Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z10982283782.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\dGg-0-kL
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z10982283782.exe
|
"C:\Users\user\Desktop\z10982283782.exe"
|
||
C:\Windows\SysWOW64\colorcpl.exe
|
C:\Windows\System32\colorcpl.exe
|
||
C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe
|
"C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe"
|
||
C:\Windows\SysWOW64\takeown.exe
|
"C:\Windows\SysWOW64\takeown.exe"
|
||
C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe
|
"C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.wcp58.top/u071/
|
154.23.184.240
|
||
http://www.cpamerix.online/muj9/
|
194.58.112.174
|
||
http://www.wcp58.top/u071/?fvM8Gh=bBJc85dRrz6VYFP8GwFXoZFtfmuQO+iyQ8ywsDhPMj3PkpaAJncRlOwVGrcs7/oiPMEubiNmeHgqiRXMS1H3OK+Zq7VhNcw4P6d6BN/xAJTWHzjowpdO9JjlTFWXwfVVhN461s++G65d&DfDx=AFrxfzcH-Ld
|
154.23.184.240
|
||
https://bitbucket.org/akeem4u/canter/downloads/233_Ltspwqrtysw
|
185.166.143.48
|
||
http://www.lotus9.life/t67j/
|
3.33.130.190
|
||
http://www.98080753.xyz/eth5/
|
161.97.168.245
|
||
http://www.lotus9.life/t67j/?fvM8Gh=KowgBu3DXf0G7hBLtaH8s8ZzKm+VG/tpKZ1Q7eDBR0ArwNxjdNGLI+rTTcfRvEyEYs27WEZYXeTRVuyNENDuSquLWx1vE6gNEX6tkQ0IxcS5dAyUTa1RZ/bXBmbIS1WdqDLnMr1sBa9m&DfDx=AFrxfzcH-Ld
|
3.33.130.190
|
||
http://www.joshcharlesfitness.xyz/f2m8/?fvM8Gh=q8u1m2y9j/W78LyjRjBmLFBPluC1hJa5ZcIT7WbQRmUkJn/aUKn129a9SdOjfVpEuogWIbFDr3wrvEdEbURHbL899LelzoXXcWM6JsFHtDa1nH+G65yTIIp51Lx0C7/dwS8TcymTUlcC&DfDx=AFrxfzcH-Ld
|
3.33.130.190
|
||
http://www.facaicloud.top/dc1u/
|
74.48.31.123
|
||
http://www.facaicloud.top/dc1u/?fvM8Gh=fFgJrpU7aD7UkZlQpUegXiYX0mHuwd+xKsDAURMBiAqiBmSaSKvvh09Aihxa8ofx/ezcm777pnsov1VcpLBlwmC3Iqy+K+pafl2LF2kBMm3CKkFZyMytkoTfA5EUxo7rNsMcOhPX02Mw&DfDx=AFrxfzcH-Ld
|
74.48.31.123
|
||
http://www.cpamerix.online/muj9/?fvM8Gh=hgXo7easQgYwzYM50VVsBbrTpvYmtRva0zGF6x/wVx5xdFtAh4cdAJarj8a6/VZ0fLckawx66xls7kEuRRfHglkiUnpuSxGF6OqSwfVcl2N6vBJ8grdIeIpeinnOhUKuNcVRLIFrNYJr&DfDx=AFrxfzcH-Ld
|
194.58.112.174
|
||
https://bitbucket.org/Q
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://reg.ru
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/%
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/S
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paaj
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.reg.ru/dedicated/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land_
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
https://www.reg.ru/domain/new/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land
|
unknown
|
||
https://www.reg.ru/hosting/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land_ho
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com:443/1889f89b-bf3e-4330-a7ab-fccb77ce4890/downloads/a122b37b-2
|
unknown
|
||
https://www.reg.ru/whois/?check=&dname=www.cpamerix.online&reg_source=parking_auto
|
unknown
|
||
https://parking.reg.ru/script/get_domain_data?domain_name=www.cpamerix.online&rand=
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paaF
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://www.lotus9.life
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-website
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/1889f89b-bf3e-4330-a7ab-fccb77ce4890/downloads/a122b37b-2be1-
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paa
|
unknown
|
||
https://dz8aopenkvv6s.cloudfront.net
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://bitbucket.org/akeem4u/canter/downloads/233_LtspwqrtyswX
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.reg.ru/sozdanie-saita/
|
unknown
|
||
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
|
unknown
|
||
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
|
unknown
|
||
http://www.pmail.com
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.
