Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rJUSTIFICANTEDEPAGO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Biofeedback\Zonar187\Fgtedes\Kisser\battery-level-90-charging-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\colorimeter-colorhug-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\media-playlist-consecutive-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\network-offline-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\network-wireless.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\Preaddition.Bor
|
ASCII text, with very long lines (36518), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\preferences-desktop-font-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\task-due-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\window-close.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stersfarterne\Svigermdrenes.Hip
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\AdvSplash.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
|
C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/dotnet/runtimeBSJB
|
unknown
|
||
https://doc-0s-98-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l1utm86tkghdjh82fk6qcfges/1679307750000/00651307112604445902/*/1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW?e=download&uuid=ea605c4e-1574-48ab-a781-ae85f09da2da
|
142.250.186.33
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://doc-0s-98-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l
|
unknown
|
||
https://doc-0s-98-docs.googleusercontent.com/%%doc-0s-98-docs.googleusercontent.com
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
172.217.16.206
|
||
googlehosted.l.googleusercontent.com
|
142.250.186.33
|
||
doc-0s-98-docs.googleusercontent.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.16.206
|
drive.google.com
|
United States
|
||
142.250.186.33
|
googlehosted.l.googleusercontent.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\InstallDir32
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Micos\Irises\Kandissens\Raceblanding
|
Sulphammonium164
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hermeneutics\Ophjedes\Amtsraadsmedlemmet
|
Printerproblemernes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\Spisekamrenes
|
Rumfartscenterets
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Fetichry
|
Isobase
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5376000
|
direct allocation
|
page execute and read and write
|
||
360C1000
|
trusted library allocation
|
page read and write
|
||
35DD5000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
C00E37D000
|
stack
|
page read and write
|
||
2702F4A6000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
2702F3A0000
|
unclassified section
|
page readonly
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
B43000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
direct allocation
|
page read and write
|
||
18EEA0B7000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0C0000
|
heap
|
page read and write
|
||
39150000
|
trusted library allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
A132AFE000
|
stack
|
page read and write
|
||
1CEADE40000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
27057F64000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
34F80000
|
direct allocation
|
page read and write
|
||
39100000
|
trusted library allocation
|
page read and write
|
||
35DFA000
|
heap
|
page read and write
|
||
382D0000
|
trusted library allocation
|
page read and write
|
||
360A0000
|
trusted library allocation
|
page execute and read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702F4E2000
|
heap
|
page read and write
|
||
35E4D000
|
trusted library allocation
|
page execute and read and write
|
||
8BD000
|
heap
|
page read and write
|
||
387F0000
|
trusted library allocation
|
page read and write
|
||
270575D4000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
6776000
|
direct allocation
|
page execute and read and write
|
||
39180000
|
unkown
|
page read and write
|
||
556A000
|
heap
|
page read and write
|
||
19EF4D04000
|
heap
|
page read and write
|
||
4BB5EFE000
|
stack
|
page read and write
|
||
381EB000
|
trusted library allocation
|
page read and write
|
||
18EEA0BF000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
18EEA0C3000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
19EF4CB0000
|
heap
|
page read and write
|
||
38330000
|
heap
|
page execute and read and write
|
||
2702F4EF000
|
heap
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
18EE9D80000
|
heap
|
page read and write
|
||
89D000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
18EEA0C0000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1F8A2CB0000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
3610F000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
5579000
|
heap
|
page read and write
|
||
35E6B000
|
trusted library allocation
|
page execute and read and write
|
||
B15000
|
trusted library allocation
|
page read and write
|
||
381D0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27057FA3000
|
heap
|
page read and write
|
||
35DE1000
|
heap
|
page read and write
|
||
244C9FE6000
|
heap
|
page read and write
|
||
1F8A2BC0000
|
heap
|
page read and write
|
||
5517000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B41000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
38830000
|
trusted library allocation
|
page read and write
|
||
38320000
|
trusted library allocation
|
page read and write
|
||
5562000
|
heap
|
page read and write
|
||
35DC3000
|
heap
|
page read and write
