Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
antispam_connect1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zqirwgs.dat.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4dftown3.efv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hhxmqpo.0qh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cppyhvly.hs3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jf1tngh0.0pg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oiwugu0i.1x1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\config
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\antispam_connect1.exe
|
"C:\Users\user\Desktop\antispam_connect1.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\"))
{ Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\"
}"
|
||
C:\Users\user\Desktop\antispam_connect1.exe
|
"C:\Users\user\Desktop\antispam_connect1.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\"))
{ Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\"
}"
|
||
C:\Users\user\Desktop\antispam_connect1.exe
|
"C:\Users\user\Desktop\antispam_connect1.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\"))
{ Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\"
}"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
https://go.mic
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://188.130.206.243
|
unknown
|
||
https://aka.ms/pscore6lBeq
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://93.185.159.253
|
unknown
|
||
http://46.8.236.61
|
unknown
|
||
http://93.185.159.253/
|
93.185.159.253
|
||
http://188.130.206.243/
|
188.130.206.243
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://91.212.166.91
|
unknown
|
||
http://46.8.232.106/
|
46.8.232.106
|
||
http://46.8.232.106
|
unknown
|
||
http://188.130.206.243http://46.8.232.106
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://46.8.236.61/
|
46.8.236.61
|
||
http://91.212.166.91http://46.8.232.106
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://91.212.166.91/
|
91.212.166.91
|
||
http://91.212.166.91C:
|
unknown
|
There are 15 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
109.172.88.38
|
unknown
|
Russian Federation
|
||
46.8.232.106
|
unknown
|
Russian Federation
|
||
188.130.206.243
|
unknown
|
Russian Federation
|
||
93.185.159.253
|
unknown
|
Russian Federation
|
||
91.212.166.91
|
unknown
|
United Kingdom
|
||
46.8.236.61
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
App
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C8F2000
|
direct allocation
|
page read and write
|
||
D09C000
|
direct allocation
|
page read and write
|
||
C8F8000
|
direct allocation
|
page read and write
|
||
6FFA000
|
stack
|
page read and write
|
||
46B1000
|
trusted library allocation
|
page read and write
|
||
D12A000
|
direct allocation
|
page read and write
|
||
C8CA000
|
direct allocation
|
page read and write
|
||
7B56000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
357B000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
73E0000
|
heap
|
page read and write
|
||
197E000
|
heap
|
page read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
C940000
|
direct allocation
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
C802000
|
direct allocation
|
page read and write
|
||
6EDC000
|
heap
|
page read and write
|
||
D0A6000
|
direct allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
D13A000
|
direct allocation
|
page read and write
|
||
742D000
|
heap
|
page read and write
|
||
C83A000
|
direct allocation
|
page read and write
|
||
79D2000
|
heap
|
page read and write
|
||
8C9000
|
trusted library allocation
|
page read and write
|
||
2D0FF000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
3589000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
D058000
|
direct allocation
|
page read and write
|
||
D0E4000
|
direct allocation
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page execute and read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
C9A4000
|
direct allocation
|
page read and write
|
||
D02E000
|
direct allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
CD96000
|
direct allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
CA12000
|
direct allocation
|
page read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
36D4000
|
direct allocation
|
page execute and read and write
|
||
C8AC000
|
direct allocation
|
page read and write
|
||
7CEE000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
CC3B000
|
direct allocation
|
page read and write
|
||
4830000
|
heap
|
page readonly
|
||
E1E000
|
stack
|
page read and write
|
||
3FF8000
|
direct allocation
|
page read and write
|
||
7463000
|
heap
|
page read and write
|
||
D098000
|
direct allocation
|
page read and write
|
||
C946000
|
direct allocation
|
page read and write
|
||
CC40000
|
direct allocation
|
page read and write
|
||
747C000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
D080000
|
direct allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
2CC3D000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
C95E000
|
direct allocation
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
D124000
|
direct allocation
|
page read and write
|
||
C862000
|
direct allocation
|
page read and write
