Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Supplier Order Scan 0001293039493.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Aaberg
|
ASCII text, with very long lines (29744), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\aut17A9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut17F8.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autAD8.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autBB4.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC785.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC7D5.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autE1B3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autE212.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autF7FC.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autF85A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\camellin
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe
|
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Users\user\AppData\Local\directory\name.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\directory\name.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.telegram.org/bot6598056807:AAEJNVpW5jLTQx4-KLaAAUiX0mRFbdRCujw/sendDocument
|
149.154.167.220
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.telegram.org/bot6598056807:AAEJNVpW5jLTQx4-KLaAAUiX0mRFbdRCujw/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.13.205
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E2B000
|
trusted library allocation
|
page read and write
|
||
304F000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
3470000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library section
|
page read and write
|
||
3B20000
|
direct allocation
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library section
|
page read and write
|
||
F00000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
3D10000
|
direct allocation
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
3EFE000
|
direct allocation
|
page read and write
|
||
1063000
|
unkown
|
page write copy
|
||
46AE000
|
direct allocation
|
page read and write
|
||
3049000
|
trusted library allocation
|
page read and write
|
||
5F02000
|
heap
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
4074000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
19ED000
|
heap
|
page read and write
|
||
55FD000
|
trusted library allocation
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
4639000
|
direct allocation
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
3E39000
|
direct allocation
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
3BCD000
|
direct allocation
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
3CE3000
|
direct allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
3B70000
|
direct allocation
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
15CD000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
unkown
|
page write copy
|
||
11C1000
|
heap
|
page read and write
|
||
1044000
|
trusted library allocation
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
4510000
|
direct allocation
|
page read and write
|
||
5460000
|
heap
|
page execute and read and write
|
||
1276000
|
heap
|
page read and write
|
||
105F000
|
unkown
|
page write copy
|
||
463D000
|
direct allocation
|
page read and write
|
||
1ADB000
|
heap
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
3993000
|
direct allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
19A8000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
4510000
|
direct allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
6E0F000
|
heap
|
page read and write
|
||
122C000
|
heap
|
page read and write
|
||
40D1000
|
trusted library allocation
|
page read and write
|
||
697E000
|
unkown
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
3E89000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
69DD000
|
stack
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
ED5000
|
heap
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page execute and read and write
|
||
17CF000
|
stack
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
5AF4000
|
heap
|
page read and write
|
||
1FC43ACA000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
6764000
|
trusted library allocation
|
page read and write
|
||
4639000
|
direct allocation
|
page read and write
|
||
EF8000
|
stack
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
446000
|
system
|
page execute and read and write
|
||
19D3000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
2CC6000
|
heap
|
page read and write
|
||
B0F000
|
unkown
|
page readonly
|
||
2AE0000
|
trusted library allocation
|
page execute and read and write
|
||
5FBC000
|
heap
|
page read and write
|
||
1588000
|
heap
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
1A19000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
3AA0000
|
direct allocation
|
page read and write
|
||
3870000
|
direct allocation
|
page read and write
|
||
3E8D000
|
direct allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
3EAE000
|
direct allocation
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
3D10000
|
direct allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page execute and read and write
|
||
304D000
|
trusted library allocation
|
page read and write
|
||
68E0000
|
trusted library allocation
|
page execute and read and write
|
||
6B1E000
|
unkown
|
page read and write
|
||
1FC43A93000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
8EA000
|
stack
|
page read and write
|
||
F66000
|
trusted library allocation
|
page execute and read and write
|
||
11AC000
|
heap
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
2EE5000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
3E39000
|
direct allocation
|
page read and write
|
||
64CD000
|
stack
|
page read and write
|
||
6880000
|
trusted library allocation
|
page execute and read and write
|
||
1AA000
|
stack
|
page read and write
|
||
3E68000
|
trusted library allocation
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