|
||
1F8A2B92000
|
heap
|
page read and write
|
||
35DDB000
|
heap
|
page read and write
|
||
19D6000
|
remote allocation
|
page execute and read and write
|
||
27057F47000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
unkown
|
page read and write
|
||
35E3D000
|
trusted library allocation
|
page execute and read and write
|
||
B18000
|
trusted library allocation
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
27057F6F000
|
heap
|
page read and write
|
||
38283000
|
heap
|
page read and write
|
||
C00E2FE000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
2702F413000
|
heap
|
page read and write
|
||
1F8A2AF0000
|
heap
|
page read and write
|
||
35DB4000
|
heap
|
page read and write
|
||
387C0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
27057F7A000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
270575FC000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
244CA1E5000
|
heap
|
page read and write
|
||
2702F4C4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B4C000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0BD000
|
heap
|
page read and write
|
||
B6BA6FF000
|
stack
|
page read and write
|
||
18EEA0B5000
|
heap
|
page read and write
|
||
387C0000
|
trusted library allocation
|
page read and write
|
||
B41000
|
trusted library allocation
|
page read and write
|
||
2702F4E6000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
387C0000
|
trusted library allocation
|
page read and write
|
||
387AE000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2702F400000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
2702FF96000
|
heap
|
page read and write
|
||
35E5A000
|
trusted library allocation
|
page execute and read and write
|
||
18EEA0C3000
|
heap
|
page read and write
|
||
1CEAE600000
|
heap
|
page read and write
|
||
38220000
|
trusted library allocation
|
page read and write
|
||
35E50000
|
trusted library allocation
|
page read and write
|
||
2702F4B5000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
39110000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
39140000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
39150000
|
trusted library allocation
|
page read and write
|
||
270575EE000
|
heap
|
page read and write
|
||
B70000
|
direct allocation
|
page read and write
|
||
18EEA802000
|
trusted library allocation
|
page read and write
|
||
18EEA0BC000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
270575DB000
|
heap
|
page read and write
|
||
27057667000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
360B0000
|
heap
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
27057970000
|
heap
|
page read and write
|
||
18EE9F60000
|
trusted library allocation
|
page read and write
|
||
1F8A3550000
|
trusted library allocation
|
page read and write
|
||
39160000
|
trusted library allocation
|
page read and write
|
||
70F9000
|
trusted library allocation
|
page read and write
|
||
38240000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
38201000
|
trusted library allocation
|
page read and write
|
||
2702FF53000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
18EE9F10000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
19EF4D02000
|
heap
|
page read and write
|
||
1CEADE2A000
|
heap
|
page read and write
|
||
387C0000
|
trusted library allocation
|
page read and write
|
||
35087000
|
heap
|
page read and write
|
||
38F00000
|
heap
|
page read and write
|
||
1F8A2BC6000
|
heap
|
page read and write
|
||
27057697000
|
heap
|
page read and write
|
||
1F8A37E0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
2702F424000
|
heap
|
page read and write
|
||
B1C000
|
trusted library allocation
|
page read and write
|
||
8C32E7E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
18EEA0B9000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
381EE000
|
trusted library allocation
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
387CC000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
1F8A2AE0000
|
heap
|
page read and write
|
||
18EEA080000
|
heap
|
page read and write
|
||
27057F87000
|
heap
|
page read and write
|
||
27057688000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
18EEA06F000
|
heap
|
page read and write
|
||
39120000
|
trusted library allocation
|
page read and write
|
||
1F8A3B70000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
35DC0000
|
heap
|
page read and write
|
||
1F8A2B53000
|
heap
|
page read and write
|
||
1CEADE13000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1F8A2B94000
|
heap
|
page read and write
|
||
270575D4000
|
heap
|
page read and write
|
||
18EEA0BA000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
34CC0000
|
heap
|
page read and write
|
||
7176000
|
direct allocation
|
page execute and read and write
|
||
2705766C000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
553E000
|
heap
|
page read and write
|
||
27057F40000
|
heap
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
B6BAA7B000
|
stack
|
page read and write
|
||
2702F457000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
1F8A2B94000
|
heap
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
2702F4E2000
|
heap
|
page read and write
|
||
244CA1E0000
|
heap
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
18EEA0BD000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
1F8A2B94000
|
heap
|
page read and write
|
||
1CEADE37000
|
heap
|
page read and write
|
||
2702F4F8000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
381FA000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
38830000
|
trusted library allocation
|
