Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
skuld3.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\skuld3.exe
|
"C:\Users\user\Desktop\skuld3.exe"
|
||
C:\Windows\System32\attrib.exe
|
attrib +h +s C:\Users\user\Desktop\skuld3.exe
|
||
C:\Windows\System32\attrib.exe
|
attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
||
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
|
||
C:\Windows\System32\fodhelper.exe
|
fodhelper
|
||
C:\Windows\System32\fodhelper.exe
|
"C:\Windows\system32\fodhelper.exe"
|
||
C:\Windows\System32\fodhelper.exe
|
"C:\Windows\system32\fodhelper.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
|
||
C:\Windows\System32\fodhelper.exe
|
fodhelper
|
||
C:\Windows\System32\fodhelper.exe
|
"C:\Windows\system32\fodhelper.exe"
|
||
C:\Windows\System32\fodhelper.exe
|
"C:\Windows\system32\fodhelper.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get UUID
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C fodhelper
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C fodhelper
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.ipify.org/-DisableIOAVProtection-DisableScriptScanning%s
|
unknown
|
||
https://discordapp.com/api/webhooks/1293231846204903474/NlFoQQli1eEBiZ1mTgA4lGWcgDGUPQu-TH2KjA0djnkL
|
unknown
|
||
https://github.com/hackirby/wallets-injection/raw/main/atomic.asarhttps://github.com/hackirby/wallet
|
unknown
|
||
https://raw.githubusercontent.com/hackirby/discord-injection/main/injection.js1157920892103562487626
|
unknown
|
||
https://avatars.githubusercontent.com/u/145487845?v=4sqlite:
|
unknown
|
||
https://api.gofile.io/getServerhttps://%s.gofile.io/uploadFilesql:
|
unknown
|
||
https://i.ibb.co/GFZ2tHJ/shakabaiano-1674282487.jpgJSON
|
unknown
|
||
http://ip-api.com/json
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.13.205
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
|
EnableCounterForIoctl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Realtek HD Audio Universal Service
|
||
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
|
DelegateExecute
|
||
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
|
DelegateExecute
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
941000
|
unkown
|
page execute and read and write
|
||
D71000
|
unkown
|
page execute and read and write
|
||
D71000
|
unkown
|
page execute and read and write
|
||
D71000
|
unkown
|
page execute and read and write
|
||
D71000
|
unkown
|
page execute and read and write
|
||
C00021A000
|
direct allocation
|
page read and write
|
||
229FA855000
|
heap
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
1986B240000
|
heap
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
229D3BB0000
|
heap
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
2CB3F340000
|
heap
|
page read and write
|
||
AD4F9FF000
|
stack
|
page read and write
|
||
19871F00000
|
direct allocation
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C00023E000
|
direct allocation
|
page read and write
|
||
223DC809000
|
heap
|
page read and write
|
||
C000204000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
1D726830000
|
heap
|
page read and write
|
||
229FAF33000
|
heap
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
223DC050000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
19871F50000
|
direct allocation
|
page read and write
|
||
1F43DE10000
|
direct allocation
|
page read and write
|
||
172B000
|
unkown
|
page execute and read and write
|
||
223DC0C9000
|
heap
|
page read and write
|
||
C0001D6000
|
direct allocation
|
page read and write
|
||
223DC0AF000
|
heap
|
page read and write
|
||
223DC0A1000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
223DC7F8000
|
heap
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
223DC0A3000
|
heap
|
page read and write
|
||
C0001CE000
|
direct allocation
|
page read and write
|
||
177B000
|
unkown
|
page execute and read and write
|
||
229D3BFC000
|
heap
|
page read and write
|
||
525AB7E000
|
stack
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
1F4630F1000
|
direct allocation
|
page read and write
|
||
FD6D9FE000
|
stack
|
page read and write
|
||
2CB3F330000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
223DC812000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
9A605FF000
|
stack
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
9316E7E000
|
stack
|
page read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page write copy
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
1770000
|
unkown
|
page execute and read and write
|
||
223DC322000
|
heap
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
1D581E40000
|
heap
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
148C000
|
unkown
|
page execute and write copy
|
||
5E29BFC000
|
stack
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
FD6DBFF000
|
stack
|
page read and write
|
||
21F79500000
|
direct allocation
|
page read and write
|
||
1D724C20000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
9A5F9CE000
|
stack
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
21F7ADD0000
|
heap
|
page read and write
|
||
229FAF30000
|
heap
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
229F8FC0000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
229D3BF6000
|
heap
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
223DC320000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
525AA7F000
|
stack
|
page read and write
|
||
FD6E1FE000
|
stack
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
21F7AE00000
|
heap
|
page read and write
|
||
5E295FC000
|
stack
