Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nsgB1F9.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsgB1F9.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Chrome\Default\Cookies
|
SQLite 3.x database, last written using SQLite version 3036000, file counter 36, database pages 24, 1st free page 14, free
pages 11, cookie 0x5, schema 4, UTF-8, version-valid-for 36
|
dropped
|
||
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Edge Chromium\Default\Cookies
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 7, database pages 5, cookie 0x4, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version
2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Microsoft.Practices.Composite.UnityExtensions.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Reinspired.Aut
|
ASCII text, with very long lines (50244), with no line terminators
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Seacross.Him
|
data
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\default.css
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\network-cellular-signal-none-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\Pacifisterne\Automatcafeer\Tubulating\application-x-executable.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x19^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x05^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x07^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x78^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x79^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x71^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x71^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x08^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x39^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2A^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x3F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0D^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x27^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x2E^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x0A^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x63^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x26^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x39^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x33^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x73^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x3B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7F^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x22^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x6B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x33^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x73^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x7B^75"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /A "0x67^75"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 121 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
64.185.227.155
|
||
http://ftp.sentientshift.com
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://sentientshift.com
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://enlluec.tk/dkVAJHULLLAJIKvMzyyDm233.pcx
|
103.83.194.19
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://enlluec.tk/
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ftp.sentientshift.com
|
unknown
|
||
api4.ipify.org
|
64.185.227.155
|
||
sentientshift.com
|
192.185.87.146
|
||
enlluec.tk
|
103.83.194.19
|
||
api.ipify.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.83.194.19
|
enlluec.tk
|
United States
|
||
192.185.87.146
|
sentientshift.com
|
United States
|
||
64.185.227.155
|
api4.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Territorialkravets
|
Tantaliferous
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
58D8000
|
direct allocation
|
page execute and read and write
|
||
3418B000
|
trusted library allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
36980000
|
trusted library allocation
|
page read and write
|
||
23D8000
|
remote allocation
|
page execute and read and write
|
||
374A5000
|
trusted library allocation
|
page read and write
|
||
27429AE0000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33F90000
|
trusted library allocation
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374A8000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
10020000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
381F000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
trusted library allocation
|
page read and write
|
||
37710000
|
trusted library allocation
|
page read and write
|
||
36148000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
27429C1A000
|
heap
|
page read and write
|
||
341E4000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
363AD000
|
heap
|
page read and write
|
||
37178000
|
heap
|
page read and write
|
||
363A5000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
3821000
|
heap
|
page read and write
|
||
27429C47000
|
heap
|
page read and write
|
||
74C000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33EAD000
|
trusted library allocation
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
33E90000
|
trusted library allocation
|
page read and write
|
||
374B0000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
27429B70000
|
unclassified section
|
page readonly
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
33E9D000
|
trusted library allocation
|
page execute and read and write
|
||
75E000
|
heap
|
page read and write
|
||
33F60000
|
trusted library allocation
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2742A602000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
822D47E000
|
stack
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
33ECB000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
37510000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
37182000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
4EEF000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
3683D000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
374E0000
|
heap
|
page read and write
|
||
27429C6E000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
36394000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
76D8000
|
direct allocation
|
page execute and read and write
|
||
363C0000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
33FE5000
|
trusted library allocation
|
page read and write
|
||
B29000
|
trusted library allocation
|
page read and write
|
||
822D37E000
|
stack
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
363E0000
|
trusted library allocation
|
page read and write
|
||
27429C5B000
|
heap
|
page read and write
|
||
33EB2000
|
trusted library allocation
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
32E20000
|
heap
|
page read and write
|
||
374A0000
|
unkown
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
363C2000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374C8000
|
trusted library allocation
|
page read and write
|
||
33FD1000
|
trusted library allocation
|
page read and write
|
||
375E0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
36440000
|
heap
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
36995000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
27429C00000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
34187000
|
trusted library allocation
|
page read and write
|
||
37700000
|
trusted library allocation
|
page read and write
|
||
384C000
|
heap
|
page read and write
|
||
376E0000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
3705E000
|
stack
|
page read and write
|
||
27429B40000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
27429C3B000
|
heap
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
33A6B000
|
stack
|
page read and write
|
||
383F000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
364A7000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
374B0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
