Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rShippingDocuments240384.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rShippingDocuments240384.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp1FC2.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\tdcorV.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\tdcorV.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tdcorV.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1myx12ag.trk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2uc2muka.4ty.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wc4svgu.rji.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2yorotv0.xwp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dg5idzg5.erb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkgu4j4c.whd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvhb5fno.l5w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywurvwk4.dxa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp329E.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rShippingDocuments240384.exe
|
"C:\Users\user\Desktop\rShippingDocuments240384.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rShippingDocuments240384.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tdcorV.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tdcorV" /XML "C:\Users\user\AppData\Local\Temp\tmp1FC2.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Users\user\AppData\Roaming\tdcorV.exe
|
C:\Users\user\AppData\Roaming\tdcorV.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tdcorV" /XML "C:\Users\user\AppData\Local\Temp\tmp329E.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2029/10/2024%20/%2021:03:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://certs.starfieldtech.com/repository/0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/0
|
unknown
|
||
http://certs.starfieldtech.com/repository/1402
|
unknown
|
||
http://crl.starfieldtech.com/sfroot-g2.crl0L
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.72$
|
unknown
|
||
http://tempuri.org/DataSet1.xsd
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.72
|
188.114.97.3
|
||
http://ocsp.starfieldtech.com/08
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://ocsp.starfieldtech.com/0;
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://ocsp.starfieldtech.com/0F
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
http://crl.starfieldtech.com/sfig2s1-677.crl0c
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20a
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2029/10/2024%20/%2020:43:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://mail.bulatpharmaceutical.com
|
unknown
|
||
http://crl.starfieldtech.com/sfroot.crl0L
|
unknown
|
||
http://certificates.starfieldtech.com/repository/sfig2.crt0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 34 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
mail.bulatpharmaceutical.com
|
166.62.28.124
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
166.62.28.124
|
mail.bulatpharmaceutical.com
|
United States
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D01000
|
trusted library allocation
|
page read and write
|
||
435000
|
remote allocation
|
page execute and read and write
|
||
4B07000
|
trusted library allocation
|
page read and write
|
||
4388000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
323F000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
6A65000
|
trusted library allocation
|
page read and write
|
||
44E2000
|
trusted library allocation
|
page read and write
|
||
527E000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
2F90000
|
heap
|
page read and write
|
||
C1B0000
|
heap
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
180B000
|
trusted library allocation
|
page execute and read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
EC8E000
|
stack
|
page read and write
|
||
650D000
|
heap
|
page read and write
|
||
3FDC000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
53DF000
|
stack
|
page read and write
|
||
FEFE000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
trusted library allocation
|
page read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
6557000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
F9BE000
|
stack
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
B49D000
|
stack
|
page read and write
|
||
32B3000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
4195000
|
trusted library allocation
|
page read and write
|
||
2EBD000
|
trusted library allocation
|
page execute and read and write
|
||
E3E000
|
stack
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
B45E000
|
stack
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
5286000
|
trusted library allocation
|
page read and write
|
||
4123000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
15AF000
|
heap
|
page read and write
|
||
358E000
|
trusted library allocation
|
page read and write
|
||
5281000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
5960000
|
heap
|
page execute and read and write
|
||
5250000
|
heap
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
5860000
|
heap
|
page execute and read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
EB0C000
|
stack
|
page read and write
|
||
5DA0000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
406D000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
B220000
|
heap
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
799D000
|
heap
|
page read and write
|
||
17ED000
|
trusted library allocation
|
page execute and read and write
|
||
4E95000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
654E000
|
heap
|
page read and write
|
||
32AE000
|
trusted library allocation
|
page read and write
|
||
1353000
|
trusted library allocation
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
4DDC000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4EDD000
|
stack
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
6713000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page execute and read and write
|
||
40A3000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page execute and read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
40ED000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page execute and read and write
|
||
3333000
|
trusted library allocation
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
25FF000
|
unkown
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
6711000
|
heap
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
199E000
|
stack
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
7033000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
5DB5000
|
heap
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
11D5000
|
heap
|
page read and write
|
||
527A000
|
trusted library allocation
|
page read and write
|
||
884D000
|
stack
|
page read and write
|
||
41D2000
|
trusted library allocation
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
FDFF000
|
stack
|
page read and write
|
||
4136000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
79A7000
|
heap
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
