Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Product Data Specifications_PDF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\635gG211
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nonhazardousness
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Product Data Specifications_PDF.exe
|
"C:\Users\user\Desktop\Product Data Specifications_PDF.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\Product Data Specifications_PDF.exe"
|
||
C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe
|
"C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe"
|
||
C:\Windows\SysWOW64\cmdl32.exe
|
"C:\Windows\SysWOW64\cmdl32.exe"
|
||
C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe
|
"C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
|
unknown
|
||
https://dts.gnpge.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://www.kevin-torkelson.info/__media__/js/trademark.php?d=kevin-torkelson.info&type=ns
|
unknown
|
||
http://www.qwefs.org/toq1/?Z0=uFBHOFjbtFvxqkces1RGqIZYNgmiur5XIDe+8RHTfxNdoahKRW8Ulx3EiPWAiOWTg+KGn77UKm1RYG+ByVGjA2HLhLGNIPNt7CZLxVcbhsRd+xmlQzDGNJYRcWCQEWce52MF6lNTmRQD&fRr0=tfAptZ
|
45.114.171.236
|
||
http://i3.cdn-image.com/__media__/pics/28903/search.png)
|
unknown
|
||
https://cdn.consentmanager.net
|
unknown
|
||
http://www.Kevin-torkelson.info
|
unknown
|
||
http://www.kevin-torkelson.info/Anti_Wrinkle_Creams.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaa
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://www.dfmagazine.shop/wc8m/
|
84.32.84.32
|
||
http://www.kevin-torkelson.info/High_Speed_Internet.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaa
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
|
unknown
|
||
http://i3.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
|
unknown
|
||
http://www.trapkitten.website/vzgx/?fRr0=tfAptZ&Z0=fAt7pIVPpGXAvBzcGITPA7OHGvP4drUtR0TDZSipM2iZbUNyxYUxCE+UHA0v6t9lkzzVyERFWiUA+TPVxmGbgZvp38A33fVcU72oeaDS2r7GjI1g6DEPKEsN3N2XW07UJj8EjHQ8jzqg
|
195.161.68.8
|
||
http://www.mandemj.top
|
unknown
|
||
http://www.kevin-torkelson.info/fashion_trends.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaaThZHr
|
unknown
|
||
http://www.kevin-torkelson.info/gekb/?Z0=5z2j4JvjBCmnxDGlKBgzTD3+HUD/dd2fumCOi9/ZiiqSem4bSPmiTeLNTUQRFOSACWspsHfkjQi2G8tl0kaRWA67inr6j8yvx+6PXqz9iyZ5+RA70tZ4RmMUT5lyJ2S3VdPbvKQVdTVJ&fRr0=tfAptZ
|
208.91.197.27
|
||
http://www.kevin-torkelson.info/Parental_Control.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaaThZ
|
unknown
|
||
http://www.kevin-torkelson.info/__media__/design/underconstructionnotice.php?d=kevin-torkelson.info
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
|
unknown
|
||
https://delivery.consentmanager.net
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
|
unknown
|
||
http://www.mandemj.top/to69/?Z0=jnxbIh9toY3Lk084faTvVBMEFxwUktgIZy5Q1YpSMvmzprTTtz9cwA3B/bTtN1ehZaJt7UsIXSNTUbHOXFDXB9gkhdqEj3u6wGNYEX9l8USgN38burlDvemyCHtOx57idtfraeuBs8os&fRr0=tfAptZ
|
162.0.238.43
|
||
http://i3.cdn-image.com/__media__/pics/29590/bg1.png)
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
|
unknown
|
||
https://jino.ru
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://i3.cdn-image.com/__media__/pics/28905/arrrow.png)
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
|
unknown
|
||
http://www.kevin-torkelson.info/All_Inclusive_Vacation_Packages.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2F
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.disn-china.buzz/za6x/
|
161.97.168.245
|
||
http://i3.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
|
unknown
|
||
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
|
unknown
|
||
http://www.kevin-torkelson.info/gekb/
|
208.91.197.27
|
||
http://www.qwefs.org/toq1/
|
45.114.171.236
|
||
http://www.mandemj.top/to69/
|
162.0.238.43
|
||
http://www.disn-china.buzz/za6x/?fRr0=tfAptZ&Z0=EgAkyEJNK52+6mt0ZZzaOaTRCjAqhTrWwvgRo5oIQtO9ZSuXgOHTRb0W4iTGk1GYFMCByhdBFH2COuTwpe8yjCAk5/Of1W40SqKn8hyiq9h4asN2CcaU88uOnsZx5gwZ1TVihW9sV3GM
|
161.97.168.245
|
||
http://i3.cdn-image.com/__media__/js/min.js?v2.3
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.dfmagazine.shop
|
unknown
|
||
www.mktimediato.online
|
unknown
|
||
www.qwefs.org
|
45.114.171.236
|
||
www.mandemj.top
|
162.0.238.43
|
||
www.trapkitten.website
|
195.161.68.8
|
||
www.disn-china.buzz
|
161.97.168.245
|
||
dfmagazine.shop
|
84.32.84.32
|
||
www.kevin-torkelson.info
|
208.91.197.27
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.0.238.43
|
www.mandemj.top
|
Canada
|
||
45.114.171.236
|
www.qwefs.org
|
Hong Kong
|
||
84.32.84.32
|
dfmagazine.shop
|
Lithuania
|
||
208.91.197.27
|
www.kevin-torkelson.info
|
Virgin Islands (BRITISH)
|
||
195.161.68.8
|
www.trapkitten.website
|
Russian Federation
|
||
161.97.168.245
|
www.disn-china.buzz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30E0000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
3520000
|
unclassified section
|
page execute and read and write
|
||
3C00000
|
unclassified section
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3120000
|
unkown
|
page execute and read and write
|
||
2B90000
|
system
|
page execute and read and write
|
||
740000
|
system
|
page execute and read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
3FF1000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
4C28000
|
unkown
|
page execute and read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
31DF000
|
heap
|
page read and write
|
||
4EED000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
5628000
|
unkown
|
page execute and read and write
|
||
3017000
|
heap
|
page read and write
|
||
2B1B000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
406F000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
8102000
|
heap
|
page read and write
|
||
F8A000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
193E2421000
|
trusted library allocation
|
page read and write
|
||
2582000
|
unkown
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E0A4E000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
3828000
|
unkown
|
page execute and read and write
|
||
193E25BE000
|
trusted library allocation
|
page read and write
|
||
23C4000
|
heap
|
page read and write
|
||
323A000
|
heap
|
page read and write
|
||
193E2500000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3024000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
482000
|
unkown
|
page readonly
|
||
3187000
|
heap
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
4CCC000
|
stack
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
14E0000
|
heap
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4DB2000
|
heap
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3208000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
5091000
|
direct allocation
|
page execute and read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
20902000
|
system