|
unknown
|
||
https://bbuseruploads.s3.amazonaws.com/
|
unknown
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bitbucket.org
|
185.166.143.48
|
||
www.facaicloud.top
|
74.48.31.123
|
||
wcp58.top
|
154.23.184.240
|
||
www.cpamerix.online
|
194.58.112.174
|
||
www.g4s7e5.biz
|
203.90.227.88
|
||
www.98080753.xyz
|
161.97.168.245
|
||
joshcharlesfitness.xyz
|
3.33.130.190
|
||
lotus9.life
|
3.33.130.190
|
||
www.joshcharlesfitness.xyz
|
unknown
|
||
www.wcp58.top
|
unknown
|
||
bbuseruploads.s3.amazonaws.com
|
unknown
|
||
www.lotus9.life
|
unknown
|
||
171.39.242.20.in-addr.arpa
|
unknown
|
||
s3-w.us-east-1.amazonaws.com
|
3.5.3.65
|
There are 4 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.166.143.48
|
bitbucket.org
|
Germany
|
||
154.23.184.240
|
wcp58.top
|
United States
|
||
74.48.31.123
|
www.facaicloud.top
|
Canada
|
||
194.58.112.174
|
www.cpamerix.online
|
Russian Federation
|
||
3.33.130.190
|
joshcharlesfitness.xyz
|
United States
|
||
161.97.168.245
|
www.98080753.xyz
|
United States
|
||
3.5.3.65
|
s3-w.us-east-1.amazonaws.com
|
United States
|
||
54.231.236.129
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@%systemroot%\system32\colorui.dll,-1400
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
|
UsePerUserProfiles
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A20000
|
unclassified section
|
page execute and read and write
|
||
4C40000
|
system
|
page execute and read and write
|
||
65F0000
|
remote allocation
|
page execute and read and write
|
||
5060000
|
unkown
|
page execute and read and write
|
||
670000
|
system
|
page execute and read and write
|
||
25240000
|
unclassified section
|
page execute and read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
29D4000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
1161000
|
unkown
|
page readonly
|
||
22C8000
|
direct allocation
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
2266B000
|
heap
|
page read and write
|
||
9C1000
|
heap
|
page read and write
|
||
21968ED2000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
28CF000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
217F0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4CA2000
|
system
|
page execute and read and write
|
||
2196AA00000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
5C1000
|
unkown
|
page readonly
|
||
BB0000
|
unkown
|
page readonly
|
||
2196AA21000
|
trusted library allocation
|
page read and write
|
||
7733000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7F450000
|
direct allocation
|
page read and write
|
||
7747000
|
heap
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7E7F000
|
stack
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
7792000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
21968DE0000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2848000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7FB4C000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7F8A0000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
256DA000
|
unclassified section
|
page execute and read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
487C000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7EFF000
|
stack
|
page read and write
|
||
25D4000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
209FD000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2266F000
|
heap
|
page read and write
|
||
2C0E000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
6DA000
|
stack
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
73D000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28F3000
|
heap
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
22542000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
E80000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
217EF000
|
trusted library allocation
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
7FA9F000
|
direct allocation
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
77AB000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
20D6F000
|
stack
|
page read and write
|
||
2864000
|
heap
|
page read and write
|
||
215E3000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
44D000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
2434000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
217F8000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page readonly
|
||
21968C6E000
|
system
|
page execute and read and write
|
||
25AE000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
218B0000
|
heap
|
page read and write
|
||
77AE000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
28A1000
|
heap
|
page read and write
|
||
7F260000
|
direct allocation
|
page read and write
|
||
216FD000
|
heap
|
page read and write
|
||
2196A900000
|
trusted library allocation
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
2196A680000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2892000
|
heap
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
4C89000
|
system
|
page execute and read and write
|
||
2A26000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
6F0000
|
heap
|
page read and write
|
||
4CAE000
|
system
|
page execute and read and write
|
||
7EBE000
|
stack
|
page read and write
|
||
22C1000
|
direct allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
212D0000
|
remote allocation
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
217FF000
|
heap
|
page read and write
|
||
4C7000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
2864000
|
heap
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
21968ED2000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28F8000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
30AA000
|
unkown
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
23440000
|
unclassified section
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
2840000
|
heap
|
page read and write
|
||
218A1000
|
heap
|
page read and write
|
||
215F1000
|
heap
|
page read and write
|
||
4C5000
|
unkown