|
||
6F94000
|
trusted library allocation
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
CCFC000
|
direct allocation
|
page read and write
|
||
7C3D000
|
stack
|
page read and write
|
||
CC08000
|
direct allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
CD32000
|
direct allocation
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
34E8000
|
heap
|
page read and write
|
||
7B82000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
CCEE000
|
direct allocation
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
7B63000
|
heap
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
C870000
|
direct allocation
|
page read and write
|
||
CFBD000
|
stack
|
page read and write
|
||
42E9000
|
direct allocation
|
page execute and read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
D008000
|
direct allocation
|
page read and write
|
||
CD89000
|
direct allocation
|
page read and write
|
||
6EFB000
|
stack
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
D0F6000
|
direct allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
CA80000
|
direct allocation
|
page read and write
|
||
D032000
|
direct allocation
|
page read and write
|
||
13F1000
|
unkown
|
page read and write
|
||
7B6B000
|
heap
|
page read and write
|
||
6519000
|
trusted library allocation
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
D048000
|
direct allocation
|
page read and write
|
||
CD34000
|
direct allocation
|
page read and write
|
||
C90A000
|
direct allocation
|
page read and write
|
||
D016000
|
direct allocation
|
page read and write
|
||
42E0000
|
direct allocation
|
page execute and read and write
|
||
1890000
|
heap
|
page read and write
|
||
B3D000
|
stack
|
page read and write
|
||
CC98000
|
direct allocation
|
page read and write
|
||
D0FE000
|
direct allocation
|
page read and write
|
||
C72F000
|
stack
|
page read and write
|
||
1500000
|
direct allocation
|
page read and write
|
||
CC86000
|
direct allocation
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
76DF000
|
stack
|
page read and write
|
||
CA9F000
|
stack
|
page read and write
|
||
D020000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute read
|
||
C4A000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
C888000
|
direct allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
CC00000
|
direct allocation
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
6EE7000
|
heap
|
page read and write
|
||
754B000
|
stack
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page execute and read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
D084000
|
direct allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
2D400000
|
direct allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
2CD7D000
|
stack
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
C80E000
|
direct allocation
|
page read and write
|
||
C800000
|
direct allocation
|
page read and write
|
||
3FF0000
|
direct allocation
|
page read and write
|
||
D006000
|
direct allocation
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
heap
|
page read and write
|
||
544F000
|
stack
|
page read and write
|
||
CC58000
|
direct allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
3DC5000
|
direct allocation
|
page execute and read and write
|
||
D190000
|
direct allocation
|
page read and write
|
||
D0C2000
|
direct allocation
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
168C000
|
stack
|
page read and write
|
||
48AC000
|
stack
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
CCFE000
|
direct allocation
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
CCC0000
|
direct allocation
|
page read and write
|
||
C8A0000
|
direct allocation
|
page read and write
|
||
C83E000
|
direct allocation
|
page read and write
|
||
C8A8000
|
direct allocation
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
70CD000
|
stack
|
page read and write
|
||
153D000
|
stack
|
page read and write
|
||
910000
|
heap
|
page readonly
|
||
329E000
|
stack
|
page read and write
|
||
D00C000
|
direct allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
D136000
|
direct allocation
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page execute and read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
CCFA000
|
direct allocation
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page execute and read and write
|
||
D180000
|
direct allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
D0EE000
|
direct allocation
|
page read and write
|
||
178D000
|
stack
|
page read and write
|
||
C960000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute read
|
||
C93A000
|
direct allocation
|
page read and write
|
||
CCA8000
|
direct allocation
|
page read and write
|
||
1CA8000
|
direct allocation
|
page read and write
|
||
D0EA000
|
direct allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
432C000
|
direct allocation
|
page read and write
|
||
D0BA000
|
direct allocation
|
page read and write
|
||
C8A2000
|
direct allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
C8A6000
|
direct allocation
|
page read and write
|
||
C97D000
|
direct allocation
|
page read and write
|
||
C882000
|
direct allocation
|
page read and write
