15%0D%0ACountry%20Name:%20United%20States%0D%0A[%20927537%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
|
149.154.167.220
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://mail.kafs.co.ugd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://r11.i.lencr.org/0#
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
https://chrome.google.com/webstore?hl=enH
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20and%20Time:%2025/10/2024%20/%2020:37:54%0D%0ACountry%20Name:%20United%20States%0D%0A[%20927537%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
|
149.154.167.220
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20a
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://kafs.co.ugd
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.81
|
188.114.97.3
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
There are 53 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
kafs.co.ug
|
104.243.33.38
|
||
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
mail.kafs.co.ug
|
unknown
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
104.243.33.38
|
kafs.co.ug
|
United States
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
46A7000
|
trusted library allocation
|
page read and write
|
||
4A46000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page execute and read and write
|
||
69FA000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
D98E000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
10A1000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
444000
|
remote allocation
|
page execute and read and write
|
||
406C000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
3E1A000
|
trusted library allocation
|
page read and write
|
||
B3FE000
|
stack
|
page read and write
|
||
3FD2000
|
trusted library allocation
|
page read and write
|
||
6980000
|
trusted library allocation
|
page execute and read and write
|
||
3E8A000
|
trusted library allocation
|
page read and write
|
||
7C21000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
83FE000
|
stack
|
page read and write
|
||
13B3000
|
trusted library allocation
|
page execute and read and write
|
||
679E000
|
stack
|
page read and write
|
||
42E000
|
remote allocation
|
page execute and read and write
|
||
5940000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
3E1C000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
1475000
|
trusted library allocation
|
page read and write
|
||
3E13000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
6910000
|
trusted library allocation
|
page execute and read and write
|
||
690D000
|
trusted library allocation
|
page read and write
|
||
B6AE000
|
stack
|
page read and write
|
||
3E34000
|
trusted library allocation
|
page read and write
|
||
3DCF000
|
trusted library allocation
|
page read and write
|
||
2DA8000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
7ABE000
|
stack
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
18A7000
|
heap
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
1144000
|
trusted library allocation
|
page read and write
|
||
3F08000
|
trusted library allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
41A000
|
remote allocation
|
page execute and read and write
|
||
2CBE000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
7030000
|
heap
|
page read and write
|
||
5273000
|
heap
|
page read and write
|
||
949E000
|
stack
|
page read and write
|
||
7BBF000
|
stack
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
820E000
|
stack
|
page read and write
|
||
F44E000
|
stack
|
page read and write
|
||
6980000
|
trusted library allocation
|
page execute and read and write
|
||
5210000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
7F8C0000
|
trusted library allocation
|
page execute and read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
FAFD000
|
stack
|
page read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
3F36000
|
trusted library allocation
|
page read and write
|
||
30B2000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
C1C0000
|
trusted library allocation
|
page execute and read and write
|
||
3C76000
|
trusted library allocation
|
page read and write
|
||
43F000
|
remote allocation
|
page execute and read and write
|
||
57C0000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
F20E000
|
stack
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
115D000
|
trusted library allocation
|
page execute and read and write
|
||
343E000
|
trusted library allocation
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
867E000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
F59E000
|
stack
|
page read and write
|
||
3EB4000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
113B000
|
trusted library allocation
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page execute and read and write
|
||
3CE4000
|
trusted library allocation
|
page read and write
|
||
D32000
|
unkown
|
page readonly
|
||
E60000
|
heap
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
59A000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
2EBB000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
2A52000
|
trusted library allocation
|
page read and write
|
||
13D2000
|
trusted library allocation
|
page read and write
|
||
628D000
|
heap
|
page read and write
|
||
6AD7000
|
trusted library allocation
|
page read and write
|
||
2F1B000
|
trusted library allocation
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
5203000
|
heap
|
page read and write
|
||
85FE000
|
stack
|
page read and write
|
||
BBFD000
|
stack
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
864D000
|
heap
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page read and write
|
||
1317000
|
trusted library allocation
|
page execute and read and write
|
||
857E000
|
stack
|
page read and write
|
||
2D2E000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