3861000
|
heap
|
page read and write
|
||
374A5000
|
trusted library allocation
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
376F0000
|
trusted library allocation
|
page read and write
|
||
362E0000
|
heap
|
page read and write
|
||
363E0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
3C7D000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
363D8000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
33F80000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
33FA0000
|
heap
|
page execute and read and write
|
||
719000
|
heap
|
page read and write
|
||
33B6E000
|
stack
|
page read and write
|
||
33F70000
|
trusted library allocation
|
page read and write
|
||
34172000
|
trusted library allocation
|
page read and write
|
||
376F0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
746000
|
heap
|
page read and write
|
||
33D5A000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A5000
|
trusted library allocation
|
page read and write
|
||
33EC5000
|
trusted library allocation
|
page execute and read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
remote allocation
|
page execute and read and write
|
||
376FB000
|
unkown
|
page read and write
|
||
36386000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
376E8000
|
trusted library allocation
|
page read and write
|
||
36396000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
339C0000
|
heap
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
330A0000
|
direct allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33EBA000
|
trusted library allocation
|
page execute and read and write
|
||
37500000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
374B5000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
27429C7D000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37172000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
27429C6B000
|
heap
|
page read and write
|
||
3417A000
|
trusted library allocation
|
page read and write
|
||
37192000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
363C2000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33FC2000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
341D7000
|
trusted library allocation
|
page read and write
|
||
3631B000
|
heap
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
2936000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
27429C13000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
22F0000
|
heap
|
page read and write
|
||
3B7C000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
37700000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B30000
|
trusted library section
|
page read and write
|
||
33BD0000
|
remote allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
36392000
|
heap
|
page read and write
|
||
27429C31000
|
heap
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
363F0000
|
heap
|
page read and write
|
||
75D000
|
heap
|
page read and write
|
||
36980000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
3638B000
|
heap
|
page read and write
|
||
822CDCB000
|
stack
|
page read and write
|
||
37196000
|
heap
|
page read and write
|
||
2434000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37174000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
8E0000
|
direct allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
374B0000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B11000
|
trusted library allocation
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
363C2000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
374D7000
|
trusted library allocation
|
page read and write
|
||
375E0000
|
unkown
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
377F0000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
376F0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
363E0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
20000
|
unclassified section
|
page readonly
|
||
75E000
|
heap
|
page read and write
|
||
37F5000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
363B6000
|
heap
|
page read and write
|
||
376F0000
|
unkown
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
34200000
|
trusted library allocation
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
362F9000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
BAA000
|
trusted library allocation
|
page read and write
|
||
36995000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
5700000
|
direct allocation
|
page execute and read and write
|
||
71D000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
2932000
|
heap
|
page read and write
|
||
331E0000
|
heap
|
page read and write
|
||
374C0000
|
unkown
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
33BD0000
|
remote allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
33FBB000
|
trusted library allocation
|
page read and write
|
||
363D2000
|
heap
|
page read and write
|
||
3716C000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
363F3000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
363E0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
377EE000
|
stack
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
35C5000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
363D8000
|
heap
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
377AD000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
374B0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
363A9000
|
heap
|
page read and write
|
||
7F8A0000
|
trusted library allocation
|
page execute and read and write
|
||
B21000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B32000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37E4000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
4EEF000
|
heap
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
33F0E000
|
stack
|
page read and write
|
||
33D0F000
|
stack
|
page read and write
|
||
374D8000
|
trusted library allocation
|
page read and write
|
||
363B6000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33FDD000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33C0E000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
293D000
|
heap
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
364A0000
|
trusted library allocation
|
page read and write
|
||
363A8000
|
heap
|
page read and write
|
||
2933000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
3634D000
|
heap
|
page read and write
|
||
27429C27000
|
heap
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
unkown
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374E0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
27429B80000
|
unclassified section
|
page readonly
|
||
719000
|
heap
|
page read and write
|
||
36396000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A0000
|
unkown
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A5000
|
trusted library allocation
|
page read and write
|
||
341F6000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33FF0000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
363E0000
|
trusted library allocation
|
page read and write
|
||
36373000
|
heap
|
page read and write
|
||
363CC000
|
heap
|
page read and write
|
||
363BE000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page execute and read and write
|
||
71D000
|
heap
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
3635F000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33EC2000
|
trusted library allocation
|
page read and write
|
||
376D0000
|
trusted library allocation
|
page execute and read and write
|
||
33E80000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
unclassified section
|
page readonly
|
||
33F50000
|
trusted library allocation
|
page execute and read and write
|
||
75E000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
34000000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
37710000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
33FBE000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
43E000
|
unkown
|