|
||
C892000
|
direct allocation
|
page read and write
|
||
D0E8000
|
direct allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
6F02000
|
heap
|
page read and write
|
||
CC4E000
|
direct allocation
|
page read and write
|
||
2CD3F000
|
stack
|
page read and write
|
||
4801000
|
trusted library allocation
|
page read and write
|
||
CC06000
|
direct allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
7489000
|
heap
|
page read and write
|
||
C844000
|
direct allocation
|
page read and write
|
||
7B76000
|
heap
|
page read and write
|
||
CC71000
|
direct allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
C8BE000
|
direct allocation
|
page read and write
|
||
6ECE000
|
heap
|
page read and write
|
||
D046000
|
direct allocation
|
page read and write
|
||
8B4000
|
trusted library allocation
|
page read and write
|
||
D18E000
|
direct allocation
|
page read and write
|
||
2D440000
|
direct allocation
|
page read and write
|
||
9D5000
|
heap
|
page execute and read and write
|
||
793E000
|
stack
|
page read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
17B0000
|
heap
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
C948000
|
direct allocation
|
page read and write
|
||
4E31000
|
trusted library allocation
|
page read and write
|
||
D034000
|
direct allocation
|
page read and write
|
||
CC6F000
|
direct allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
15BD000
|
stack
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
C99D000
|
stack
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page execute and read and write
|
||
C810000
|
direct allocation
|
page read and write
|
||
1D20000
|
direct allocation
|
page read and write
|
||
C93C000
|
direct allocation
|
page read and write
|
||
7C34000
|
trusted library allocation
|
page read and write
|
||
CD30000
|
direct allocation
|
page read and write
|
||
D000000
|
direct allocation
|
page read and write
|
||
7E63000
|
trusted library allocation
|
page read and write
|
||
CDBA000
|
direct allocation
|
page read and write
|
||
6A3D000
|
stack
|
page read and write
|
||
CC04000
|
direct allocation
|
page read and write
|
||
475D000
|
trusted library allocation
|
page execute and read and write
|
||
82BE000
|
stack
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
C826000
|
direct allocation
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
C970000
|
direct allocation
|
page read and write
|
||
7B36000
|
heap
|
page read and write
|
||
C842000
|
direct allocation
|
page read and write
|
||
7BA1000
|
heap
|
page read and write
|
||
7412000
|
heap
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
CC12000
|
direct allocation
|
page read and write
|
||
D03B000
|
direct allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute read
|
||
35CD000
|
trusted library allocation
|
page execute and read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
CCE6000
|
direct allocation
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
4E6F000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
2CEC0000
|
direct allocation
|
page read and write
|
||
3620000
|
heap
|
page readonly
|
||
30B4000
|
direct allocation
|
page execute and read and write
|
||
D002000
|
direct allocation
|
page read and write
|
||
C82E000
|
direct allocation
|
page read and write
|
||
2D2FF000
|
stack
|
page read and write
|
||
D0F2000
|
direct allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
C806000
|
direct allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
CD22000
|
direct allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
D0C0000
|
direct allocation
|
page read and write
|
||
3FFD000
|
direct allocation
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
CC82000
|
direct allocation
|
page read and write
|
||
CD8B000
|
direct allocation
|
page read and write
|
||
CDC8000
|
direct allocation
|
page read and write
|
||
D0D8000
|
direct allocation
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
C8C2000
|
direct allocation
|
page read and write
|
||
D026000
|
direct allocation
|
page read and write
|
||
C92E000
|
direct allocation
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
C85A000
|
direct allocation
|
page read and write
|
||
4900000
|
direct allocation
|
page execute and read and write
|
||
32C6000
|
heap
|
page read and write
|
||
CC96000
|
direct allocation
|
page read and write
|
||
CD9C000
|
direct allocation
|
page read and write
|
||
8230000
|
heap
|
page read and write
|
||
C94C000
|
direct allocation
|
page read and write
|
||
C9BB000
|
direct allocation
|
page read and write
|
||
4715000
|
direct allocation
|
page execute and read and write
|
||
A78000
|
direct allocation
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
D0FA000
|
direct allocation
|
page read and write
|
||
6577000
|
trusted library allocation
|
page read and write
|
||
C962000
|
direct allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page execute and read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
6F62000
|
trusted library allocation
|
page read and write
|
||
C840000
|
direct allocation
|
page read and write
|
||
7770000
|
trusted library allocation
|
page execute and read and write
|
||
CCB2000