3E89000
|
direct allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
3A23000
|
direct allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
A6336FF000
|
stack
|
page read and write
|
||
5E9000
|
stack
|
page read and write
|
||
3EFE000
|
direct allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5AA000
|
stack
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
3EFE000
|
direct allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
DDF000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
1FC43950000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
6E07000
|
heap
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
3503000
|
direct allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
1FC43BE0000
|
heap
|
page read and write
|
||
3F03000
|
direct allocation
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
111E000
|
heap
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
560C000
|
stack
|
page read and write
|
||
1077000
|
trusted library allocation
|
page execute and read and write
|
||
4639000
|
direct allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
3B3D000
|
direct allocation
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
6927000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
1FC43C05000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
3BC9000
|
direct allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page execute and read and write
|
||
2B9D000
|
trusted library allocation
|
page read and write
|
||
F34000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
46AE000
|
direct allocation
|
page read and write
|
||
102F000
|
unkown
|
page readonly
|
||
3080000
|
heap
|
page read and write
|
||
3C93000
|
direct allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
1A9D000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
3EAE000
|
direct allocation
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
1066000
|
trusted library allocation
|
page execute and read and write
|
||
3460000
|
direct allocation
|
page execute and read and write
|
||
616E000
|
stack
|
page read and write
|
||
57EC000
|
stack
|
page read and write
|
||
5303000
|
direct allocation
|
page read and write
|
||
5B27000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
6DDF000
|
stack
|
page read and write
|
||
10C8000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
F6A000
|
trusted library allocation
|
page execute and read and write
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
ED6000
|
heap
|
page read and write
|
||
3B39000
|
direct allocation
|
page read and write
|
||
B48000
|
unkown
|
page readonly
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
1130000
|
heap
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
14AB000
|
stack
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
2B7B000
|
trusted library allocation
|
page read and write
|
||
6703000
|
direct allocation
|
page read and write
|
||
55DE000
|
trusted library allocation
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
105D000
|
trusted library allocation
|
page execute and read and write
|
||
102F000
|
unkown
|
page readonly
|
||
5B60000
|
heap
|
page read and write
|
||
3E3D000
|
direct allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1D2E000
|
stack
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
62AD000
|
stack
|
page read and write
|
||
B48000
|
unkown
|
page readonly
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
7220000
|
heap
|
page read and write
|
||
A81000
|
unkown
|
page execute read
|
||
3993000
|
direct allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
F77000
|
trusted library allocation
|
page execute and read and write
|
||
8EA000
|
stack
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
F7B000
|
trusted library allocation
|
page execute and read and write
|
||
4639000
|
direct allocation
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
107B000
|
trusted library allocation
|
page execute and read and write
|
||
116E000
|
heap
|
page read and write
|
||
1D5E000
|
stack
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
9903000
|
direct allocation
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
1AAB000
|
heap
|
page read and write
|
||
19D6000
|
heap
|
page read and write
|
||
46AE000
|
direct allocation
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
105F000
|
unkown
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
11F0000
|
heap
|
page read and write
|
||
7F5E0000
|
trusted library allocation
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
4510000
|
direct allocation
|
page read and write
|
||
3C93000
|
direct allocation
|
page read and write
|
||
17FC000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
7103000
|
direct allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
1138000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
46AE000
|
direct allocation
|
page read and write
|
||
3D10000
|
direct allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
4639000
|
direct allocation
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
3E8D000
|
direct allocation
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
3A23000
|
direct allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
1FC43A38000
|
heap
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
D88000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7F560000
|
trusted library allocation
|
page execute and read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
3BAE000
|
direct allocation
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
1075000
|
trusted library allocation
|
page execute and read and write
|
||
17BF000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
1AE5000
|
heap
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
4370000
|
direct allocation
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
4370000
|
direct allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
1072000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
F33000
|
trusted library allocation
|