page read and write
|
||
27057FFE000
|
heap
|
page read and write
|
||
18EEA055000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
387A0000
|
unkown
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
B43000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
35A70000
|
remote allocation
|
page read and write
|
||
2702FF84000
|
heap
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
2702F48B000
|
heap
|
page read and write
|
||
18EEA0AA000
|
heap
|
page read and write
|
||
19EF4CE4000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
27057606000
|
heap
|
page read and write
|
||
18EE9F00000
|
unclassified section
|
page readonly
|
||
1F8A2BC6000
|
heap
|
page read and write
|
||
551C000
|
heap
|
page read and write
|
||
2702F4E8000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
4BD6000
|
remote allocation
|
page execute and read and write
|
||
1F8A2A00000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page execute and read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
19EF4E80000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
35E52000
|
trusted library allocation
|
page read and write
|
||
19EF4CDF000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
18EEA0B7000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
27057673000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
19EF4C00000
|
heap
|
page read and write
|
||
18EEA0BF000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
34FA0000
|
direct allocation
|
page read and write
|
||
27058076000
|
heap
|
page read and write
|
||
E28000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
A132DFE000
|
stack
|
page read and write
|
||
1CEAE800000
|
trusted library allocation
|
page read and write
|
||
27057FF5000
|
heap
|
page read and write
|
||
35E65000
|
trusted library allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
2705767F000
|
heap
|
page read and write
|
||
18EEA113000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
35D00000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
35DB7000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B5000
|
heap
|
page read and write
|
||
789000
|
unkown
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
||
35D9A000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
382D0000
|
heap
|
page read and write
|
||
2702F4E7000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
7AB000
|
unkown
|
page read and write
|
||
2702F4FF000
|
heap
|
page read and write
|
||
5522000
|
heap
|
page read and write
|
||
4BB5FFF000
|
stack
|
page read and write
|
||
27057FD8000
|
heap
|
page read and write
|
||
38310000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
18EEA0B4000
|
heap
|
page read and write
|
||
19EF4CEE000
|
heap
|
page read and write
|
||
5551000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
39130000
|
trusted library allocation
|
page read and write
|
||
19EF4D09000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
27057770000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1F8A2A90000
|
trusted library allocation
|
page read and write
|
||
18EEA0BA000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
1F8A3B50000
|
trusted library allocation
|
page read and write
|
||
38800000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
2702F4E2000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page execute and read and write
|
||
18EEA06F000
|
heap
|
page read and write
|
||
381C0000
|
trusted library allocation
|
page read and write
|
||
A1327DC000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1F8A2B94000
|
heap
|
page read and write
|
||
387A0000
|
unkown
|
page read and write
|
||
244C9E00000
|
heap
|
page read and write
|
||
18EEA09B000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
B6BA87F000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
5528000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
19EF4C15000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
2702F4F0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
35E30000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
35E62000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
35080000
|
heap
|
page read and write
|
||
35D0E000
|
heap
|
page read and write
|
||
27057FB8000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
35E33000
|
trusted library allocation
|
page execute and read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B44000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
387B7000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1CEADDD0000
|
unclassified section
|
page readonly
|
||
18EEA0B9000
|
heap
|
page read and write
|
||
18EEA0BA000
|
heap
|
page read and write
|
||
E1B000
|
unkown
|
page read and write
|
||
38212000
|
trusted library allocation
|
page read and write
|
||
A1333FF000
|
stack
|
page read and write
|
||
270574F0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702FF00000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
1F8A2BA7000
|
heap
|
page read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
5535000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
B41000
|
unkown
|
page read and write
|
||
39160000
|
trusted library allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38F08000
|
heap
|
page read and write
|
||
35A70000
|
remote allocation
|
page read and write
|
||
35D20000
|
heap
|
page read and write
|
||
1F8A2BC6000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702F4F4000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
8BD000
|
heap
|
page read and write
|
||
2702F3B0000
|
heap
|
page read and write
|
||