|
direct allocation
|
page read and write
|
||
710B000
|
stack
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
CD8D000
|
direct allocation
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
42C5000
|
direct allocation
|
page execute and read and write
|
||
D042000
|
direct allocation
|
page read and write
|
||
6E94000
|
heap
|
page read and write
|
||
C84C000
|
direct allocation
|
page read and write
|
||
C8C4000
|
direct allocation
|
page read and write
|
||
D010000
|
direct allocation
|
page read and write
|
||
C84E000
|
direct allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
73C0000
|
heap
|
page execute and read and write
|
||
6EBD000
|
stack
|
page read and write
|
||
D0D4000
|
direct allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
7B15000
|
heap
|
page read and write
|
||
CA16000
|
direct allocation
|
page read and write
|
||
D0A0000
|
direct allocation
|
page read and write
|
||
C977000
|
direct allocation
|
page read and write
|
||
C8BC000
|
direct allocation
|
page read and write
|
||
CCC8000
|
direct allocation
|
page read and write
|
||
90C000
|
stack
|
page read and write
|
||
CC14000
|
direct allocation
|
page read and write
|
||
C8CC000
|
direct allocation
|
page read and write
|
||
D00E000
|
direct allocation
|
page read and write
|
||
D3D000
|
stack
|
page read and write
|
||
C97B000
|
direct allocation
|
page read and write
|
||
7BB0000
|
heap
|
page read and write
|
||
CD42000
|
direct allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
C9E6000
|
direct allocation
|
page read and write
|
||
CC26000
|
direct allocation
|
page read and write
|
||
D0AA000
|
direct allocation
|
page read and write
|
||
CC16000
|
direct allocation
|
page read and write
|
||
C804000
|
direct allocation
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
CC8A000
|
direct allocation
|
page read and write
|
||
CDA6000
|
direct allocation
|
page read and write
|
||
D18C000
|
direct allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
7CD5000
|
trusted library allocation
|
page read and write
|
||
CCB6000
|
direct allocation
|
page read and write
|
||
6511000
|
trusted library allocation
|
page read and write
|
||
D0F4000
|
direct allocation
|
page read and write
|
||
C94A000
|
direct allocation
|
page read and write
|
||
C944000
|
direct allocation
|
page read and write
|
||
CC18000
|
direct allocation
|
page read and write
|
||
4860000
|
heap
|
page execute and read and write
|
||
4340000
|
direct allocation
|
page read and write
|
||
CCEC000
|
direct allocation
|
page read and write
|
||
13F1000
|
unkown
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
CD86000
|
direct allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
CC0C000
|
direct allocation
|
page read and write
|
||
C894000
|
direct allocation
|
page read and write
|
||
C958000
|
direct allocation
|
page read and write
|
||
D196000
|
direct allocation
|
page read and write
|
||
4848000
|
trusted library allocation
|
page read and write
|
||
7B8A000
|
heap
|
page read and write
|
||
CA00000
|
direct allocation
|
page read and write
|
||
35D9000
|
trusted library allocation
|
page read and write
|
||
D0AC000
|
direct allocation
|
page read and write
|
||
C968000
|
direct allocation
|
page read and write
|
||
2D84000
|
direct allocation
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6539000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
7468000
|
heap
|
page read and write
|
||
C89E000
|
direct allocation
|
page read and write
|
||
40F5000
|
direct allocation
|
page execute and read and write
|
||
CCE8000
|
direct allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
C820000
|
direct allocation
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
CDCE000
|
direct allocation
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
353D000
|
stack
|
page read and write
|
||
770D000
|
stack
|
page read and write
|
||
CC64000
|
direct allocation
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
740E000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page execute and read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
D064000
|
direct allocation
|
page read and write
|
||
CDB6000
|
direct allocation
|
page read and write
|
||
D08A000
|
direct allocation
|
page read and write
|
||
C81C000
|
direct allocation
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
8870000
|
trusted library allocation
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
C96C000
|
direct allocation
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
C96A000
|
direct allocation
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
157D000
|
stack
|
page read and write
|
||
C9A2000
|
direct allocation
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
76CB000
|
stack
|
page read and write
|
||
4E78000
|
trusted library allocation
|
page read and write
|
||
CC5A000
|
direct allocation
|
page read and write
|
||
CD94000
|
direct allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
4F35000
|
heap
|
page execute and read and write
|
||
CC32000
|
direct allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
797E000
|
stack
|
page read and write
|
||
744F000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