2CAB000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
4049000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
3DFD000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
6AB2000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
112A000
|
trusted library allocation
|
page execute and read and write
|
||
FABF000
|
stack
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
heap
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
1135000
|
trusted library allocation
|
page execute and read and write
|
||
13E2000
|
trusted library allocation
|
page read and write
|
||
3F73000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
797E000
|
stack
|
page read and write
|
||
413000
|
remote allocation
|
page execute and read and write
|
||
5270000
|
heap
|
page read and write
|
||
3C8E000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
3D4B000
|
trusted library allocation
|
page read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
6A63000
|
trusted library allocation
|
page read and write
|
||
442000
|
remote allocation
|
page execute and read and write
|
||
11DC000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
3D29000
|
trusted library allocation
|
page read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
3CEB000
|
trusted library allocation
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
3EDD000
|
trusted library allocation
|
page read and write
|
||
7D05000
|
heap
|
page read and write
|
||
123D000
|
trusted library allocation
|
page execute and read and write
|
||
6930000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
3F19000
|
trusted library allocation
|
page read and write
|
||
3D0B000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
4097000
|
trusted library allocation
|
page read and write
|
||
1187000
|
stack
|
page read and write
|
||
4038000
|
trusted library allocation
|
page read and write
|
||
C120000
|
trusted library section
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
4A07000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library section
|
page readonly
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
439000
|
remote allocation
|
page execute and read and write
|
||
5630000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
1479000
|
trusted library allocation
|
page read and write
|
||
3EF6000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
8910000
|
trusted library allocation
|
page execute and read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
F5DE000
|
stack
|
page read and write
|
||
3D90000
|
trusted library allocation
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
3198000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
3E2C000
|
trusted library allocation
|
page read and write
|
||
126B000
|
trusted library allocation
|
page execute and read and write
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
1312000
|
trusted library allocation
|
page read and write
|
||
1137000
|
trusted library allocation
|
page execute and read and write
|
||
3E28000
|
trusted library allocation
|
page read and write
|
||
1233000
|
trusted library allocation
|
page execute and read and write
|
||
63A1000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
C39000
|
stack
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
3F94000
|
trusted library allocation
|
page read and write
|
||
42C000
|
remote allocation
|
page execute and read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
42B000
|
remote allocation
|
page execute and read and write
|
||
427000
|
remote allocation
|
page execute and read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
95F000
|
unkown
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
2A66000
|
trusted library allocation
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page execute and read and write
|
||
F9BE000
|
stack
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
68FA000
|
trusted library allocation
|
page read and write
|
||
3DBF000
|
trusted library allocation
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
4023000
|
trusted library allocation
|
page read and write
|
||
2BFC000
|
trusted library allocation
|
page read and write
|
||
9260000
|
trusted library allocation
|
page read and write
|
||
6320000
|
heap
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
6272000
|
heap
|
page read and write
|
||
3171000
|
trusted library allocation
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
D30000
|
unkown
|
page readonly
|
||
1220000
|
trusted library allocation
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
heap
|
page read and write
|
||
9280000
|
trusted library allocation
|
page read and write
|
||
130A000
|
trusted library allocation
|
page execute and read and write
|
||
438000
|
remote allocation
|
page execute and read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
2EE9000
|
trusted library allocation
|
page read and write
|
||
F97C000
|
stack
|
page read and write
|
||
3E11000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
heap
|
page read and write
|
||
3F8E000
|
trusted library allocation
|
page read and write
|
||
6391000
|
heap
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
BED0000
|
trusted library allocation
|
page read and write
|
||
3D01000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
41B8000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
trusted library allocation
|
page read and write
|
||
3E36000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
301A000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page execute and read and write
|
||
3DD6000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
3F0C000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
85A0000
|
trusted library allocation
|
page execute and read and write
|
||
6940000
|
trusted library allocation
|
page read and write
|
||
6A36000
|
trusted library allocation
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