5560000
|
trusted library section
|
page readonly
|
||
71EF000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
stack
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page execute and read and write
|
||
673E000
|
stack
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
3002000
|
trusted library allocation
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
83E0000
|
trusted library allocation
|
page read and write
|
||
6940000
|
trusted library allocation
|
page execute and read and write
|
||
56AE000
|
stack
|
page read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
6A14000
|
trusted library allocation
|
page read and write
|
||
554B000
|
stack
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
534B000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
4463000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
79BD000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
43A000
|
remote allocation
|
page execute and read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
410D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
11A7000
|
stack
|
page read and write
|
||
4303000
|
trusted library allocation
|
page read and write
|
||
1116000
|
heap
|
page read and write
|
||
7D7F000
|
stack
|
page read and write
|
||
4456000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
445D000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
42E7000
|
trusted library allocation
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
6950000
|
trusted library allocation
|
page execute and read and write
|
||
C4AD000
|
stack
|
page read and write
|
||
3D22000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page execute and read and write
|
||
3374000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
96F0000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
3FCD000
|
trusted library allocation
|
page read and write
|
||
66E6000
|
heap
|
page read and write
|
||
FAFC000
|
stack
|
page read and write
|
||
32A8000
|
trusted library allocation
|
page read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
6D67000
|
trusted library allocation
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
3D70000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page execute and read and write
|
||
105C000
|
stack
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5EBF000
|
stack
|
page read and write
|
||
3F27000
|
trusted library allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
43B000
|
remote allocation
|
page execute and read and write
|
||
9ABE000
|
stack
|
page read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
6DC4000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
439C000
|
trusted library allocation
|
page read and write
|
||
2FB6000
|
trusted library allocation
|
page read and write
|
||
1014000
|
unkown
|
page readonly
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
40E1000
|
trusted library allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
B60C000
|
stack
|
page read and write
|
||
138B000
|
trusted library allocation
|
page execute and read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
3406000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
43D000
|
unkown
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
4467000
|
trusted library allocation
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
4128000
|
trusted library allocation
|
page read and write
|
||
5266000
|
trusted library allocation
|
page read and write
|
||
880D000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
5253000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page execute and read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
FB2000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
6C86000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page execute and read and write
|
||
68FE000
|
stack
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
40B3000
|
trusted library allocation
|
page read and write
|
||
86C7000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
17F2000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
ED8E000
|
stack
|
page read and write
|
||
10AA000
|
stack
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page read and write
|
||
79AF000
|
heap
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
FA6000
|
trusted library allocation
|
page execute and read and write
|
||
505E000
|
stack
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
2EE9000
|
trusted library allocation
|
page read and write
|
||
443000
|
remote allocation
|
page execute and read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
135D000
|
trusted library allocation
|
page execute and read and write
|
||
F83000
|
trusted library allocation
|
page execute and read and write
|
||
671D000
|
stack
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
3E12000
|
trusted library allocation
|
page read and write
|
||
3342000
|
trusted library allocation
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page execute and read and write
|
||
983D000
|
stack
|
page read and write
|
||
3D94000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
1382000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
1802000
|
trusted library allocation
|
page read and write
|
||
4130000
|
trusted library allocation
|
page read and write
|
||
1372000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page execute and read and write
|
||
44CC000
|
trusted library allocation
|
page read and write
|
||
333C000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page execute and read and write
|
||
2940000
|
heap
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
4078000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
6900000
|
trusted library allocation
|
page execute and read and write
|
||
47E000
|
unkown
|
page read and write
|
||
F9D000
|
trusted library allocation
|
page execute and read and write
|
||
64BF000
|
stack
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
64C0000
|
heap
|
page read and write
|
||
43D3000
|
trusted library allocation
|
page read and write
|
||
40DB000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
2830000
|
heap
|
page read and write
|
||
B35D000
|
stack
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page execute and read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page execute and read and write
|
||
682E000
|
stack
|
page read and write
|
||
40A8000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
trusted library allocation
|
page execute and read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
96F8000
|
trusted library allocation
|
page read and write
|
||
8AF0000
|
trusted library allocation
|
page execute and read and write
|
||
40E9000
|
trusted library allocation
|
page read and write
|
||
4554000
|
trusted library allocation
|
page read and write
|
||
99BE000
|
stack
|
page read and write
|
||
7930000
|
heap
|
page read and write
|
||
17FA000
|
trusted library allocation
|
page execute and read and write
|
||
7820000
|
heap
|
page read and write
|
||
4FD3000
|
heap
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