CC1C000
|
direct allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
D184000
|
direct allocation
|
page read and write
|
||
2D409000
|
direct allocation
|
page read and write
|
||
D0CA000
|
direct allocation
|
page read and write
|
||
687B000
|
stack
|
page read and write
|
||
CE80000
|
direct allocation
|
page read and write
|
||
4010000
|
direct allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
C848000
|
direct allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
C936000
|
direct allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
C8A4000
|
direct allocation
|
page read and write
|
||
CCC6000
|
direct allocation
|
page read and write
|
||
CCA0000
|
direct allocation
|
page read and write
|
||
C9CA000
|
direct allocation
|
page read and write
|
||
D044000
|
direct allocation
|
page read and write
|
||
CC0A000
|
direct allocation
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
6A7B000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
2CE8C000
|
direct allocation
|
page read and write
|
||
C7B0000
|
direct allocation
|
page read and write
|
||
CC4A000
|
direct allocation
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
D004000
|
direct allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page execute and read and write
|
||
6ECA000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
D05A000
|
direct allocation
|
page read and write
|
||
7B58000
|
heap
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
743E000
|
heap
|
page read and write
|
||
CC73000
|
direct allocation
|
page read and write
|
||
CC48000
|
direct allocation
|
page read and write
|
||
CC34000
|
direct allocation
|
page read and write
|
||
C832000
|
direct allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
C808000
|
direct allocation
|
page read and write
|
||
C8C0000
|
direct allocation
|
page read and write
|
||
CCA6000
|
direct allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
4940000
|
direct allocation
|
page read and write
|
||
C9CE000
|
direct allocation
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
C952000
|
direct allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
8310000
|
trusted library allocation
|
page execute and read and write
|
||
C7D000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
C730000
|
direct allocation
|
page read and write
|
||
9D0000
|
heap
|
page execute and read and write
|
||
D51000
|
unkown
|
page execute read
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
C898000
|
direct allocation
|
page read and write
|
||
4754000
|
trusted library allocation
|
page read and write
|
||
C91C000
|
direct allocation
|
page read and write
|
||
CC6D000
|
direct allocation
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
CD8F000
|
direct allocation
|
page read and write
|
||
8E5000
|
trusted library allocation
|
page execute and read and write
|
||
6F7F000
|
stack
|
page read and write
|
||
C770000
|
direct allocation
|
page read and write
|
||
4320000
|
direct allocation
|
page read and write
|
||
CC7E000
|
direct allocation
|
page read and write
|
||
35C4000
|
trusted library allocation
|
page read and write
|
||
C9BD000
|
direct allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
CCF4000
|
direct allocation
|
page read and write
|
||
C8BA000
|
direct allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
C95A000
|
direct allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
744A000
|
heap
|
page read and write
|
||
88C0000
|
heap
|
page read and write
|
||
CC9C000
|
direct allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
C866000
|
direct allocation
|
page read and write
|
||
3630000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
970000
|
heap
|
page execute and read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
D01E000
|
direct allocation
|
page read and write
|
||
D122000
|
direct allocation
|
page read and write
|
||
74F1000
|
heap
|
page read and write
|
||
8B3000
|
trusted library allocation
|
page execute and read and write
|
||
D01A000
|
direct allocation
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
C8CE000
|
direct allocation
|
page read and write
|
||
CADE000
|
stack
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
82FE000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
CDCA000
|
direct allocation
|
page read and write
|
||
CCC2000
|
direct allocation
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
4FC0000
|
heap
|
page read and write
|
||
6EB6000
|
heap
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page execute and read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
197A000
|
heap
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
948000
|
stack
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
13F1000
|
unkown
|
page read and write
|
||
CD2A000
|
direct allocation
|
page read and write
|
||
745E000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
C84A000
|
direct allocation
|
page read and write
|
||
D0E6000
|
direct allocation
|
page read and write
|
||
37D0000
|
direct allocation
|
page execute and read and write
|
||
88B0000
|
trusted library allocation
|
page execute and read and write
|
||
6ED4000
|
heap
