Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
AdobeUpdaterV131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\7-Zip\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xRp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_xRp.exe_7882c768d6c31dccd748b5c295fd1acde18b92a0_315f04a9_21d8cb95-f6f1-4f8d-abf3-a62910f17152\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3632.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jul 24 21:01:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37BA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37FA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[1].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k1[2].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k2[1].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k2[2].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k3[1].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k4[1].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\k5[1].rar
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0be11806.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\20336E8A.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\31A724C6.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\32335A13.exe
|
ASCII text
|
modified
|
||
C:\Users\user\AppData\Local\Temp\36C52F46.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\38070A7E.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\45FF0997.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\64EA12EF.exe
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 20 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\AdobeUpdaterV131.exe
|
"C:\Users\user\Desktop\AdobeUpdaterV131.exe"
|
||
C:\Users\user\AppData\Local\Temp\xRp.exe
|
C:\Users\user\AppData\Local\Temp\xRp.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\Temp\xRp.exe
|
C:\Users\user\AppData\Local\Temp\xRp.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1776
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\0be11806.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ddos.dnsnb8.net:799/cj//k1.rarUa
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k3.rar
|
44.221.84.105
|
||
http://ddos.dnsnb8.net:799/cj//k1.rars
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.rarC:
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.rar
|
44.221.84.105
|
||
http://ddos.dnsnb8.net:799/cj//k2.rar8
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rar
|
44.221.84.105
|
||
http://ddos.dnsnb8.net:799/cj//k2.rarcC:
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.raryY
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k3.rarXY$$m
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rar7
|
unknown
|
||
http://ddos.dnsnb8.net/v
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarcag$
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.rarq
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rar1b
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarFSXY$$m
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.rars
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarsC:
|
unknown
|
||
http://ddos.dnsnb8.net/
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarU
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarS
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k1.rarhg
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k2.rarMp
|
unknown
|
||
https://t.me/RiseProSUPPORTFs
|
unknown
|
||
http://www.scintilla.org/scite.rng
|
unknown
|
||
http://www.activestate.comHolger
|
unknown
|
||
http://www.baanboard.comBrendon
|
unknown
|
||
https://www.smartsharesystems.com/
|
unknown
|
||
http://www.scintilla.org
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k4.rarsC:
|
unknown
|
||
http://www.develop.com
|
unknown
|
||
http://www.spaceblue.com
|
unknown
|
||
http://www.baanboard.com
|
unknown
|
||
http://www.develop.comDeepak
|
unknown
|
||
https://t.me/RiseProSUPPORTF/
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k5.rar?Y
|
unknown
|
||
http://www.rftp.comJosiah
|
unknown
|
||
http://www.activestate.com
|
unknown
|
||
http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
|
unknown
|
||
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWSASendWs2_32.dll
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.rftp.com
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k4.rar)X
|
unknown
|
||
http://www.spaceblue.comMathias
|
unknown
|
||
https://www.smartsharesystems.com/Morten
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k5.rar
|
44.221.84.105
|
||
http://www.lua.org
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k4.rar
|
44.221.84.105
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
http://ddos.dnsnb8.net:799/cj//k5.rarC:
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ddos.dnsnb8.net
|
44.221.84.105
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
44.221.84.105
|
ddos.dnsnb8.net
|
United States
|
||
193.233.132.62
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
ProgramId
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
FileId
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
LongPathHash
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Name
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
OriginalFileName
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Publisher
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Version
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
BinFileVersion
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
BinaryType
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
ProductName
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
ProductVersion
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
LinkDate
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
BinProductVersion
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
AppxPackageFullName
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Size
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Language
|
||
\REGISTRY\A\{479a827d-c663-a0f9-1e57-c720d7bdb44a}\Root\InventoryApplicationFile\xrp.exe|f4cd0bfdc081ee7d
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\GTplus
|
Time
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5C1000
|
unkown
|
page execute and read and write
|
||
4D20000
|
direct allocation
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
621000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
AB1000
|
unkown
|
page execute and read and write
|
||
5C1000
|
unkown
|
page execute and read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
AB1000
|
unkown
|
page execute and read and write
|
||
756000
|
unkown
|
page read and write
|
||
4D1D000
|
stack
|
page read and write
|
||
4E4000
|
unkown
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
EA8000
|
unkown
|
page execute and write copy
|
||
39BF000
|
stack
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
1050000
|
unkown
|
page execute and read and write
|
||
48AF000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
387F000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page execute and read and write
|
||
1220000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
14A3000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
B5D000
|
unkown
|
page execute and write copy
|
||
336F000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
4E1000
|
unkown
|
page execute read
|
||
462F000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
9B7000
|
unkown
|
page execute and write copy
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
B60000
|
direct allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
898000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