300D000
|
trusted library allocation
|
page read and write
|
||
3EE6000
|
trusted library allocation
|
page read and write
|
||
55C2000
|
trusted library allocation
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
2898000
|
heap
|
page read and write
|
||
33C4000
|
trusted library allocation
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
trusted library allocation
|
page read and write
|
||
3D7D000
|
trusted library allocation
|
page read and write
|
||
3273000
|
trusted library allocation
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
33C6000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
5BAF000
|
stack
|
page read and write
|
||
42E3000
|
trusted library allocation
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
1830000
|
heap
|
page execute and read and write
|
||
444000
|
remote allocation
|
page execute and read and write
|
||
9840000
|
trusted library allocation
|
page execute and read and write
|
||
973E000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
718A000
|
heap
|
page read and write
|
||
795D000
|
heap
|
page read and write
|
||
3D8A000
|
trusted library allocation
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
EAA000
|
stack
|
page read and write
|
||
7110000
|
trusted library allocation
|
page execute and read and write
|
||
290E000
|
stack
|
page read and write
|
||
FAA000
|
trusted library allocation
|
page execute and read and write
|
||
5292000
|
trusted library allocation
|
page read and write
|
||
7A6E000
|
stack
|
page read and write
|
||
8C1F000
|
stack
|
page read and write
|
||
152A000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
311C000
|
trusted library allocation
|
page read and write
|
||
4592000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
3EF9000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
188E000
|
stack
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
333E000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
44AC000
|
trusted library allocation
|
page read and write
|
||
406B000
|
trusted library allocation
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
4444000
|
trusted library allocation
|
page read and write
|
||
4149000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
3339000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
C51E000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
69D7000
|
trusted library allocation
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page execute and read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
427000
|
remote allocation
|
page execute and read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
453F000
|
trusted library allocation
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
337A000
|
trusted library allocation
|
page read and write
|
||
17F6000
|
trusted library allocation
|
page execute and read and write
|
||
10E8000
|
heap
|
page read and write
|
||
7DFD000
|
stack
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
41D2000
|
trusted library allocation
|
page read and write
|
||
7FA00000
|
trusted library allocation
|
page execute and read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
4014000
|
trusted library allocation
|
page read and write
|
||
EC4E000
|
stack
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
F84000
|
trusted library allocation
|
page read and write
|
||
41D6000
|
trusted library allocation
|
page read and write
|
||
675C000
|
heap
|
page read and write
|
||
1807000
|
trusted library allocation
|
page execute and read and write
|
||
79C7000
|
heap
|
page read and write
|
||
6C8D000
|
trusted library allocation
|
page read and write
|
||
3D86000
|
trusted library allocation
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page execute and read and write
|
||
6920000
|
trusted library allocation
|
page execute and read and write
|
||
3E5E000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
38D000
|
stack
|
page read and write
|
||
2EB3000
|
trusted library allocation
|
page execute and read and write
|
||
18A000
|
stack
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
3167000
|
trusted library allocation
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
4146000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
3313000
|
trusted library allocation
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page execute and read and write
|
||
1385000
|
heap
|
page read and write
|
||
442000
|
remote allocation
|
page execute and read and write
|
||
4E76000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
7B70000
|
trusted library section
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page read and write
|
||
4AC9000
|
trusted library allocation
|
page read and write
|
||
64F3000
|
heap
|
page read and write
|
||
67ED000
|
stack
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
8AEE000
|
stack
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
34E7000
|
trusted library allocation
|
page read and write
|
||
6D6A000
|
trusted library allocation
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
F9FC000
|
stack
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
trusted library allocation
|
page read and write
|
||
526B000
|
trusted library allocation
|
page read and write
|
||
FB7000
|
trusted library allocation
|
page execute and read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
40E3000
|
trusted library allocation
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page execute and read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
1683000
|
heap
|
page read and write
|
||
1662000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
2DBB000
|
trusted library allocation
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
137A000
|
trusted library allocation
|
page execute and read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
40D4000
|
trusted library allocation
|
page read and write
|
||
3D8C000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
3FB7000
|
trusted library allocation
|
page read and write
|
||
4154000
|
trusted library allocation
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page read and write
|
||
42F000
|
remote allocation
|
page execute and read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
988D000
|
stack
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
43F000
|
remote allocation
|
page execute and read and write
|
||
6DD0000
|
trusted library allocation
|
page execute and read and write
|
||
C3AE000
|
stack
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
trusted library allocation
|
page read and write
|
||
5923000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
6E8E000
|
heap
|
page read and write
|
||
3DE9000
|
trusted library allocation
|
page read and write
|
||
3E74000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
4437000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
4349000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
trusted library allocation
|
page execute and read and write
|
||
41FE000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