|
page read and write
|
||
CC84000
|
direct allocation
|
page read and write
|
||
CC20000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute read
|
||
CC9E000
|
direct allocation
|
page read and write
|
||
D09E000
|
direct allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
CC1A000
|
direct allocation
|
page read and write
|
||
D082000
|
direct allocation
|
page read and write
|
||
2CAFF000
|
stack
|
page read and write
|
||
C9DA000
|
direct allocation
|
page read and write
|
||
2CE7F000
|
stack
|
page read and write
|
||
D128000
|
direct allocation
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
775D000
|
stack
|
page read and write
|
||
D056000
|
direct allocation
|
page read and write
|
||
CC10000
|
direct allocation
|
page read and write
|
||
D0B2000
|
direct allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
8365000
|
trusted library allocation
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
7000000
|
heap
|
page execute and read and write
|
||
C8B8000
|
direct allocation
|
page read and write
|
||
CDCC000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
D0C6000
|
direct allocation
|
page read and write
|
||
4782000
|
trusted library allocation
|
page read and write
|
||
2C8FF000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
CC2C000
|
direct allocation
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
heap
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
C837000
|
direct allocation
|
page read and write
|
||
C884000
|
direct allocation
|
page read and write
|
||
C9B7000
|
direct allocation
|
page read and write
|
||
6D72000
|
heap
|
page read and write
|
||
C91E000
|
direct allocation
|
page read and write
|
||
CCBA000
|
direct allocation
|
page read and write
|
||
7494000
|
heap
|
page read and write
|
||
C95C000
|
direct allocation
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
2FA9000
|
heap
|
page read and write
|
||
4324000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute read
|
||
48E5000
|
direct allocation
|
page execute and read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
72FF000
|
stack
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
D0FC000
|
direct allocation
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
8300000
|
heap
|
page read and write
|
||
367D000
|
stack
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
4944000
|
direct allocation
|
page read and write
|
||
D0A8000
|
direct allocation
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
4C8000
|
stack
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
88A0000
|
heap
|
page read and write
|
||
D18A000
|
direct allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page execute and read and write
|
||
C938000
|
direct allocation
|
page read and write
|
||
C88A000
|
direct allocation
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
CDB4000
|
direct allocation
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
3648000
|
heap
|
page read and write
|
||
C772000
|
direct allocation
|
page read and write
|
||
470A000
|
trusted library allocation
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
CCF6000
|
direct allocation
|
page read and write
|
||
CCEA000
|
direct allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
6E70000
|
heap
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
35C3000
|
trusted library allocation
|
page execute and read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
35F5000
|
trusted library allocation
|
page execute and read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
CDC6000
|
direct allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
48C000
|
stack
|
page read and write
|
||
C89A000
|
direct allocation
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
CCD8000
|
direct allocation
|
page read and write
|
||
C98C000
|
direct allocation
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
C979000
|
direct allocation
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
C942000
|
direct allocation
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
C92A000
|
direct allocation
|
page read and write
|
||
7B67000
|
heap
|
page read and write
|
||
D014000
|
direct allocation
|
page read and write
|
||
D096000
|
direct allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
3FB9000
|
direct allocation
|
page execute and read and write
|
||
CC2E000
|
direct allocation
|
page read and write
|
||
CCAA000
|
direct allocation
|
page read and write
|
||
8985000
|
trusted library allocation
|
page read and write
|
||
D01C000
|
direct allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
8850000
|
heap
|
page read and write
|
||
CC3E000
|
direct allocation
|
page read and write
|
||
6F00000
|
heap
|
page read and write
|
||
D130000
|
direct allocation
|
page read and write
|
||
948000
|
trusted library allocation
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
C890000
|
direct allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
D018000
|
direct allocation
|
page read and write
|
||
4ECC000
|
stack
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
4909000
|
direct allocation
|
page execute and read and write
|
||
683D000
|
stack
|
page read and write
|
||