27057F20000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
39150000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
unkown
|
page read and write
|
||
27057668000
|
heap
|
page read and write
|
||
387A0000
|
unkown
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
382D0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
B6BA9FE000
|
stack
|
page read and write
|
||
B80000
|
unclassified section
|
page readonly
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1CEADC60000
|
heap
|
page read and write
|
||
2702F4A4000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
3FBBE7D000
|
stack
|
page read and write
|
||
390F0000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
556D000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1CEADE27000
|
heap
|
page read and write
|
||
38240000
|
trusted library allocation
|
page read and write
|
||
27057975000
|
heap
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
2702F513000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1CEADE02000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
1F8A2BA7000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
B15000
|
trusted library allocation
|
page read and write
|
||
18EEA000000
|
heap
|
page read and write
|
||
390FB000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
35E40000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
19EF4CE4000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702FF36000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
19EF4EF0000
|
heap
|
page read and write
|
||
EDC000
|
stack
|
page read and write
|
||
270575A9000
|
heap
|
page read and write
|
||
23D6000
|
remote allocation
|
page execute and read and write
|
||
387D0000
|
trusted library allocation
|
page read and write
|
||
244C9FB0000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
27057F60000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B7000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
35E60000
|
trusted library allocation
|
page read and write
|
||
3609C000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
38EF1000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
2702F2F0000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7F430000
|
trusted library allocation
|
page execute and read and write
|
||
2B22AFE000
|
stack
|
page read and write
|
||
C00E5FF000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1F8A2AA0000
|
heap
|
page read and write
|
||
8576000
|
direct allocation
|
page execute and read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
35AAE000
|
stack
|
page read and write
|
||
27057F39000
|
heap
|
page read and write
|
||
2702F360000
|
heap
|
page read and write
|
||
3827C000
|
stack
|
page read and write
|
||
1CEADE00000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
E2B000
|
trusted library allocation
|
page read and write
|
||
2702F440000
|
heap
|
page read and write
|
||
5508000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38230000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
27057692000
|
heap
|
page read and write
|
||
19EF4CED000
|
heap
|
page read and write
|
||
B6BA97F000
|
stack
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
35E34000
|
trusted library allocation
|
page read and write
|
||
1F8A2BC0000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
5562000
|
heap
|
page read and write
|
||
18EEA102000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
3820D000
|
trusted library allocation
|
page read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
39170000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
direct allocation
|
page execute and read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
1F8A2BA7000
|
heap
|
page read and write
|
||
390F0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
27057F6F000
|
heap
|
page read and write
|
||
38280000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
381F2000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
891000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
891000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E28000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
remote allocation
|
page execute and read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
39170000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0B7000
|
heap
|
page read and write
|
||
18EEA0C0000
|
heap
|
page read and write
|
||
39180000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
244C9FB7000
|
heap
|
page read and write
|
||
2E0C000
|
stack
|
page read and write
|
||
F00000
|
remote allocation
|
page execute and read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38206000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
557C000
|
heap
|
page read and write
|
||
38800000
|
unkown
|
page read and write
|
||
2702FC70000
|
trusted library allocation
|
page read and write
|
||
2702F502000
|
heap
|
page read and write
|
||
1CEAE615000
|
heap
|
page read and write
|
||
35EB8000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
unkown
|
page read and write
|
||
550A000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
38250000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
1F8A3B80000
|
trusted library allocation
|
page read and write
|
||
35DEE000
|
heap
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
8C32EF9000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA029000
|
heap
|
page read and write
|
||
54F5000
|
heap
|
page read and write
|
||
39144000
|
trusted library allocation
|
page read and write
|
||
1F8A2BB2000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1F8A2BC6000