|
page read and write
|
||
193E240E000
|
trusted library allocation
|
page read and write
|
||
3F5B000
|
heap
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
193E09B0000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
F8A000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page readonly
|
||
700000
|
heap
|
page read and write
|
||
406F000
|
heap
|
page read and write
|
||
4308000
|
unclassified section
|
page execute and read and write
|
||
8105000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
4763000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3187000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
80D5000
|
heap
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
193E2403000
|
trusted library allocation
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
3192000
|
heap
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
51D2000
|
unclassified section
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3F11000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
3F51000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
45A000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
876F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3228000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
1351000
|
unkown
|
page readonly
|
||
193E25A6000
|
trusted library allocation
|
page read and write
|
||
3600000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
24C2000
|
unkown
|
page read and write
|
||
279C000
|
unkown
|
page read and write
|
||
5102000
|
direct allocation
|
page execute and read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
31E6000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
80B5000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
1A50000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
3F5B000
|
heap
|
page read and write
|
||
1351000
|
unkown
|
page readonly
|
||
3FF1000
|
heap
|
page read and write
|
||
25DC000
|
unkown
|
page read and write
|
||
193E22E0000
|
trusted library allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
20F04000
|
system
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
3101000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
193E2400000
|
trusted library allocation
|
page read and write
|
||
80A3000
|
heap
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
8AF000
|
stack
|
page read and write
|
||
3F5B000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
2E00000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3017000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3F1F000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
2EA8000
|
unkown
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
7D7000
|
system
|
page execute and read and write
|
||
10209FB000
|
stack
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
DE1000
|
unkown
|
page readonly
|
||
974000
|
heap
|
page read and write
|
||
31CD000
|
heap
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
406D000
|
heap
|
page read and write
|
||
3729000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E0A30000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
1700000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4F5E000
|
direct allocation
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
6B08000
|
unclassified section
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
953000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
404C000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
810F000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
8360000
|
heap
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
53EC000
|
unclassified section
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
3F5B000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
38CD000
|
direct allocation
|
page execute and read and write
|
||
279C000
|
unkown
|
page read and write
|
||
883E000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
4C14000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E25C4000
|
trusted library allocation
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
301A000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
1460000
|
unkown
|
page read and write
|
||
3FAC000
|
heap
|
page read and write
|
||
4D41000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
407E000
|
heap
|
page read and write
|
||
1460000
|
unkown
|
page read and write
|
||
40E3000
|
heap
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3201000
|
heap
|
page read and write
|
||
81A0000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
7E3000
|
system
|
page execute and read and write
|
||
15CF000
|
stack
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
14D0000
|
unkown
|
page readonly
|
||
5AF8000
|
unclassified section
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
40A7000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
359E000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2E10000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3942000
|
direct allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
372D000
|
direct allocation
|
page execute and read and write
|
||
40E9000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
809C000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
unkown
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
6108000
|
unclassified section
|
page execute and read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
31E6000
|
heap
|
page read and write
|
||
8115000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
2095C000
|
system
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
23C4000
|
heap
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
193E09D0000
|
heap
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
4228000
|
unkown
|
page execute and read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
2B58000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
4FCF000
|
stack
|
page read and write
|
||
193E2417000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
20B1C000
|
system
|
page read and write
|
||
10221FE000
|
stack
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
57D4000
|
unclassified section
|
page read and write
|
||
3F28000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
193E0A20000
|
heap
|
page read and write
|
||
193E2410000
|
trusted library allocation
|
page read and write
|
||
80C2000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
3B38000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
335E000
|
unkown
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
522C000
|
unclassified section
|
page read and write
|
||
7508000
|
unclassified section
|
page execute and read and write
|
||
40E4000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
8B4000
|
stack
|
page read and write
|
||
1A51000
|
unkown
|
page readonly
|
||
3181000
|
heap
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