415000
|
remote allocation
|
page execute and read and write
|
||
43B000
|
remote allocation
|
page execute and read and write
|
||
8BFF000
|
stack
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
7F110000
|
trusted library allocation
|
page execute and read and write
|
||
869E000
|
heap
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page execute and read and write
|
||
3C6F000
|
trusted library allocation
|
page read and write
|
||
6990000
|
trusted library allocation
|
page read and write
|
||
2A5A000
|
trusted library allocation
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
7870000
|
trusted library section
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
DB6C000
|
stack
|
page read and write
|
||
3F63000
|
trusted library allocation
|
page read and write
|
||
6A14000
|
trusted library allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
125A000
|
trusted library allocation
|
page execute and read and write
|
||
12D0000
|
heap
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
3E03000
|
trusted library allocation
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
3057000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
trusted library allocation
|
page read and write
|
||
3F88000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
41E000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
10EE000
|
stack
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
63A9000
|
heap
|
page read and write
|
||
2C0B000
|
trusted library allocation
|
page read and write
|
||
3EC3000
|
trusted library allocation
|
page read and write
|
||
10EB000
|
heap
|
page read and write
|
||
3E0E000
|
trusted library allocation
|
page read and write
|
||
3DF2000
|
trusted library allocation
|
page read and write
|
||
441000
|
remote allocation
|
page execute and read and write
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
92CE000
|
stack
|
page read and write
|
||
BAC0000
|
heap
|
page read and write
|
||
887F000
|
stack
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
5930000
|
heap
|
page execute and read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
4059000
|
trusted library allocation
|
page read and write
|
||
3DE4000
|
trusted library allocation
|
page read and write
|
||
3E60000
|
trusted library allocation
|
page read and write
|
||
43D000
|
remote allocation
|
page execute and read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
17C8000
|
trusted library allocation
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
3F00000
|
trusted library allocation
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
2EF7000
|
trusted library allocation
|
page read and write
|
||
6230000
|
heap
|
page read and write
|
||
2F7F000
|
trusted library allocation
|
page read and write
|
||
3C5D000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page execute and read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DEE000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page execute and read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
189C000
|
stack
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
3C82000
|
trusted library allocation
|
page read and write
|
||
2F4C000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
FBFE000
|
stack
|
page read and write
|
||
8610000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
3F5D000
|
trusted library allocation
|
page read and write
|
||
88BD000
|
stack
|
page read and write
|
||
13CD000
|
trusted library allocation
|
page execute and read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2D64000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page execute and read and write
|
||
8C3E000
|
stack
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
67EE000
|
stack
|
page read and write
|
||
DC6C000
|
stack
|
page read and write
|
||
7CC8000
|
heap
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
42A000
|
remote allocation
|
page execute and read and write
|
||
6A64000
|
trusted library allocation
|
page read and write
|
||
3D56000
|
trusted library allocation
|
page read and write
|
||
D88D000
|
stack
|
page read and write
|
||
3CAE000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
3E26000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
13BD000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
3FEA000
|
trusted library allocation
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
2DBD000
|
stack
|
page read and write
|
||
1306000
|
trusted library allocation
|
page read and write
|
||
843E000
|
stack
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
2D88000
|
trusted library allocation
|
page read and write
|
||
417000
|
remote allocation
|
page execute and read and write
|
||
114D000
|
trusted library allocation
|
page execute and read and write
|
||
3DEA000
|
trusted library allocation
|
page read and write
|
||
82FE000
|
stack
|
page read and write
|
||
3BC9000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
1122000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page execute and read and write
|
||
3CD4000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
316A000
|
trusted library allocation
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
trusted library allocation
|
page read and write
|
||
6906000
|
trusted library allocation
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
31CF000
|
unkown
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
103F000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
3E95000
|
trusted library allocation
|
page read and write
|
||
88FD000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
6DB0000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
3EE4000
|
trusted library allocation
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1103000
|
trusted library allocation
|
page execute and read and write
|
||
DA8E000
|
stack
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