|
heap
|
page read and write
|
||
18EEA0BA000
|
heap
|
page read and write
|
||
387B0000
|
unkown
|
page read and write
|
||
35D4E000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
35700000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
C00E47E000
|
stack
|
page read and write
|
||
35EAE000
|
stack
|
page read and write
|
||
1F8A2BA7000
|
heap
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
B6BA8F9000
|
stack
|
page read and write
|
||
38310000
|
trusted library allocation
|
page read and write
|
||
38EF0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
18EEA073000
|
heap
|
page read and write
|
||
2702FF40000
|
heap
|
page read and write
|
||
38F08000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702F427000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
27057F87000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
34CB1000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
2705769D000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2702F4E2000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
34F40000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
5553000
|
heap
|
page read and write
|
||
C00E4FC000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
1F8A2AA5000
|
heap
|
page read and write
|
||
35D08000
|
heap
|
page read and write
|
||
2B22D7E000
|
stack
|
page read and write
|
||
B6BA77F000
|
stack
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
387B5000
|
trusted library allocation
|
page read and write
|
||
B15000
|
trusted library allocation
|
page read and write
|
||
18EEA100000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B4E000
|
trusted library allocation
|
page read and write
|
||
27057570000
|
trusted library allocation
|
page read and write
|
||
2B2274E000
|
stack
|
page read and write
|
||
387D7000
|
trusted library allocation
|
page read and write
|
||
19EF4CB9000
|
heap
|
page read and write
|
||
3574E000
|
stack
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
35BAE000
|
stack
|
page read and write
|
||
2702F4EC000
|
heap
|
page read and write
|
||
27057F64000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
unkown
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
18EEA0BC000
|
heap
|
page read and write
|
||
27057F23000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page execute and read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
270575E7000
|
heap
|
page read and write
|
||
387C0000
|
trusted library allocation
|
page read and write
|
||
1CEAE000000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
10059000
|
trusted library allocation
|
page read and write
|
||
35D35000
|
heap
|
page read and write
|
||
36312000
|
trusted library allocation
|
page read and write
|
||
554E000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
3843C000
|
stack
|
page read and write
|
||
41D6000
|
remote allocation
|
page execute and read and write
|
||
1F8A2D20000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2702F47E000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
270575DC000
|
heap
|
page read and write
|
||
387B0000
|
unkown
|
page read and write
|
||
2702F4F6000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
C00E57A000
|
stack
|
page read and write
|
||
1F8A2BC6000
|
heap
|
page read and write
|
||
387F0000
|
trusted library allocation
|
page read and write
|
||
2702F4F1000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
38810000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
18EEA041000
|
heap
|
page read and write
|
||
1CEAE602000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2DD6000
|
remote allocation
|
page execute and read and write
|
||
39140000
|
trusted library allocation
|
page read and write
|
||
18EEA0D0000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
5555000
|
heap
|
page read and write
|
||
88D000
|
heap
|
page read and write
|
||
A132F7E000
|
stack
|
page read and write
|
||
E26000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
38800000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B17000
|
trusted library allocation
|
page read and write
|
||
35DF3000
|
heap
|
page read and write
|
||
26D5000
|
heap
|
page read and write
|
||
35E67000
|
trusted library allocation
|
page execute and read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
19EF4CE0000
|
heap
|
page read and write
|
||
1F8A2AE8000
|
heap
|
page read and write
|
||
35BFA000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
270577E0000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
27057F96000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2702F4F8000
|
heap
|
page read and write
|
||
39180000
|
trusted library allocation
|
page read and write
|
||
270575A0000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
381FE000
|
trusted library allocation
|
page read and write
|
||
37D6000
|
remote allocation
|
page execute and read and write
|
||
18EEA0BB000
|
heap
|
page read and write
|
||
27057682000
|
heap
|
page read and write
|
||
2702FFA1000
|
heap
|
page read and write
|
||
270580B3000
|
heap
|
page read and write
|
||
C00E27B000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
381E0000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
4BB5AAA000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
1F8A2B7D000
|
heap
|
page read and write
|
||
27057F31000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
35E56000
|
trusted library allocation
|
page execute and read and write
|
||
5554000
|
heap
|
page read and write
|
||
1F8A2B35000
|
heap
|
page read and write
|
||
1CEADE59000
|
heap
|
page read and write