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
223DC0BA000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
229D3BFC000
|
heap
|
page read and write
|
||
1986B2A0000
|
heap
|
page read and write
|
||
223DC809000
|
heap
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C000204000
|
direct allocation
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
223DC0C7000
|
heap
|
page read and write
|
||
C000208000
|
direct allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page write copy
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
21F342C0000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
C000131000
|
direct allocation
|
page read and write
|
||
C0001D6000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
5E293FB000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C0001CC000
|
direct allocation
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
999A1F9000
|
stack
|
page read and write
|
||
19871F20000
|
direct allocation
|
page read and write
|
||
C0001D4000
|
direct allocation
|
page read and write
|
||
223DC0C6000
|
heap
|
page read and write
|
||
223DC150000
|
heap
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
223DC323000
|
heap
|
page read and write
|
||
5E28FFE000
|
stack
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
229D3BE9000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
223DC7F2000
|
heap
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
C00015A000
|
direct allocation
|
page read and write
|
||
223DC0AF000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
15043FF000
|
stack
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
1742000
|
unkown
|
page execute and read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
198706B0000
|
heap
|
page read and write
|
||
223DC0A1000
|
heap
|
page read and write
|
||
C0001FE000
|
direct allocation
|
page read and write
|
||
223DC0C3000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
C00015A000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
1319000
|
unkown
|
page execute and read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C0001C6000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
1D724F20000
|
heap
|
page read and write
|
||
223DE08E000
|
heap
|
page read and write
|
||
21F79581000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C00021C000
|
direct allocation
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
C000109000
|
direct allocation
|
page read and write
|
||
2CB3F448000
|
direct allocation
|
page read and write
|
||
223DC7EC000
|
heap
|
page read and write
|
||
1742000
|
unkown
|
page execute and read and write
|
||
1742000
|
unkown
|
page execute and read and write
|
||
5E28DCE000
|
stack
|
page read and write
|
||
17AC000
|
unkown
|
page execute and read and write
|
||
172B000
|
unkown
|
page execute and read and write
|
||
223DC270000
|
trusted library allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
223DC81A000
|
heap
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
229D3BF2000
|
heap
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
2CB65F40000
|
heap
|
page read and write
|
||
1F43DE18000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
C0001B2000
|
direct allocation
|
page read and write
|
||
2CB646B1000
|
direct allocation
|
page read and write
|
||
223DC7F0000
|
heap
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
2CB3F34C000
|
heap
|
page read and write
|
||
223DC327000
|
heap
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
223DC7ED000
|
heap
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
223DC0CF000
|
heap
|
page read and write
|
||
223DC0C7000
|
heap
|
page read and write
|
||
C000170000
|
direct allocation
|
page read and write
|
||
223DC058000
|
heap
|
page read and write
|
||
1312000
|
unkown
|
page execute and read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
1F43DC20000
|
heap
|
page read and write
|
||
525AAFE000
|
stack
|
page read and write
|
||
229D3C3F000
|
heap
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
21F341C0000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C00025C000
|
direct allocation
|
page read and write
|
||
FD6DFFE000
|
stack
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
223DC7F0000
|
heap
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
1749000
|
unkown
|
page execute and read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
2CB66080000
|
heap
|
page read and write
|
||
1D581E60000
|
heap
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
223DC0C7000
|
heap
|
page read and write
|
||
AD4F7FF000
|
stack
|
page read and write
|
||
999A17E000
|
stack
|
page read and write
|
||
21F340B0000
|
heap
|
page read and write
|
||
223DC327000
|
heap
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
525ABFF000
|
stack
|
page read and write
|
||
229FA7B0000
|
direct allocation
|
page read and write
|
||
1F43DE14000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
17B5000
|
unkown
|
page execute and write copy
|
||
C000130000
|
direct allocation
|
page read and write
|
||
223DC7E8000
|
heap
|
page read and write
|
||
21F342C8000
|
direct allocation
|
page read and write
|
||
1F4648E0000
|
direct allocation
|
page read and write
|
||
223DC7EE000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
223DC32B000
|
heap
|
page read and write
|
||
C000202000
|
direct allocation
|
page read and write
|
||
1504DFF000
|
stack
|
page read and write
|
||
21F341E2000
|
heap
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
223DC230000
|
heap
|
page read and write
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
223DC32A000
|
heap
|