1044000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
2AC4000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
EA8000
|
unkown
|
page execute and write copy
|
||
2C50000
|
direct allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
30EF000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
115D000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
48A1000
|
heap
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
2568000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
8CE000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
104C000
|
unkown
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
D6B000
|
unkown
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
BD6000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
E52000
|
unkown
|
page execute and read and write
|
||
330E000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
358E000
|
stack
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
5CD000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page execute and write copy
|
||
4D20000
|
direct allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
4D6C000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
EFD000
|
stack
|
page read and write
|
||
BC0000
|
unkown
|
page execute and write copy
|
||
F80000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
22EA000
|
stack
|
page read and write
|
||
8E9000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
452D000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
5370000
|
direct allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
5159000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
336E000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
412F000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
A17000
|
unkown
|
page execute and write copy
|
||
3160000
|
heap
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
33AE000
|
stack
|
page read and write
|
||
302D000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
7AB000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
4CCB000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
6F2000
|
unkown
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
75C000
|
unkown
|
page execute and read and write
|
||
489F000
|
stack
|
page read and write
|
||
69A000
|
stack
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
11AD000
|
heap
|
page read and write
|
||
312C000
|
stack
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
11B7000
|
heap
|
page read and write
|
||
149B000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
300E000
|
unkown
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
913000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
430F000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
BDC000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
E33000
|
unkown
|
page write copy
|
||
8A4000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
9B7000
|
unkown
|
page execute and read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
A17000
|
unkown
|
page execute and read and write
|
||
402E000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
11ED000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
35EF000
|
stack
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
33DB000
|
stack
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
54A000
|
stack
|
page read and write
|
||
104D000
|
unkown
|
page execute and write copy
|
||
1424000
|
heap
|
page read and write
|
||
5632000
|
heap
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page execute and read and write
|
||
620000
|
unkown
|
page readonly
|
||
4E8E000
|
stack
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
E36000
|
unkown
|
page execute and read and write
|
||
B5C000
|
unkown
|
page execute and read and write
|
||
12F0000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
29D7000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
B60000
|
direct allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
1151000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4FD4000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
318F000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
E99000
|
unkown
|
page execute and read and write
|
||
BBC000
|
unkown
|
page execute and read and write
|
||
E33000
|
unkown
|
page readonly
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
326D000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
6FC000
|
unkown
|
page execute and read and write
|
||
4810000
|
heap
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
530E000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
4E6000
|
unkown
|
page execute and read and write
|
||
E34000
|
unkown
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
10EC000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
756000
|
unkown
|
page write copy
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
4A11000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
BE2000
|
unkown
|
page execute and read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
34EE000
|
stack
|
page read and write
|
||
521C000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
EA7000
|
unkown
|
page execute and read and write
|
||
48A0000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
BDA000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
65D000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
43BF000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
2E9A000
|
stack
|
page read and write
|
||
2C4C000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
EA7000
|
unkown
|
page execute and write copy
|
||
2C6E000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
385F000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
9A9000
|
unkown
|
page execute and read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
B60000
|
direct allocation
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
4ECB000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
9B8000
|
unkown
|
page execute and write copy
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
48A1000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
318B000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute and write copy
|
||
34BF000
|
stack
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
8DB000
|
unkown
|
page execute and read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
87B000
|
unkown
|
page execute and read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
5212000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
376E000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
4E3000
|
unkown
|
page write copy
|
||
2C90000
|
direct allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
4E6000
|
unkown
|
page execute and write copy
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
820000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
A18000
|
unkown
|
page execute and write copy
|
||
EA7000
|
unkown
|
page execute and read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
38AE000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page execute and write copy
|
||
34AF000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
9EF000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4E3000
|
unkown
|
page readonly
|
||
BE6000
|
unkown
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
111A000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
104D000
|
unkown
|
page execute and write copy
|
||
1044000
|
heap
|
page read and write
|
||
BE2000
|
unkown
|
page execute and read and write
|
||
29AE000
|
stack
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
91D000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