page readonly
|
||
71D000
|
heap
|
page read and write
|
||
34379000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
363CC000
|
heap
|
page read and write
|
||
374F0000
|
trusted library allocation
|
page read and write
|
||
33FB0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
27429C27000
|
heap
|
page read and write
|
||
37160000
|
heap
|
page read and write
|
||
B51000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
363AA000
|
heap
|
page read and write
|
||
37FF000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
339AE000
|
stack
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
27429D02000
|
heap
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37173000
|
heap
|
page read and write
|
||
27429C49000
|
heap
|
page read and write
|
||
33FD6000
|
trusted library allocation
|
page read and write
|
||
385E000
|
heap
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
37520000
|
trusted library allocation
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
27429C60000
|
heap
|
page read and write
|
||
10059000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
27429C69000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
374D0000
|
unkown
|
page read and write
|
||
364B0000
|
heap
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
3630B000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
480000
|
unkown
|
page readonly
|
||
33EA0000
|
trusted library allocation
|
page read and write
|
||
362DE000
|
stack
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
2742A470000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
27429B90000
|
heap
|
page read and write
|
||
822D57A000
|
stack
|
page read and write
|
||
330E0000
|
direct allocation
|
page read and write
|
||
33FF0000
|
trusted library allocation
|
page read and write
|
||
374B0000
|
trusted library allocation
|
page read and write
|
||
37538000
|
trusted library allocation
|
page read and write
|
||
34141000
|
trusted library allocation
|
page read and write
|
||
E00000
|
remote allocation
|
page execute and read and write
|
||
726000
|
heap
|
page read and write
|
||
36395000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
2939000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
27429C02000
|
heap
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
374AF000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
3693F000
|
stack
|
page read and write
|
||
384E000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
27429C55000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33FCE000
|
trusted library allocation
|
page read and write
|
||
33E59000
|
stack
|
page read and write
|
||
33E94000
|
trusted library allocation
|
page read and write
|
||
37F3000
|
heap
|
page read and write
|
||
35141000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
376D0000
|
trusted library allocation
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
37FA000
|
heap
|
page read and write
|
||
33E93000
|
trusted library allocation
|
page execute and read and write
|
||
27429C62000
|
heap
|
page read and write
|
||
376D0000
|
trusted library allocation
|
page read and write
|
||
3717C000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
33F4C000
|
stack
|
page read and write
|
||
363DC000
|
heap
|
page read and write
|
||
374A6000
|
trusted library allocation
|
page read and write
|
||
376D0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
378B000
|
heap
|
page read and write
|
||
37700000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
remote allocation
|
page execute and read and write
|
||
293D000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
363BE000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
62D8000
|
direct allocation
|
page execute and read and write
|
||
33EB6000
|
trusted library allocation
|
page execute and read and write
|
||
32E21000
|
heap
|
page read and write
|
||
374C8000
|
trusted library allocation
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
BAF000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
376E0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
unkown
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
A30000
|
unclassified section
|
page readonly
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
374C5000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
6CD8000
|
direct allocation
|
page execute and read and write
|
||
374B0000
|
trusted library allocation
|
page execute and read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
3719E000
|
heap
|
page read and write
|
||
374D0000
|
trusted library allocation
|
page read and write
|
||
34030000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374D8000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
3823000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
363C0000
|
heap
|
page read and write
|
||
33EC7000
|
trusted library allocation
|
page execute and read and write
|
||
75E000
|
heap
|
page read and write
|
||
36990000
|
unkown
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
3413F000
|
stack
|
page read and write
|
||
37710000
|
trusted library allocation
|
page read and write
|
||
3835000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
338AE000
|
stack
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
3697E000
|
stack
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
376E0000
|
unkown
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
27429C2A000
|
heap
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
75E000
|
heap
|
page read and write
|
||
5269000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
37530000
|
trusted library allocation
|
page read and write
|
||
37173000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
35C4000
|
heap
|
page read and write
|
||
27429C20000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
374C0000
|
trusted library allocation
|
page read and write
|
||
331E7000
|
heap
|
page read and write
|
||
363B1000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
363B3000
|
heap
|
page read and write
|
||
3402C000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374A0000
|
trusted library allocation
|
page read and write
|
||
363DC000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
3719E000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
22F5000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
376F0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
33EC0000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
369A0000
|
trusted library allocation
|
page read and write
|
||
27429C40000
|
heap
|
page read and write
|
||
27429C64000
|
heap
|
page read and write
|
||
36396000
|
heap
|
page read and write
|
||
365BC000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
37700000
|
trusted library allocation
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
33FCA000
|
trusted library allocation
|
page read and write
|
||
33BD0000
|
remote allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
33EB0000
|
trusted library allocation
|
page read and write
|
||
376F0000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
36990000
|
trusted library allocation
|
page read and write
|
||
37169000
|
heap
|
page read and write
|
||
19D8000
|
remote allocation
|
page execute and read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
363D0000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
374F0000
|
heap
|
page read and write
|
||
27429C5D000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
37176000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
33860000
|
trusted library allocation
|
page read and write
|
||
27429C67000
|
heap
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B27000
|
trusted library allocation
|
page read and write
|
||
43B000
|
unkown
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
27429C6E000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
There are 704 hidden memdumps, click here to show them.