page read and write
|
||
1770000
|
unkown
|
page execute and read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
223DE096000
|
heap
|
page read and write
|
||
C0001D2000
|
direct allocation
|
page read and write
|
||
223DC809000
|
heap
|
page read and write
|
||
223DC250000
|
heap
|
page read and write
|
||
223DC2F0000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
1D724BE0000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
931717C000
|
stack
|
page read and write
|
||
1F43DD1D000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
525A7BF000
|
stack
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
C000190000
|
direct allocation
|
page read and write
|
||
C0001AE000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
172B000
|
unkown
|
page execute and read and write
|
||
C00024A000
|
direct allocation
|
page read and write
|
||
223DC35E000
|
heap
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
21F79520000
|
heap
|
page read and write
|
||
1340000
|
unkown
|
page execute and read and write
|
||
17AC000
|
unkown
|
page execute and read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
198706D1000
|
direct allocation
|
page read and write
|
||
C0001DA000
|
direct allocation
|
page read and write
|
||
17B5000
|
unkown
|
page execute and write copy
|
||
19871FA0000
|
heap
|
page read and write
|
||
1986B26A000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
223DC067000
|
heap
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
229D3C12000
|
heap
|
page read and write
|
||
AD4F5CE000
|
stack
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
1986B2A8000
|
heap
|
page read and write
|
||
223DC0AE000
|
heap
|
page read and write
|
||
17AC000
|
unkown
|
page execute and read and write
|
||
C00019C000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
19872040000
|
heap
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
223DC0BA000
|
heap
|
page read and write
|
||
229FA850000
|
heap
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
229F8F81000
|
direct allocation
|
page read and write
|
||
229D3B18000
|
direct allocation
|
page read and write
|
||
223DC7F5000
|
heap
|
page read and write
|
||
223DC0CF000
|
heap
|
page read and write
|
||
223DC0B2000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
2CB65EE0000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
15047FE000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
223DC0C3000
|
heap
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C0001C2000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
2CB65F20000
|
direct allocation
|
page read and write
|
||
1F4648F0000
|
direct allocation
|
page read and write
|
||
C000188000
|
direct allocation
|
page read and write
|
||
229D3BFE000
|
heap
|
page read and write
|
||
12FB000
|
unkown
|
page execute and read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
223DE084000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
223DC815000
|
heap
|
page read and write
|
||
223DC0C3000
|
heap
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
15049FF000
|
stack
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
1F464980000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
177B000
|
unkown
|
page execute and read and write
|
||
223DE08D000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C0001AE000
|
direct allocation
|
page read and write
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
229D3BE0000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
AD4FBFF000
|
stack
|
page read and write
|
||
223DC0B4000
|
heap
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
999A27B000
|
stack
|
page read and write
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
999A0FE000
|
stack
|
page read and write
|
||
C0001B2000
|
direct allocation
|
page read and write
|
||
137C000
|
unkown
|
page execute and read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
FD6D7CE000
|
stack
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
21F341CB000
|
heap
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
223DC0B7000
|
heap
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
93170FE000
|
stack
|
page read and write
|
||
1F43DD10000
|
heap
|
page read and write
|
||
223DE081000
|
heap
|
page read and write
|
||
5E29DFF000
|
stack
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
223DC2A0000
|
heap
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
223DC813000
|
heap
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
1F463090000
|
heap
|
page read and write
|
||
223DC7E0000
|
heap
|
page read and write
|
||
9A601FF000
|
stack
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
229FA7E0000
|
direct allocation
|
page read and write
|
||
1986B264000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
1742000
|
unkown
|
page execute and read and write
|
||
940000
|
unkown
|
page readonly
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
C000170000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
AD4FFFF000
|
stack
|
page read and write
|
||
223DC0A1000
|
heap
|
page read and write
|
||
2CB65F00000
|
direct allocation
|
page read and write
|
||
1F463070000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
1D724F25000
|
heap
|
page read and write
|
||
1387000
|
unkown
|
page write copy
|
||
223DC0B1000
|
heap
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
93171FE000
|
stack
|
page read and write
|
||
21F342C4000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
223DC325000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
148C000
|
unkown
|
page execute and write copy
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