E90000
|
unkown
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
408F000
|
stack
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
2C1B000
|
stack
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
BE6000
|
unkown
|
page write copy
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4A00000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
6F6000
|
unkown
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
465E000
|
stack
|
page read and write
|
||
6F6000
|
unkown
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
362E000
|
stack
|
page read and write
|
||
A09000
|
unkown
|
page execute and read and write
|
||
89B000
|
heap
|
page read and write
|
||
4FD1000
|
direct allocation
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
A00000
|
unkown
|
page execute and read and write
|
||
49F0000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
1051000
|
unkown
|
page execute and write copy
|
||
349F000
|
stack
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
9B7000
|
unkown
|
page execute and read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
6F6000
|
unkown
|
page write copy
|
||
3140000
|
direct allocation
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
E5C000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
145D000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
E90000
|
unkown
|
page execute and read and write
|
||
86A000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
2E5D000
|
stack
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
43DE000
|
stack
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
4DC1000
|
direct allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4D20000
|
direct allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
476F000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
87B000
|
unkown
|
page execute and read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
47AE000
|
stack
|
page read and write
|
||
32AD000
|
stack
|
page read and write
|
||
512A000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
8C6000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
B5F000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4CC000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
36C000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
BEC000
|
unkown
|
page execute and read and write
|
||
840000
|
direct allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
372F000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
4E51000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
115E000
|
stack
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
6F2000
|
unkown
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
BE6000
|
unkown
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
5C1000
|
unkown
|
page execute and write copy
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
4A01000
|
heap
|
page read and write
|
||
9B8000
|
unkown
|
page execute and write copy
|
||
30DF000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
1350000
|
direct allocation
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
54A1000
|
direct allocation
|
page read and write
|
||
46C000
|
stack
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
B60000
|
direct allocation
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
104C000
|
unkown
|
page execute and read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
3167000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
74E000
|
unkown
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
360C000
|
stack
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
1050000
|
unkown
|
page execute and read and write
|
||
48A1000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
BBD000
|
unkown
|
page execute and write copy
|
||
2FEF000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
2CA7000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
316B000
|
stack
|
page read and write
|
||
9A9000
|
unkown
|
page execute and read and write
|
||
43AF000
|
stack
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
F86000
|
heap
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
6FC000
|
unkown
|
page execute and read and write
|
||
FF4000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
E36000
|
unkown
|
page execute and write copy
|
||
129B000
|
stack
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
30EE000
|
stack
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
5C1000
|
unkown
|
page execute and write copy
|
||
2C50000
|
direct allocation
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
9B7000
|
unkown
|
page execute and write copy
|
||
4EEB000
|
stack
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
E52000
|
unkown
|
page execute and read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
4A01000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
124D000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
53BC000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
BE6000
|
unkown
|
page write copy
|
||
4E1000
|
unkown
|
page execute and write copy
|
||
1450000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
752000
|
unkown
|
page execute and read and write
|
||
439F000
|
stack
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
AB1000
|
unkown
|
page execute and write copy
|
||
3DAE000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
39EE000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
386F000
|
stack
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page execute and read and write
|
||
2360000
|
heap
|
page read and write
|
||
1350000
|
direct allocation
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
4FB1000
|
direct allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
34DD000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
43FE000
|
stack
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
BEC000
|
unkown
|
page execute and read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
840000
|
direct allocation
|
page read and write
|
||
14A3000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
5A9000
|
stack
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1051000
|
unkown
|
page execute and write copy
|
||
336F000
|
stack
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
FF4000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
6F6000
|
unkown
|
page write copy
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
700000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
480F000
|
stack
|
page read and write
|
||
4AB000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
78F000
|
unkown
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
BC0000
|
unkown
|
page execute and read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
1350000
|
direct allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
323F000
|
stack
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
A5D000
|
stack
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1044000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
EA7000
|
unkown
|
page execute and write copy
|
||
12E0000
|
direct allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
E99000
|
unkown
|
page execute and read and write
|
||
326C000
|
stack
|
page read and write
|
||
D6B000
|
unkown
|
page execute and read and write
|
||
453E000
|
stack
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
24DF000
|
stack
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
B5D000
|
unkown
|
page execute and write copy
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
3140000
|
direct allocation
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
There are 996 hidden memdumps, click here to show them.