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
77A8000
|
heap
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
2BF4000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page write copy
|
||
A31000
|
heap
|
page read and write
|
||
2892000
|
heap
|
page read and write
|
||
7F1C0000
|
direct allocation
|
page read and write
|
||
7ED000
|
unkown
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
28A1000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
76E000
|
heap
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
72C000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
20A13000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
364C000
|
unclassified section
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
25D4000
|
heap
|
page read and write
|
||
20A0C000
|
direct allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
218F0000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
7FB5F000
|
direct allocation
|
page read and write
|
||
77A9000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2855000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
2196ABBE000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
215E0000
|
heap
|
page read and write
|
||
25668000
|
unclassified section
|
page execute and read and write
|
||
209F6000
|
direct allocation
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
20EAF000
|
stack
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
2196ABAA000
|
trusted library allocation
|
page read and write
|
||
217E4000
|
heap
|
page read and write
|
||
7F3E0000
|
direct allocation
|
page read and write
|
||
3372000
|
unclassified section
|
page read and write
|
||
22A32000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
20B2F000
|
stack
|
page read and write
|
||
3C60000
|
unkown
|
page execute and read and write
|
||
7F1C0000
|
direct allocation
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
229C1000
|
direct allocation
|
page execute and read and write
|
||
290000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
25D0000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
20B2E000
|
stack
|
page execute and read and write
|
||
778000
|
heap
|
page read and write
|
||
7F000000
|
direct allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
4C7000
|
unkown
|
page readonly
|
||
7EFF6000
|
direct allocation
|
page read and write
|
||
28BC2000
|
system
|
page read and write
|
||
BCD31FD000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2118E000
|
stack
|
page read and write
|
||
2976000
|
heap
|
page read and write
|
||
3020000
|
direct allocation
|
page execute and read and write
|
||
706000
|
heap
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
217E0000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
7EE70000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
2532000
|
unkown
|
page read and write
|
||
7774000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2196AA11000
|
trusted library allocation
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
217EE000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
264C000
|
unkown
|
page read and write
|
||
20C2F000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2141F000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
20DAE000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
221E000
|
direct allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
BCD49FE000
|
stack
|
page read and write
|
||
9AD000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
20A1A000
|
direct allocation
|
page read and write
|
||
3149000
|
direct allocation
|
page execute and read and write
|
||
2196ABC4000
|
trusted library allocation
|
page read and write
|
||
48BC000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
A31000
|
heap
|
page read and write
|
||
20A04000
|
direct allocation
|
page read and write
|
||
217E6000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
2100F000
|
stack
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7FBA0000
|
direct allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
2878000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2A2A000
|
heap
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
1160000
|
unkown
|
page readonly
|
||
7FCD7000
|
direct allocation
|
page read and write
|
||
3362000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
7736000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
2888000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
32ED000
|
direct allocation
|
page execute and read and write
|
||
2288E000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2503000
|
heap
|
page read and write
|
||
22B3000
|
direct allocation
|
page read and write
|
||
217E0000
|
heap
|
page read and write
|
||
7E3E000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
77A4000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
2434000
|
heap
|
page read and write
|
||
7FA50000
|
direct allocation
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
77B4000
|
heap
|
page read and write
|
||
21968D00000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7F8FF000
|
direct allocation
|
page read and write
|
||
7F170000
|
direct allocation
|
page read and write
|
||
22A40000
|
unclassified section
|
page execute and read and write
|
||
940000
|
unkown
|
page readonly
|
||
23CC000
|
unkown
|
page read and write
|
||
3A34000
|
unclassified section
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
5488000
|
unkown
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
217F2000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
2155D000
|
stack
|
page read and write
|
||
BCD29FB000
|
stack
|
page read and write
|
||
217EA000
|
heap
|
page read and write
|
||
39B000
|
stack
|
page read and write
|
||
7EF10000
|
direct allocation
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
4C92000
|
system
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
28AA000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
21968ED0000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