page execute and read and write
|
||
58ED000
|
stack
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
2BA2000
|
trusted library allocation
|
page read and write
|
||
3C3E000
|
direct allocation
|
page read and write
|
||
2E23000
|
trusted library allocation
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
19ED000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
68F7000
|
trusted library allocation
|
page read and write
|
||
1FC43B30000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
6757000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
106A000
|
trusted library allocation
|
page execute and read and write
|
||
ED6000
|
heap
|
page read and write
|
||
3B3D000
|
direct allocation
|
page read and write
|
||
561F000
|
trusted library allocation
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
3E39000
|
direct allocation
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
6904000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
A633BFE000
|
stack
|
page read and write
|
||
1043000
|
trusted library allocation
|
page execute and read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
1A96000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
1063000
|
unkown
|
page write copy
|
||
4639000
|
direct allocation
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
422000
|
system
|
page execute and read and write
|
||
68FD000
|
trusted library allocation
|
page read and write
|
||
A6333FE000
|
stack
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
3C93000
|
direct allocation
|
page read and write
|
||
A81000
|
unkown
|
page execute read
|
||
5A50000
|
heap
|
page read and write
|
||
1FC43C00000
|
heap
|
page read and write
|
||
2EE9000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
heap
|
page read and write
|
||
126A000
|
heap
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
5D03000
|
direct allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page execute and read and write
|
||
15A1000
|
heap
|
page read and write
|
||
3B39000
|
direct allocation
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
666D000
|
stack
|
page read and write
|
||
9E8000
|
stack
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
stack
|
page read and write
|
||
550C000
|
stack
|
page read and write
|
||
102F000
|
unkown
|
page readonly
|
||
2ECE000
|
stack
|
page read and write
|
||
6740000
|
trusted library allocation
|
page execute and read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
165B000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
1063000
|
unkown
|
page write copy
|
||
DCE000
|
stack
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
1055000
|
unkown
|
page readonly
|
||
1068000
|
unkown
|
page readonly
|
||
19D2000
|
heap
|
page read and write
|
||
3E89000
|
direct allocation
|
page read and write
|
||
105F000
|
unkown
|
page read and write
|
||
19EC000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
3013000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
BDB000
|
stack
|
page read and write
|
||
30A4000
|
heap
|
page read and write
|
||
102F000
|
unkown
|
page readonly
|
||
5B70000
|
trusted library allocation
|
page execute and read and write
|
||
11AE000
|
heap
|
page read and write
|
||
15DB000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
3057000
|
trusted library allocation
|
page read and write
|
||
1FC43A30000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
A6335FE000
|
stack
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
5A54000
|
heap
|
page read and write
|
||
65CF000
|
stack
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
1FC43A65000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
2F26000
|
trusted library allocation
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
4510000
|
direct allocation
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
6797000
|
trusted library allocation
|
page read and write
|
||
A633AFE000
|
stack
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
BCA000
|
stack
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
8F03000
|
direct allocation
|
page read and write
|
||
3870000
|
direct allocation
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
7B03000
|
direct allocation
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
58EC000
|
stack
|
page read and write
|
||
F43000
|
trusted library allocation
|
page read and write
|
||
105F000
|
unkown
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
14CC000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
1FC43C0E000
|
heap
|
page read and write
|
||
4510000
|
direct allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
99D000
|
stack
|
page read and write
|
||
3E3D000
|
direct allocation
|
page read and write
|
||
4510000
|
direct allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
7000000
|
heap
|
page read and write
|
||
5B13000
|
heap
|
page read and write
|
||
46AE000
|
direct allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
1A2F000
|
heap
|
page read and write
|
||
6C1F000
|
stack
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
1A19000
|
heap
|
page read and write
|
||
1062000
|
trusted library allocation
|
page read and write
|
||
19EC000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page read and write
|
||
7330000
|
heap
|
page read and write
|
||
5B4E000
|
heap
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
5EC4000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1289000
|
heap
|
page read and write
|
||
1AE5000
|
heap
|
page read and write
|
||
113C000
|
heap
|
page read and write
|
||
1AAC000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
105F000
|
unkown
|
page write copy
|
||
2C34000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
7FD000
|
stack
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
1055000
|
unkown
|
page readonly
|
||
4098000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
3C24000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
1068000
|
unkown
|
page readonly
|
||
6340000
|
trusted library allocation
|