|
||
556E000
|
heap
|
page read and write
|
||
18EEA013000
|
heap
|
page read and write
|
||
370C1000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
39103000
|
trusted library allocation
|
page read and write
|
||
8C32DFE000
|
stack
|
page read and write
|
||
1F8A2B68000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
1F8A35C0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
27058082000
|
heap
|
page read and write
|
||
2B226CC000
|
stack
|
page read and write
|
||
1F8A2BA7000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2702FF32000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
387A0000
|
unkown
|
page read and write
|
||
1CEADF02000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
heap
|
page read and write
|
||
27057FD8000
|
heap
|
page read and write
|
||
27057672000
|
heap
|
page read and write
|
||
2702F4EB000
|
heap
|
page read and write
|
||
27058020000
|
heap
|
page read and write
|
||
10020000
|
trusted library allocation
|
page read and write
|
||
891000
|
heap
|
page read and write
|
||
18EEA0BC000
|
heap
|
page read and write
|
||
27057F60000
|
heap
|
page read and write
|
||
387A5000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
27057F32000
|
heap
|
page read and write
|
||
A132C7B000
|
stack
|
page read and write
|
||
244C9F30000
|
heap
|
page read and write
|
||
38800000
|
trusted library allocation
|
page read and write
|
||
5502000
|
heap
|
page read and write
|
||
E33000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2B22F7B000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
270575DF000
|
heap
|
page read and write
|
||
3605F000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
1CEADCC0000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
8C329DC000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
2702FE02000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
4976000
|
direct allocation
|
page execute and read and write
|
||
1E4000
|
heap
|
page read and write
|
||
18EE9DF0000
|
heap
|
page read and write
|
||
1F8A3BD0000
|
trusted library allocation
|
page read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
19EF4C10000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2702F4B1000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
1F8A2B94000
|
heap
|
page read and write
|
||
3FBB8BB000
|
stack
|
page read and write
|
||
E16000
|
trusted library allocation
|
page read and write
|
||
39130000
|
trusted library allocation
|
page read and write
|
||
1F8A2B3E000
|
heap
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
38820000
|
trusted library allocation
|
page read and write
|
||
2702F4EE000
|
heap
|
page read and write
|
||
A13327F000
|
stack
|
page read and write
|
||
1F8A3B60000
|
heap
|
page readonly
|
||
34CB0000
|
heap
|
page read and write
|
||
18EEA0B8000
|
heap
|
page read and write
|
||
2702F4EA000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
35CF9000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
381E6000
|
trusted library allocation
|
page read and write
|
||
18EEA0BC000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
27057F21000
|
heap
|
page read and write
|
||
387A0000
|
trusted library allocation
|
page execute and read and write
|
||
38800000
|
trusted library allocation
|
page read and write
|
||
18EEA0C0000
|
heap
|
page read and write
|
||
27058094000
|
heap
|
page read and write
|
||
35E20000
|
trusted library allocation
|
page read and write
|
||
244CA0C0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
7B76000
|
direct allocation
|
page execute and read and write
|
||
8BD000
|
heap
|
page read and write
|
||
3584F000
|
stack
|
page read and write
|
||
381BE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
244C9FEB000
|
heap
|
page read and write
|
||
1CEAE810000
|
heap
|
page readonly
|
||
35A70000
|
remote allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
C00E3FE000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
381E4000
|
trusted library allocation
|
page read and write
|
||
2705764F000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
19EF4D09000
|
heap
|
page read and write
|
||
39410000
|
heap
|
page read and write
|
||
55C4000
|
heap
|
page read and write
|
||
244C9FE3000
|
heap
|
page read and write
|
||
1F8A2D90000
|
trusted library allocation
|
page read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
38790000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
B6BA2BC000
|
stack
|
page read and write
|
||
549B000
|
heap
|
page read and write
|
||
18EEA0B3000
|
heap
|
page read and write
|
||
35F50000
|
heap
|
page read and write
|
||
387E0000
|
trusted library allocation
|
page read and write
|
||
19EF4D06000
|
heap
|
page read and write
|
||
1F8A2BBA000
|
heap
|
page read and write
|
||
38800000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
B6BA7FE000
|
stack
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
38820000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
35860000
|
heap
|
page read and write
|
||
2702FF7D000
|
heap
|
page read and write
|
||
1F8A2BBA000
|
heap
|
page read and write
|
||
18EEA0BF000
|
heap
|
page read and write
|
||
3FBBD7C000
|
stack
|
page read and write
|
||
18EEA0B9000
|
heap
|
page read and write
|
||
2702F4A1000
|
heap
|
page read and write
|
||
387B0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
1F8A35B0000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
1CEAE5D0000
|
trusted library allocation
|
page read and write
|
||
382D0000
|
trusted library allocation
|
page read and write
|
There are 882 hidden memdumps, click here to show them.