C3D000
|
heap
|
page read and write
|
||
4E4C000
|
unkown
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
21968C6B000
|
system
|
page execute and read and write
|
||
6BA000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
20B2A000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
247C000
|
stack
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
9B7000
|
heap
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
22AC000
|
direct allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
287B000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2104E000
|
stack
|
page read and write
|
||
2128E000
|
stack
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
217E5000
|
heap
|
page read and write
|
||
22BA000
|
direct allocation
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
21968EA0000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
216E0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28C82000
|
system
|
page read and write
|
||
7F210000
|
direct allocation
|
page read and write
|
||
215EC000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2196A800000
|
heap
|
page read and write
|
||
28FC000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
2196AB01000
|
trusted library allocation
|
page read and write
|
||
774D000
|
heap
|
page read and write
|
||
21968ECB000
|
heap
|
page read and write
|
||
2770000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
7F9C0000
|
direct allocation
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
28A1000
|
heap
|
page read and write
|
||
28A1000
|
heap
|
page read and write
|
||
24840000
|
unclassified section
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
2170000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
20A28000
|
direct allocation
|
page read and write
|
||
7970000
|
heap
|
page read and write
|
||
7FAC0000
|
direct allocation
|
page read and write
|
||
2196AA0C000
|
trusted library allocation
|
page read and write
|
||
20A21000
|
direct allocation
|
page read and write
|
||
314D000
|
direct allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page read and write
|
||
212D0000
|
remote allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
280C000
|
unkown
|
page read and write
|
||
7F100000
|
direct allocation
|
page read and write
|
||
9AD000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
287D000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
1D7000
|
heap
|
page read and write
|
||
4C5000
|
unkown
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
209D9000
|
direct allocation
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
217F1000
|
heap
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
732000
|
heap
|
page read and write
|
||
48D1000
|
heap
|
page read and write
|
||
7745000
|
heap
|
page read and write
|
||
7FB0F000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28A5000
|
heap
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
7EE20000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
25B0000
|
unkown
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
48CE000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2440000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
7F0E0000
|
direct allocation
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
7795000
|
heap
|
page read and write
|
||
2C0B000
|
direct allocation
|
page execute and read and write
|
||
93C000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2280000
|
direct allocation
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page readonly
|
||
29D0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
779B000
|
heap
|
page read and write
|
||
2196AA03000
|
trusted library allocation
|
page read and write
|
||
2196AA0F000
|
trusted library allocation
|
page read and write
|
||
2131E000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
21968E20000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
226F0000
|
direct allocation
|
page execute and read and write
|
||
32F1000
|
direct allocation
|
page execute and read and write
|
||
7F200000
|
direct allocation
|
page read and write
|
||
2ABE000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
BCD41FE000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
280C000
|
unkown
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
6B0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
2145E000
|
stack
|
page read and write
|
||
2888000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
BCD39FE000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
7759000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
215EA000
|
heap
|
page read and write
|
||
7FA2F000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
77B6000
|
heap
|
page read and write
|
||
77BF000
|
heap
|
page read and write
|
||
5C1000
|
unkown
|
page readonly
|
||
4C87000
|
system
|
page execute and read and write
|
||
209EF000
|
direct allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2FA000
|
stack
|
page read and write
|
||
7EEC0000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
22819000
|
direct allocation
|
page execute and read and write
|
||
C06000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
2164E000
|
heap
|
page read and write
|
||
7EFB0000
|
direct allocation
|
page read and write
|
||
77B1000
|
heap
|
page read and write
|
||
20C6E000
|
stack
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
3D58000
|
unclassified section
|
page read and write
|
||
3260000
|
unkown
|
page execute and read and write
|
||
7FB10000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
289C000
|
heap
|
page read and write
|
||
76E000
|
heap
|
page read and write
|
||
355000
|
stack
|
page read and write
|
||
226E0000
|
heap
|
page read and write
|
||
2196A680000
|
trusted library allocation
|
page read and write
|
||
4C5000
|
unkown
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
2860000
|
unkown
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
72D000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