177F000
|
stack
|
page read and write
|
||
2A04000
|
trusted library allocation
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
5C40000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page execute and read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
3E22000
|
trusted library allocation
|
page read and write
|
||
40A5000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
3FB2000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
41D000
|
remote allocation
|
page execute and read and write
|
||
6F20000
|
heap
|
page read and write
|
||
443000
|
remote allocation
|
page execute and read and write
|
||
68F6000
|
trusted library allocation
|
page read and write
|
||
3EE4000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
409E000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
3E01000
|
trusted library allocation
|
page read and write
|
||
3EF2000
|
trusted library allocation
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
3C90000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
7352000
|
trusted library allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
3CCC000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
30AE000
|
unkown
|
page read and write
|
||
3F26000
|
trusted library allocation
|
page read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
3E34000
|
trusted library allocation
|
page read and write
|
||
3EF8000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
13B4000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page execute and read and write
|
||
5440000
|
trusted library section
|
page readonly
|
||
3E47000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
4053000
|
trusted library allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
3EF0000
|
trusted library allocation
|
page read and write
|
||
1290000
|
trusted library allocation
|
page execute and read and write
|
||
14B4000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
9270000
|
trusted library allocation
|
page execute and read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
F6DE000
|
stack
|
page read and write
|
||
3DB9000
|
trusted library allocation
|
page read and write
|
||
F49D000
|
stack
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
4087000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page execute and read and write
|
||
1256000
|
trusted library allocation
|
page execute and read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
3CBC000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page execute and read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
2DB3000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
3E52000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
41B000
|
remote allocation
|
page execute and read and write
|
||
57C3000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
414000
|
remote allocation
|
page execute and read and write
|
||
3009000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
13EB000
|
trusted library allocation
|
page execute and read and write
|
||
3E93000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
2DF9000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
925F000
|
stack
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
869A000
|
heap
|
page read and write
|
||
695D000
|
trusted library allocation
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
11F0000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
425000
|
remote allocation
|
page execute and read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
13DA000
|
trusted library allocation
|
page execute and read and write
|
||
5200000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
F30D000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
6944000
|
trusted library allocation
|
page read and write
|
||
2E9C000
|
trusted library allocation
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
trusted library allocation
|
page read and write
|
||
30A7000
|
trusted library allocation
|
page read and write
|
||
43A000
|
remote allocation
|
page execute and read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
4667000
|
trusted library allocation
|
page read and write
|
||
1267000
|
trusted library allocation
|
page execute and read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
52AC000
|
stack
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
91E000
|
unkown
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
6950000
|
trusted library allocation
|
page execute and read and write
|
||
3037000
|
trusted library allocation
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library section
|
page readonly
|
||
3E18000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
3D84000
|
trusted library allocation
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
8615000
|
heap
|
page read and write
|
||
3EB6000
|
trusted library allocation
|
page read and write
|
||
3EE8000
|
trusted library allocation
|
page read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
F87B000
|
stack
|
page read and write
|
||
5625000
|
heap
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page execute and read and write
|
||
9DF000
|
stack
|
page read and write
|
||
543B000
|
stack
|
page read and write
|
||
BCFE000
|
stack
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
3C09000
|
trusted library allocation
|
page read and write
|
||
407A000
|
trusted library allocation
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
5200000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
3FF3000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
108A000
|
stack
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
BE3D000
|
stack
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
3E93000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
trusted library allocation
|
page execute and read and write
|
||
5510000
|
heap
|
page execute and read and write