223DE083000
|
heap
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
229D3B10000
|
direct allocation
|
page read and write
|
||
1F43DE1A000
|
direct allocation
|
page read and write
|
||
229FA810000
|
direct allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page write copy
|
||
C000046000
|
direct allocation
|
page read and write
|
||
1F464B20000
|
heap
|
page read and write
|
||
21F7AD80000
|
direct allocation
|
page read and write
|
||
223DC0B2000
|
heap
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C0001FC000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
2CB64690000
|
heap
|
page read and write
|
||
223DC0AF000
|
heap
|
page read and write
|
||
21F341CD000
|
heap
|
page read and write
|
||
17B5000
|
unkown
|
page execute and write copy
|
||
C000188000
|
direct allocation
|
page read and write
|
||
19870711000
|
direct allocation
|
page read and write
|
||
19871F40000
|
direct allocation
|
page read and write
|
||
C000244000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
1D582050000
|
heap
|
page read and write
|
||
1D582140000
|
heap
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
148C000
|
unkown
|
page execute and write copy
|
||
999A2FF000
|
stack
|
page read and write
|
||
9316FFB000
|
stack
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C0001CC000
|
direct allocation
|
page read and write
|
||
999A07C000
|
stack
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page write copy
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C0001C6000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
223DC0BA000
|
heap
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
229F8F85000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
223DC062000
|
heap
|
page read and write
|
||
19870690000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
223DC32E000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
223DC7E7000
|
heap
|
page read and write
|
||
15041CE000
|
stack
|
page read and write
|
||
C00019E000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
223DC32E000
|
heap
|
page read and write
|
||
1986B260000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
5E297FC000
|
stack
|
page read and write
|
||
223DC7F5000
|
heap
|
page read and write
|
||
229D3BE9000
|
heap
|
page read and write
|
||
C00022E000
|
direct allocation
|
page read and write
|
||
C0001B0000
|
direct allocation
|
page read and write
|
||
9316EFE000
|
stack
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
1D5821D5000
|
heap
|
page read and write
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
229D3C3F000
|
heap
|
page read and write
|
||
C0001D2000
|
direct allocation
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
229FA860000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000188000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
223DC270000
|
trusted library allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
229D3BE6000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
223DE080000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
1986B2AD000
|
heap
|
page read and write
|
||
223DC270000
|
trusted library allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
2CB3F220000
|
heap
|
page read and write
|
||
229FA800000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
1F43DD1B000
|
heap
|
page read and write
|
||
FD6E3FE000
|
stack
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C0001CE000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
229D3B14000
|
direct allocation
|
page read and write
|
||
1749000
|
unkown
|
page execute and read and write
|
||
5E299FE000
|
stack
|
page read and write
|
||
C000137000
|
direct allocation
|
page read and write
|
||
229FA812000
|
direct allocation
|
page read and write
|
||
C00024E000
|
direct allocation
|
page read and write
|
||
148C000
|
unkown
|
page execute and write copy
|
||
9A5FDFF000
|
stack
|
page read and write
|
||
19870713000
|
direct allocation
|
page read and write
|
||
223DC7F0000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
1D582030000
|
heap
|
page read and write
|
||
229D3BE4000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
223DC324000
|
heap
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
229D3AF0000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
229F8FCB000
|
direct allocation
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
223DC35A000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
177B000
|
unkown
|
page execute and read and write
|
||
C0001DC000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
223DC35D000
|
heap
|
page read and write
|
||
999A1F6000
|
stack
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
1D581E69000
|
heap
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
223DC0B1000
|
heap
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
223DC0C0000
|
heap
|
page read and write
|
||
223DC088000
|
heap
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
229FA7F0000
|
direct allocation
|
page read and write
|
||
229D3BE6000
|
heap
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
223DE094000
|
heap
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
9316F76000
|
stack
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
223DC0A1000
|
heap
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page read and write
|
||
223DC0B1000
|
heap
|
page read and write
|
||
525A738000
|
stack
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
C0001D2000
|
direct allocation
|
page read and write
|
||
9316BFC000
|
stack
|
page read and write
|
||
C0001D4000
|
direct allocation
