Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_218.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_218.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_218.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://t.me/RiseProSUPPORTd
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.132.74
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AC1000
|
unkown
|
page execute and read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
971000
|
unkown
|
page execute and read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
AC1000
|
unkown
|
page execute and read and write
|
||
9E1000
|
unkown
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
971000
|
unkown
|
page execute and read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
9D0000
|
direct allocation
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
960000
|
direct allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
159B000
|
heap
|
page read and write
|
||
4BDC000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
8F6000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
DC6000
|
unkown
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
531C000
|
stack
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
32BE000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
43DE000
|
stack
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
960000
|
direct allocation
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
4A9D000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
293E000
|
stack
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
2A8B000
|
stack
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
855000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
8E9000
|
heap
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
485E000
|
stack
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
3110000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
49FC000
|
stack
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
BF8000
|
unkown
|
page write copy
|
||
1190000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
AC1000
|
unkown
|
page execute and write copy
|
||
35BF000
|
stack
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
335F000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
4CD2000
|
direct allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
7FC000
|
stack
|
page read and write
|
||
EC0000
|
unkown
|
page execute and read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page execute and read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
559A000
|
heap
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
39DE000
|
stack
|
page read and write
|
||
BF3000
|
unkown
|
page execute and read and write
|
||
6B5000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
323E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
AA3000
|
unkown
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
CA1000
|
unkown
|
page execute and read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page execute and read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page execute and read and write
|
||
425E000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
D56000
|
unkown
|
page execute and read and write
|
||
34FF000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
9E1000
|
unkown
|
page execute and write copy
|
||
2A90000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
BF8000
|
unkown
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page execute and write copy
|
||
9B0000
|
direct allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
30AC000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
D81000
|
unkown
|
page execute and read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
101F000
|
stack
|
page read and write
|
||
9D0000
|
direct allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
815000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
D71000
|
unkown
|
page execute and write copy
|
||
6D4000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
8BA000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
423F000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
BFC000
|
unkown
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
395E000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
AA8000
|
unkown
|
page write copy
|
||
B13000
|
unkown
|
page execute and read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
53C000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
52DD000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
516E000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
2A7B000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
4F1F000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
AA8000
|
unkown
|
page write copy
|
||
439F000
|
stack
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page execute and read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
15C7000
|
heap
|
page read and write
|
||
EA6000
|
unkown
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4721000
|
heap
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
AC1000
|
unkown
|
page execute and write copy
|
||
6D4000
|
heap
|
page read and write
|
||
960000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
2830000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4D02000
|
direct allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
41DF000
|
stack
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
2810000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
331F000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
2A80000
|
heap
|
page read and write
|
||
3D7D000
|
stack
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
411F000
|
stack
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
286C000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
3C4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
C31000
|
unkown
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
36FF000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
363F000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4ADC000
|
stack
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
4721000
|
heap
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
373E000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
15D1000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
971000
|
unkown
|
page execute and write copy
|
||
2E7E000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
858000
|
heap
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
AA3000
|
unkown
|
page execute and read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
385E000
|
stack
|
page read and write
|
||
971000
|
unkown
|
page execute and write copy
|
||
8A0000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
815000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
D71000
|
unkown
|
page execute and write copy
|
||
4D22000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
BF8000
|
unkown
|
page write copy
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
F1A000
|
unkown
|
page execute and read and write
|
||
317E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
EB2000
|
unkown
|
page execute and read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
DD2000
|
unkown
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
33BF000
|
stack
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4F10000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
BF3000
|
unkown
|
page execute and read and write
|
||
80D000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
15D1000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
33C000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
B18000
|
unkown
|
page write copy
|
||
6D4000
|
heap
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
3D5D000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
321F000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page execute and write copy
|
||
844000
|
heap
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
AA8000
|
unkown
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
AA8000
|
unkown
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
BF8000
|
unkown
|
page read and write
|
||
D62000
|
unkown
|
page execute and read and write
|
||
E71000
|
unkown
|
page execute and read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
5412000
|
direct allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
2837000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
381F000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4E78000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
F8A000
|
unkown
|
page execute and read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
38C000
|
stack
|
page read and write
|
||
EC0000
|
unkown
|
page execute and write copy
|
||
2E5E000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
D21000
|
unkown
|
page execute and read and write
|
||
9D0000
|
direct allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C0C000
|
stack
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
2820000
|
direct allocation
|
page execute and read and write
|
||
30FE000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
3C4000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
EC0000
|
unkown
|
page execute and write copy
|
||
6D4000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
355F000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
49BD000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
8FD000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page execute and write copy
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
6D4000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
AAC000
|
unkown
|
page execute and read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
D56000
|
unkown
|
page execute and read and write
|
||
299F000
|
stack
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page execute and read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
AAC000
|
unkown
|
page execute and read and write
|
||
B18000
|
unkown
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
4BD2000
|
direct allocation
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
BFC000
|
unkown
|
page execute and read and write
|
||
459F000
|
stack
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
DE1000
|
unkown
|
page execute and write copy
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
A9C000
|
stack
|
page read and write
|
||
D81000
|
unkown
|
page execute and read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
387E000
|
stack
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
4D20000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
E71000
|
unkown
|
page execute and read and write
|
||
371F000
|
stack
|
page read and write
|
||
9B0000
|
direct allocation
|
page read and write
|
||
3C4000
|
heap
|
page read and write
|
||
4AF2000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4C34000
|
heap
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
D21000
|
unkown
|
page execute and read and write
|
||
1A0000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
2A90000
|
direct allocation
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
293F000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
D91000
|
unkown
|
page execute and read and write
|
||
38FE000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
4721000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
2880000
|
direct allocation
|
page execute and read and write
|
||
AB0000
|
direct allocation
|
page execute and read and write
|
||
106A000
|
unkown
|
page execute and read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
399E000
|
stack
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
4741000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
940000
|
direct allocation
|
page read and write
|
||
DE0000
|
unkown
|
page execute and read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
EA6000
|
unkown
|
page execute and read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
F1A000
|
unkown
|
page execute and read and write
|
||
4741000
|
heap
|
page read and write
|
There are 860 hidden memdumps, click here to show them.