|
||
13D6000
|
trusted library allocation
|
page execute and read and write
|
||
9F7000
|
stack
|
page read and write
|
||
3F96000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page execute and read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
ACE6000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page execute and read and write
|
||
3F92000
|
trusted library allocation
|
page read and write
|
||
3E44000
|
trusted library allocation
|
page read and write
|
||
3CD2000
|
trusted library allocation
|
page read and write
|
||
6A87000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
trusted library allocation
|
page read and write
|
||
1252000
|
trusted library allocation
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page execute and read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
1054000
|
heap
|
page read and write
|
||
6946000
|
trusted library allocation
|
page read and write
|
||
416000
|
remote allocation
|
page execute and read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
3FC0000
|
trusted library allocation
|
page read and write
|
||
3C5F000
|
trusted library allocation
|
page read and write
|
||
31C6000
|
trusted library allocation
|
page read and write
|
||
3F3D000
|
trusted library allocation
|
page read and write
|
||
694A000
|
trusted library allocation
|
page read and write
|
||
B28D000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
58FB000
|
stack
|
page read and write
|
||
131B000
|
trusted library allocation
|
page execute and read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
8ABE000
|
stack
|
page read and write
|
||
1304000
|
trusted library allocation
|
page read and write
|
||
5155000
|
trusted library allocation
|
page read and write
|
||
7D4F000
|
heap
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
3EAB000
|
trusted library allocation
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
3D54000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
1306000
|
trusted library allocation
|
page execute and read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
1315000
|
trusted library allocation
|
page execute and read and write
|
||
2BFC000
|
stack
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
3DBD000
|
trusted library allocation
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
14C1000
|
heap
|
page read and write
|
||
2FE9000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
5159000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
43C000
|
remote allocation
|
page execute and read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
3F45000
|
trusted library allocation
|
page read and write
|
||
F34D000
|
stack
|
page read and write
|
||
6328000
|
heap
|
page read and write
|
||
8AFE000
|
stack
|
page read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
3E72000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
4056000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
trusted library allocation
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
7D03000
|
heap
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
B090000
|
heap
|
page read and write
|
||
9EA000
|
stack
|
page read and write
|
||
3F86000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library section
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
3E4B000
|
trusted library allocation
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
5AFE000
|
heap
|
page read and write
|
||
2C07000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
trusted library allocation
|
page read and write
|
||
2E8A000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
3F24000
|
trusted library allocation
|
page read and write
|
||
2E8D000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page execute and read and write
|
||
3DE2000
|
trusted library allocation
|
page read and write
|
||
3E53000
|
trusted library allocation
|
page read and write
|
||
BD3D000
|
stack
|
page read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
7D2F000
|
heap
|
page read and write
|
||
1104000
|
trusted library allocation
|
page read and write
|
||
B38E000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
3E32000
|
trusted library allocation
|
page read and write
|
||
1234000
|
trusted library allocation
|
page read and write
|
||
3CF3000
|
trusted library allocation
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
41C000
|
remote allocation
|
page execute and read and write
|
||
1330000
|
heap
|
page read and write
|
||
65DF000
|
stack
|
page read and write
|
||
4081000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
2DAC000
|
trusted library allocation
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
3C8A000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
6AB5000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
3FD0000
|
trusted library allocation
|
page read and write
|
||
6A65000
|
trusted library allocation
|
page read and write
|
||
1126000
|
trusted library allocation
|
page execute and read and write
|
||
3E70000
|
trusted library allocation
|
page read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
3E30000
|
trusted library allocation
|
page read and write
|
||
6908000
|
trusted library allocation
|
page read and write
|
||
3DDE000
|
trusted library allocation
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
3E32000
|
trusted library allocation
|
page read and write
|
||
1143000
|
trusted library allocation
|
page execute and read and write
|
||
5B10000
|
heap
|
page read and write
|
||
3D23000
|
trusted library allocation
|
page read and write
|
||
3C84000
|
trusted library allocation
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
5243000
|
heap
|
page read and write
|
||
3D33000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
3C92000
|
trusted library allocation
|
page read and write
|
There are 807 hidden memdumps, click here to show them.