|
page read and write
|
||
AD501FF000
|
stack
|
page read and write
|
||
1D724BB0000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
223DC0CA000
|
heap
|
page read and write
|
||
19871F30000
|
direct allocation
|
page read and write
|
||
223DE094000
|
heap
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
21F7ADB0000
|
direct allocation
|
page read and write
|
||
229D3B90000
|
heap
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
229D3B1A000
|
direct allocation
|
page read and write
|
||
229D3C3D000
|
heap
|
page read and write
|
||
931707E000
|
stack
|
page read and write
|
||
105C000
|
unkown
|
page execute and write copy
|
||
C000130000
|
direct allocation
|
page read and write
|
||
21F7ADC0000
|
direct allocation
|
page read and write
|
||
21F7AD90000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
223DC80C000
|
heap
|
page read and write
|
||
FD6DDFE000
|
stack
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
223DC086000
|
heap
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
9A5FFFF000
|
stack
|
page read and write
|
||
1770000
|
unkown
|
page execute and read and write
|
||
C00025E000
|
direct allocation
|
page read and write
|
||
21F7AD70000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
223DC355000
|
heap
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
1385000
|
unkown
|
page execute and write copy
|
||
229D3C3D000
|
heap
|
page read and write
|
||
C00002E000
|
direct allocation
|
page read and write
|
||
15045FF000
|
stack
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
223DC0C3000
|
heap
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
9A5FBFE000
|
stack
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
1F464920000
|
direct allocation
|
page read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
17AC000
|
unkown
|
page execute and read and write
|
||
223DC32A000
|
heap
|
page read and write
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
223DE082000
|
heap
|
page read and write
|
||
5E291FE000
|
stack
|
page read and write
|
||
223DC0B7000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
C000135000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
1D724BC0000
|
heap
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
19871F60000
|
direct allocation
|
page read and write
|
||
C000208000
|
direct allocation
|
page read and write
|
||
999A3FC000
|
stack
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
223DC7F1000
|
heap
|
page read and write
|
||
229D3B70000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
1504BFE000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
1986B268000
|
direct allocation
|
page read and write
|
||
1F464900000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
229FAEB0000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
1749000
|
unkown
|
page execute and read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
223DC0CF000
|
heap
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
2CB3F44A000
|
direct allocation
|
page read and write
|
||
223DC270000
|
trusted library allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
9A603FE000
|
stack
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
C000216000
|
direct allocation
|
page read and write
|
||
1387000
|
unkown
|
page read and write
|
||
223DC350000
|
heap
|
page read and write
|
||
1749000
|
unkown
|
page execute and read and write
|
||
177B000
|
unkown
|
page execute and read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
223DC0AA000
|
heap
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
2CB65F60000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
17B7000
|
unkown
|
page read and write
|
||
223DC09F000
|
heap
|
page read and write
|
||
17B7000
|
unkown
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
134B000
|
unkown
|
page execute and read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
223DC32A000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
AD4FDFF000
|
stack
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
223DE094000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
1D5821D0000
|
heap
|
page read and write
|
||
1D724C28000
|
heap
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
2CB65F30000
|
direct allocation
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
C000128000
|
direct allocation
|
page read and write
|
||
999A47E000
|
stack
|
page read and write
|
||
223DC0B9000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
229D3BBC000
|
heap
|
page read and write
|
||
1770000
|
unkown
|
page execute and read and write
|
||
2CB646F1000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
2CB3F444000
|
direct allocation
|
page read and write
|
||
223DC809000
|
heap
|
page read and write
|
||
21F342CA000
|
direct allocation
|
page read and write
|
||
229FA7D0000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
1F464930000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
2CB65F10000
|
direct allocation
|
page read and write
|
||
223DE08E000
|
heap
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
223DC0BC000
|
heap
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
999A37E000
|
stack
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
172B000
|
unkown
|
page execute and read and write
|
||
223DC80A000
|
heap
|
page read and write
|
||
17B5000
|
unkown
|
page execute and write copy
|
||
C000060000
|
direct allocation
|
page read and write
|
||
223DC0B7000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
2CB3F440000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
There are 802 hidden memdumps, click here to show them.