24EE000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
28AF000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
209E8000
|
direct allocation
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
229D000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
7740000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28A5000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2196A680000
|
trusted library allocation
|
page read and write
|
||
407C000
|
unclassified section
|
page read and write
|
||
7778000
|
heap
|
page read and write
|
||
7F8B0000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2FA000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
2F18000
|
unkown
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
77B7000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
54FA000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
A31000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7F2C0000
|
direct allocation
|
page read and write
|
||
2895000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page read and write
|
||
7CFC000
|
stack
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
2099E000
|
direct allocation
|
page read and write
|
||
29284000
|
system
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7FAA0000
|
direct allocation
|
page read and write
|
||
4C7000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
7DFF000
|
stack
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
77B9000
|
heap
|
page read and write
|
||
4660000
|
unkown
|
page execute and read and write
|
||
2A91000
|
direct allocation
|
page execute read
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
795C000
|
stack
|
page read and write
|
||
7747000
|
heap
|
page read and write
|
||
3432000
|
unclassified section
|
page read and write
|
||
229BD000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2515000
|
heap
|
page read and write
|
||
2114D000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
3FB000
|
stack
|
page read and write
|
||
215E1000
|
heap
|
page read and write
|
||
323C000
|
unkown
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
774F000
|
heap
|
page read and write
|
||
2281D000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
289C000
|
heap
|
page read and write
|
||
21968EA7000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
504000
|
unkown
|
page write copy
|
||
947000
|
heap
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
20F0E000
|
stack
|
page read and write
|
||
4C7000
|
unkown
|
page readonly
|
||
2196AA15000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2440000
|
unkown
|
page readonly
|
||
745000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
7F90F000
|
direct allocation
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
7FA80000
|
direct allocation
|
page read and write
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
A90000
|
unkown
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
774A000
|
heap
|
page read and write
|
||
B9F000
|
heap
|
page read and write
|
||
7F270000
|
direct allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
2196ABCE000
|
trusted library allocation
|
page read and write
|
||
2336000
|
heap
|
page read and write
|
||
218F0000
|
direct allocation
|
page execute and read and write
|
||
460000
|
heap
|
page read and write
|
||
28CDC000
|
system
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
22A4000
|
direct allocation
|
page read and write
|
||
28BC000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page read and write
|
||
21968EAF000
|
heap
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
7FAF0000
|
direct allocation
|
page read and write
|
||
2770000
|
unkown
|
page readonly
|
||
DCF000
|
stack
|
page read and write
|
||
9C1000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
7F1A0000
|
direct allocation
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
23E40000
|
unclassified section
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
4B0000
|
unkown
|
page readonly
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
6DA000
|
stack
|
page read and write
|
||
7F210000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4D04000
|
system
|
page execute and read and write
|
||
9DE000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
21968C30000
|
system
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
216F4000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page read and write
|
||
21968EBC000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28E9C000
|
system
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
25B0000
|
unkown
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
285E000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
4C5000
|
unkown
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
A31000
|
heap
|
page read and write
|
||
509000
|
unkown
|
page readonly
|
||
7F387000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
7FA50000
|
direct allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
22F0000
|
direct allocation
|
page execute and read and write
|
||
288A000
|
heap
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
216F8000
|
heap
|
page read and write
|
||
348C000
|
unclassified section
|
page read and write
|
||
2532000
|
unkown
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
31BE000
|
direct allocation
|
page execute and read and write
|
||
638000
|
stack
|
page read and write
|
||
215F0000
|
heap
|
page read and write
|
||
773B000
|
heap
|
page read and write
|
||
7F000000
|
direct allocation
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
212D0000
|
remote allocation
|
page read and write
|
||
7D7F000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
216FC000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
2B17000
|
direct allocation
|
page execute and read and write
|
||
A31000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
3EEA000
|
unclassified section
|
page read and write
|
There are 830 hidden memdumps, click here to show them.