page execute and read and write
|
||
B0F000
|
unkown
|
page readonly
|
||
1A9C000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
F62000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
8503000
|
direct allocation
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
5A92000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
1289000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
104D000
|
trusted library allocation
|
page execute and read and write
|
||
DFF000
|
heap
|
page read and write
|
||
58FD000
|
trusted library allocation
|
page read and write
|
||
A632F7A000
|
stack
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
1168000
|
heap
|
page read and write
|
||
5F2C000
|
heap
|
page read and write
|
||
1FC43B50000
|
heap
|
page read and write
|
||
1276000
|
heap
|
page read and write
|
||
A633CFB000
|
stack
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
3EA0000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
3FD1000
|
trusted library allocation
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
102F000
|
unkown
|
page readonly
|
||
D50000
|
direct allocation
|
page execute and read and write
|
||
1ADB000
|
heap
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
F3D000
|
trusted library allocation
|
page execute and read and write
|
||
19B8000
|
heap
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
F72000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
DD1000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
FA1000
|
unkown
|
page execute read
|
||
3B70000
|
direct allocation
|
page read and write
|
||
17DB000
|
stack
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
1D4E000
|
stack
|
page read and write
|
||
34F5000
|
direct allocation
|
page read and write
|
||
B35000
|
unkown
|
page readonly
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
3B70000
|
direct allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
B43000
|
unkown
|
page write copy
|
||
A6338FD000
|
stack
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
1010000
|
trusted library section
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
5B4C000
|
heap
|
page read and write
|
||
633D000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
6917000
|
trusted library allocation
|
page read and write
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
64EB000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
15DD000
|
heap
|
page read and write
|
||
DD0000
|
trusted library section
|
page read and write
|
||
6A1F000
|
stack
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
1A0D000
|
heap
|
page read and write
|
||
19EE000
|
heap
|
page read and write
|
||
F10000
|
trusted library section
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
4903000
|
direct allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1591000
|
heap
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
B35000
|
unkown
|
page readonly
|
||
6940000
|
trusted library allocation
|
page execute and read and write
|
||
1299000
|
heap
|
page read and write
|
||
105F000
|
unkown
|
page write copy
|
||
556F000
|
stack
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
105F000
|
unkown
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page execute and read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
5456000
|
trusted library allocation
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
direct allocation
|
page read and write
|
||
A6332FE000
|
stack
|
page read and write
|
||
7020000
|
trusted library allocation
|
page execute and read and write
|
||
19ED000
|
heap
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
3C3E000
|
direct allocation
|
page read and write
|
||
1A2D000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
1063000
|
unkown
|
page write copy
|
||
1020000
|
trusted library section
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2E8B000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
3AA0000
|
direct allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
ED6000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page execute and read and write
|
||
102F000
|
unkown
|
page readonly
|
||
3CE3000
|
direct allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2B8E000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
F75000
|
trusted library allocation
|
page execute and read and write
|
||
19DD000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
F4D000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
105F000
|
unkown
|
page write copy
|
||
68AE000
|
stack
|
page read and write
|
||
19FC000
|
heap
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
A6339FE000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1053000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
FA1000
|
unkown
|
page execute read
|
||
2240000
|
direct allocation
|
page execute and read and write
|
||
3EAE000
|
direct allocation
|
page read and write
|
||
4493000
|
direct allocation
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
3E8D000
|
direct allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
direct allocation
|
page read and write
|
||
3E3D000
|
direct allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
6C40000
|
heap
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
3BC9000
|
direct allocation
|
page read and write
|
||
5F8E000
|
heap
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
683D000
|
stack
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page execute and read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
1159000
|
stack
|
page read and write
|
||
3BCD000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
102F000
|
unkown
|
page readonly
|
||
BEF000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
1A19000
|
heap
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
6C3F000
|
stack
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
102F000
|
unkown
|
page readonly
|
||
3CE3000
|
direct allocation
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
There are 799 hidden memdumps, click here to show them.