D0B6000
|
direct allocation
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
CD0C000
|
direct allocation
|
page read and write
|
||
7BC7000
|
trusted library allocation
|
page read and write
|
||
CCE4000
|
direct allocation
|
page read and write
|
||
8E2000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
heap
|
page execute and read and write
|
||
D0EC000
|
direct allocation
|
page read and write
|
||
6EE4000
|
heap
|
page read and write
|
||
2FD8000
|
stack
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
3FF4000
|
direct allocation
|
page read and write
|
||
749D000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
5718000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
2D3FF000
|
stack
|
page read and write
|
||
7C90000
|
heap
|
page execute and read and write
|
||
C89C000
|
direct allocation
|
page read and write
|
||
7850000
|
trusted library allocation
|
page execute and read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
C920000
|
direct allocation
|
page read and write
|
||
3566000
|
heap
|
page read and write
|
||
CD9A000
|
direct allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
7BC5000
|
trusted library allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
CFFE000
|
stack
|
page read and write
|
||
D00A000
|
direct allocation
|
page read and write
|
||
2CE89000
|
direct allocation
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
C90C000
|
direct allocation
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
C818000
|
direct allocation
|
page read and write
|
||
D028000
|
direct allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
C864000
|
direct allocation
|
page read and write
|
||
CD3E000
|
direct allocation
|
page read and write
|
||
CD24000
|
direct allocation
|
page read and write
|
||
3F95000
|
direct allocation
|
page execute and read and write
|
||
C912000
|
direct allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
7425000
|
heap
|
page read and write
|
||
D04C000
|
direct allocation
|
page read and write
|
||
C954000
|
direct allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
CD28000
|
direct allocation
|
page read and write
|
||
CCF2000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
BB0000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
CD80000
|
direct allocation
|
page read and write
|
||
7005000
|
heap
|
page execute and read and write
|
||
556C000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
42C0000
|
direct allocation
|
page execute and read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
4769000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
direct allocation
|
page execute and read and write
|
||
CCD4000
|
direct allocation
|
page read and write
|
||
D10C000
|
direct allocation
|
page read and write
|
||
D0C8000
|
direct allocation
|
page read and write
|
||
C81A000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
774E000
|
stack
|
page read and write
|
||
CD92000
|
direct allocation
|
page read and write
|
||
119D000
|
unkown
|
page write copy
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
768D000
|
stack
|
page read and write
|
||
C918000
|
direct allocation
|
page read and write
|
||
D086000
|
direct allocation
|
page read and write
|
||
C9DC000
|
direct allocation
|
page read and write
|
||
1508000
|
direct allocation
|
page read and write
|
||
2D1FF000
|
stack
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
CC62000
|
direct allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
C880000
|
direct allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
C812000
|
direct allocation
|
page read and write
|
||
4785000
|
trusted library allocation
|
page execute and read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
3FB0000
|
direct allocation
|
page execute and read and write
|
||
E9E000
|
stack
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
CC02000
|
direct allocation
|
page read and write
|
||
CCCA000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
CC46000
|
direct allocation
|
page read and write
|
||
4892000
|
trusted library allocation
|
page read and write
|
||
4753000
|
trusted library allocation
|
page execute and read and write
|
||
7B7A000
|
heap
|
page read and write
|
||
C828000
|
direct allocation
|
page read and write
|
||
2C9FF000
|
stack
|
page read and write
|
||
C81E000
|
direct allocation
|
page read and write
|
||
697A000
|
stack
|
page read and write
|
||
4E7A000
|
trusted library allocation
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
764A000
|
stack
|
page read and write
|
||
D012000
|
direct allocation
|
page read and write
|
||
C8AE000
|
direct allocation
|
page read and write
|
||
D066000
|
direct allocation
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
CDA2000
|
direct allocation
|
page read and write
|
||
C964000
|
direct allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
7750000
|
heap
|
page read and write
|
||
CBDF000
|
stack
|
page read and write
|
||
83B0000
|
heap
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
2CE80000
|
direct allocation
|
page read and write
|
||
C835000
|
direct allocation
|
page read and write
|
There are 823 hidden memdumps, click here to show them.