193E240B000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
83A000
|
system
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E0A00000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3A48000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
80FC000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4002000
|
heap
|
page execute and read and write
|
||
324A000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
FC0000
|
unkown
|
page readonly
|
||
2FE4000
|
heap
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
80BA000
|
heap
|
page read and write
|
||
8190000
|
trusted library allocation
|
page read and write
|
||
3215000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
31F3000
|
heap
|
page read and write
|
||
3203000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
193E0A61000
|
heap
|
page read and write
|
||
406C000
|
heap
|
page read and write
|
||
406F000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3176000
|
heap
|
page read and write
|
||
1735000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
1620000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
45A000
|
stack
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
193E0A5D000
|
heap
|
page read and write
|
||
8125000
|
heap
|
page read and write
|
||
6A28000
|
unkown
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
5E1C000
|
unclassified section
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
320E000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
3EF3000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
165000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
3A30000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
3DF0000
|
heap
|
page read and write
|
||
193E0A41000
|
heap
|
page read and write
|
||
4066000
|
heap
|
page read and write
|
||
7BD000
|
system
|
page execute and read and write
|
||
4D08000
|
unclassified section
|
page execute and read and write
|
||
C0C000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
3FF1000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E2501000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3200000
|
direct allocation
|
page read and write
|
||
2CAA000
|
stack
|
page read and write
|
||
872E000
|
stack
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A6B000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3F2A000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E08B0000
|
system
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E25CE000
|
trusted library allocation
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
5708000
|
unclassified section
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
4EE9000
|
direct allocation
|
page execute and read and write
|
||
3030000
|
unkown
|
page readonly
|
||
497E000
|
direct allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
22EF000
|
stack
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
10211FE000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
379E000
|
direct allocation
|
page execute and read and write
|
||
4C10000
|
trusted library allocation
|
page execute and read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
16BF000
|
stack
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
3FF1000
|
heap
|
page read and write
|
||
4B8E000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
7C7000
|
system
|
page execute and read and write
|
||
887F000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
5966000
|
unclassified section
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
5FAE000
|
unclassified section
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
405E000
|
heap
|
page read and write
|
||
6028000
|
unkown
|
page execute and read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
31F3000
|
heap
|
page read and write
|
||
80CE000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
10229FE000
|
stack
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
3201000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
3529000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
80DF000
|
heap
|
page read and write
|
||
2F70000
|
unkown
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2B84000
|
unkown
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
4026000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
3C29000
|
heap
|
page read and write
|
||
10219FE000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4037000
|
heap
|
page read and write
|
||
8112000
|
heap
|
page read and write
|
||
24C2000
|
unkown
|
page read and write
|
||
193E2300000
|
trusted library allocation
|
page read and write
|
||
193E0A64000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
23AE000
|
stack
|
page read and write
|
||
508D000
|
direct allocation
|
page execute and read and write
|
||
193E091F000
|
system
|
page execute and read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2C6C000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
44E7000
|
heap
|
page read and write
|
||
38D1000
|
direct allocation
|
page execute and read and write
|
||
80B0000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
80F3000
|
heap
|
page read and write
|
||
193E2415000
|
trusted library allocation
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
406D000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
6140000
|
unclassified section
|
page read and write
|
||
3024000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
3F0C000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
193E0A3A000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
31CC000
|
unkown
|
page read and write
|
||
8109000
|
heap
|
page read and write
|
||
193E22E0000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4007000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
5112000
|
unclassified section
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
80D9000
|
heap
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
14D0000
|
unkown
|
page readonly
|
||
3FF1000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
C35000
|
unkown
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
20842000
|
system
|
page read and write
|
||
43FF000
|
heap
|
page read and write
|
||
C37000
|
unkown
|
page readonly
|
||
4A61000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3FF1000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
80AB000
|
heap
|
page read and write
|
||
2D16000
|
unkown
|
page read and write
|
||
4036000
|
heap
|
page read and write
|
||
6F1000
|
unkown
|
page readonly
|
||
3176000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
406F000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
3C23000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
3323000
|
heap
|
page read and write
|
||
840000
|
unkown
|
page read and write
|
||
193E091D000
|
system
|
page execute and read and write
|
||
31DF000
|
heap
|
page read and write
|
There are 779 hidden memdumps, click here to show them.