6C74000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
43C000
|
remote allocation
|
page execute and read and write
|
||
4377000
|
trusted library allocation
|
page read and write
|
||
2910000
|
trusted library allocation
|
page execute and read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
4473000
|
trusted library allocation
|
page read and write
|
||
3D29000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
528D000
|
trusted library allocation
|
page read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
444B000
|
trusted library allocation
|
page read and write
|
||
6C88000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page read and write
|
||
3F43000
|
trusted library allocation
|
page read and write
|
||
4595000
|
trusted library allocation
|
page read and write
|
||
3F24000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
441E000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
trusted library allocation
|
page execute and read and write
|
||
1385000
|
trusted library allocation
|
page execute and read and write
|
||
6E80000
|
heap
|
page read and write
|
||
17DD000
|
stack
|
page read and write
|
||
6754000
|
heap
|
page read and write
|
||
5D11000
|
heap
|
page read and write
|
||
7F680000
|
trusted library allocation
|
page execute and read and write
|
||
409E000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
2DB3000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page execute and read and write
|
||
5920000
|
heap
|
page read and write
|
||
F93000
|
trusted library allocation
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
FB00000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
7B6F000
|
stack
|
page read and write
|
||
5CDD000
|
stack
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
17E3000
|
trusted library allocation
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
300B000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4E57000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
1354000
|
trusted library allocation
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
42B9000
|
trusted library allocation
|
page read and write
|
||
50C8000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
1387000
|
trusted library allocation
|
page execute and read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
6C7A000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
stack
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
6C76000
|
trusted library allocation
|
page read and write
|
||
71E5000
|
heap
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
54D0000
|
heap
|
page execute and read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page execute and read and write
|
||
55CA000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
B59E000
|
stack
|
page read and write
|
||
413D000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
trusted library allocation
|
page read and write
|
||
98CE000
|
stack
|
page read and write
|
||
294A000
|
heap
|
page read and write
|
||
41A8000
|
trusted library allocation
|
page read and write
|
||
3D01000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
11D1000
|
heap
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
heap
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
4318000
|
trusted library allocation
|
page read and write
|
||
425000
|
remote allocation
|
page execute and read and write
|
||
14F0000
|
heap
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
3FFB000
|
trusted library allocation
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
EA0E000
|
stack
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page execute and read and write
|
||
9650000
|
trusted library section
|
page read and write
|
||
71F6000
|
heap
|
page read and write
|
||
2EEF000
|
trusted library allocation
|
page read and write
|
||
7F22000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page execute and read and write
|
||
4279000
|
trusted library allocation
|
page read and write
|
||
3B3B000
|
trusted library allocation
|
page read and write
|
||
32A6000
|
trusted library allocation
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
72A000
|
stack
|
page read and write
|
||
414E000
|
trusted library allocation
|
page read and write
|
||
146D000
|
stack
|
page read and write
|
||
5D90000
|
trusted library section
|
page readonly
|
||
43D000
|
remote allocation
|
page execute and read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
6A62000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
526E000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page execute and read and write
|
||
6A00000
|
trusted library allocation
|
page execute and read and write
|
||
15EC000
|
heap
|
page read and write
|
||
32A4000
|
trusted library allocation
|
page read and write
|
||
42A6000
|
trusted library allocation
|
page read and write
|
||
544C000
|
stack
|
page read and write
|
||
4097000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
4140000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
1594000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
3D77000
|
trusted library allocation
|
page read and write
|
||
424000
|
remote allocation
|
page execute and read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
31A6000
|
trusted library allocation
|
page read and write
|
||
438D000
|
trusted library allocation
|
page read and write
|
||
BF7000
|
stack
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page execute and read and write
|
||
5643000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
674F000
|
heap
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
6D87000
|
trusted library allocation
|
page read and write
|
||
C42000
|
heap
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
408C000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
328F000
|
trusted library allocation
|
page read and write
|
||
43BE000
|
trusted library allocation
|
page read and write
|
||
2FC1000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
3E3E000
|
trusted library allocation
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page execute and read and write
|
||
2DB7000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
EB4D000
|
stack
|
page read and write
|
||
F52000
|
unkown
|
page readonly
|
||
6A36000
|
trusted library allocation
|
page read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
heap
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
1376000
|
trusted library allocation
|
page execute and read and write
|
||
6E15000
|
trusted library allocation
|
page read and write
|
||
159D000
|
trusted library allocation
|
page execute and read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
414C000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page execute and read and write
|
||
5070000
|
heap
|
page read and write
|
||
1AC7000
|
heap
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
1593000
|
trusted library allocation
|
page execute and read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
stack
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
There are 772 hidden memdumps, click here to show them.