Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_163.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_163.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_163.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.132.74
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
52C0000
|
direct allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
131000
|
unkown
|
page execute and read and write
|
||
131000
|
unkown
|
page execute and read and write
|
||
1D1000
|
unkown
|
page execute and read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
21000
|
unkown
|
page execute and read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
1D1000
|
unkown
|
page execute and read and write
|
||
1D1000
|
unkown
|
page execute and write copy
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1010000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
303000
|
unkown
|
page execute and read and write
|
||
15A0000
|
heap
|
page read and write
|
||
52F000
|
unkown
|
page execute and read and write
|
||
1480000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
131000
|
unkown
|
page execute and write copy
|
||
4601000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
B3D000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
4A7D000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
158000
|
unkown
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
6D9000
|
unkown
|
page execute and read and write
|
||
5410000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
52F000
|
unkown
|
page execute and write copy
|
||
430E000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
49C000
|
unkown
|
page execute and read and write
|
||
40AE000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page execute and write copy
|
||
3DCF000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4F6F000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
4DF000
|
unkown
|
page execute and read and write
|
||
302F000
|
stack
|
page read and write
|
||
4E6B000
|
stack
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4CA6000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
2D10000
|
direct allocation
|
page execute and read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
11E1000
|
heap
|
page read and write
|
||
15C000
|
unkown
|
page execute and read and write
|
||
390F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
3CF000
|
unkown
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
308000
|
unkown
|
page write copy
|
||
280E000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
direct allocation
|
page execute and read and write
|
||
57F000
|
unkown
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
B73000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
15F2000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
153000
|
unkown
|
page execute and read and write
|
||
41CF000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
2D20000
|
heap
|
page read and write
|
||
308000
|
unkown
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
390E000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
5B8000
|
unkown
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
11AB000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
B86000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
26CB000
|
stack
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
26C000
|
unkown
|
page execute and read and write
|
||
40CE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page execute and read and write
|
||
1557000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
52F000
|
unkown
|
page execute and write copy
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
49B0000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page execute and write copy
|
||
C80000
|
direct allocation
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
30FE000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
26C000
|
unkown
|
page execute and read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
530000
|
unkown
|
page execute and write copy
|
||
10B0000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
268000
|
unkown
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
30C000
|
unkown
|
page execute and read and write
|
||
268E000
|
stack
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
32CF000
|
stack
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
139F000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
158000
|
unkown
|
page write copy
|
||
352F000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
420000
|
unkown
|
page execute and write copy
|
||
1484000
|
heap
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
52F000
|
unkown
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
5CF000
|
unkown
|
page execute and write copy
|
||
3F4E000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
268000
|
unkown
|
page write copy
|
||
130000
|
unkown
|
page readonly
|
||
E6F000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
284B000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
50AD000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
15FC000
|
heap
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
268000
|
unkown
|
page write copy
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
297F000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
458F000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
1485000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4C73000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
486F000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page execute and read and write
|
||
342E000
|
stack
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
4A4B000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page execute and read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
344E000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
5C9000
|
unkown
|
page execute and read and write
|
||
113B000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page execute and read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
373E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
EFD000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
35BF000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4590000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4E21000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
38EF000
|
stack
|
page read and write
|
||
4E66000
|
heap
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
41F000
|
unkown
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
4ADB000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
318C000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
4F62000
|
direct allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
2720000
|
heap
|
page read and write
|
||
53F2000
|
direct allocation
|
page read and write
|
||
6D9000
|
unkown
|
page execute and read and write
|
||
46CE000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
E4B000
|
stack
|
page read and write
|
||
131000
|
unkown
|
page execute and write copy
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
458E000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
BB0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
292F000
|
stack
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
5CF000
|
unkown
|
page execute and write copy
|
||
52B0000
|
direct allocation
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
5574000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
411000
|
unkown
|
page execute and read and write
|
||
35EE000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
4B42000
|
direct allocation
|
page read and write
|
||
2877000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
CC4000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
494E000
|
stack
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
354E000
|
stack
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
308000
|
unkown
|
page write copy
|
||
44AF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5C1000
|
unkown
|
page execute and read and write
|
||
412E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
2727000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
44FE000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page execute and read and write
|
||
15BA000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
779000
|
unkown
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
314F000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
5B8000
|
unkown
|
page execute and read and write
|
||
518000
|
unkown
|
page execute and read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
1D1000
|
unkown
|
page execute and write copy
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page execute and write copy
|
||
47CF000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4E66000
|
heap
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
49C000
|
unkown
|
page execute and read and write
|
||
444F000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
4DF000
|
unkown
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4B32000
|
direct allocation
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
268000
|
unkown
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
B6C000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
312F000
|
stack
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2D27000
|
heap
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
4BD2000
|
direct allocation
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
30C000
|
unkown
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
49B1000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
5C1000
|
unkown
|
page execute and read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
32AF000
|
stack
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page execute and write copy
|
||
2860000
|
direct allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
BEA000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
308000
|
unkown
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
49AF000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
15C000
|
unkown
|
page execute and read and write
|
||
1484000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4571000
|
heap
|
page read and write
|
||
1090000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
49B1000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
36CE000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
427E000
|
stack
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
CB0000
|
direct allocation
|
page execute and read and write
|
||
432E000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
336E000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
408E000
|
stack
|
page read and write
|
||
133D000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
C80000
|
direct allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
779000
|
unkown
|
page execute and read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
372E000
|
stack
|
page read and write
|
||
10B4000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
57F000
|
unkown
|
page execute and read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
36AE000
|
stack
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
B64000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
303000
|
unkown
|
page execute and read and write
|
||
529D000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
There are 881 hidden memdumps, click here to show them.