Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
AWkpqJMxci.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\Public\Bzaszylr.url
|
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Bzaszylr.PIF">), ASCII text, with CRLF line
terminators
|
dropped
|
||
C:\Users\Public\Libraries\Bzaszylr
|
data
|
dropped
|
||
C:\Users\Public\Libraries\Bzaszylr.PIF
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\rlyzsazB.cmd
|
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Libraries\PNO
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\alpha.pif
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\xpha.pif
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\AWkpqJMxci.exe
|
"C:\Users\user\Desktop\AWkpqJMxci.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\rlyzsazB.cmd" "
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\AWkpqJMxci.exe /d C:\\Users\\Public\\Libraries\\Bzaszylr.PIF
/o
|
||
C:\Windows\SysWOW64\colorcpl.exe
|
C:\Windows\System32\colorcpl.exe
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
|
||
C:\Users\Public\xpha.pif
|
C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
|
||
C:\Users\Public\alpha.pif
|
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
|
||
C:\Users\Public\Libraries\Bzaszylr.PIF
|
"C:\Users\Public\Libraries\Bzaszylr.PIF"
|
||
C:\Windows\SysWOW64\SndVol.exe
|
C:\Windows\System32\SndVol.exe
|
||
C:\Users\Public\Libraries\Bzaszylr.PIF
|
"C:\Users\Public\Libraries\Bzaszylr.PIF"
|
||
C:\Windows\SysWOW64\colorcpl.exe
|
C:\Windows\System32\colorcpl.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ogcmaw.duckdns.org
|
|||
emberluck.duckdns.org
|
|||
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
|
unknown
|
||
http://geoplugin.net/json.gp
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://drive.usercontent.google.com/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0?
|
unknown
|
||
https://drive.usercontent.google.com/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0
|
142.250.181.33
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://www.pmail.com
|
unknown
|
||
http://ocsp.sectigo.com0C
|
unknown
|
||
https://drive.usercontent.google.com:443/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0x
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ogcmaw.duckdns.org
|
162.216.243.15
|
||
emberluck.duckdns.org
|
192.169.69.26
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
drive.usercontent.google.com
|
142.250.181.33
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
emberluck.duckdns.org
|
United States
|
||
162.216.243.15
|
ogcmaw.duckdns.org
|
United States
|
||
142.250.181.33
|
drive.usercontent.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Bzaszylr
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
|
time
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%systemroot%\system32\colorui.dll,-1400
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
|
UsePerUserProfiles
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27BA000
|
heap
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
6700000
|
remote allocation
|
page execute and read and write
|
||
400000
|
direct allocation
|
page execute and read and write
|
||
308E000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
5120000
|
remote allocation
|
page execute and read and write
|
||
4660000
|
direct allocation
|
page execute and read and write
|
||
DCCF000
|
stack
|
page read and write
|
||
7F020000
|
direct allocation
|
page read and write
|
||
DA2F000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
E693000
|
heap
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2841000
|
direct allocation
|
page execute read
|
||
325E000
|
stack
|
page read and write
|
||
D16000
|
unkown
|
page readonly
|
||
24B3000
|
heap
|
page read and write
|
||
DCCF000
|
stack
|
page read and write
|
||
339C000
|
heap
|
page read and write
|
||
354EC000
|
stack
|
page read and write
|
||
DFA0000
|
remote allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
2EFE000
|
stack
|
page read and write
|
||
7F460000
|
direct allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
DF5F000
|
stack
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
225B000
|
direct allocation
|
page read and write
|
||
29BB000
|
direct allocation
|
page execute and read and write
|
||
33BD000
|
heap
|
page read and write
|
||
2788000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
ABD000
|
stack
|
page read and write
|
||
D7AA000
|
stack
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
1EA000
|
stack
|
page read and write
|
||
DF60000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
32C0000
|
heap
|
page read and write
|
||
E3EC000
|
heap
|
page read and write
|
||
33C9000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
7EB9F000
|
direct allocation
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
E070000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
B2E000
|
unkown
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
E7E8000
|
direct allocation
|
page read and write
|
||
E664000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
B00000
|
unkown
|
page readonly
|
||
B2E000
|
unkown
|
page write copy
|
||
362F000
|
stack
|
page read and write
|
||
E070000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
B2E000
|
unkown
|
page write copy
|
||
241D000
|
direct allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
362F000
|
stack
|
page read and write
|
||
DF72000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
7EFEF000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
E69D000
|
heap
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
D661000
|
direct allocation
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
DBCE000
|
stack
|
page read and write
|
||
23F3000
|
direct allocation
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
33BD000
|
heap
|
page read and write
|
||
4B57000
|
heap
|
page read and write
|
||
7ECA0000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
22A3000
|
direct allocation
|
page read and write
|
||
2918000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
E620000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
D63D000
|
direct allocation
|
page read and write
|
||
7F130000
|
direct allocation
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
D60000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
527000
|
unkown
|
page read and write
|
||
88D000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7EBC0000
|
direct allocation
|
page read and write
|
||
E12E000
|
stack
|
page read and write
|
||
478000
|
direct allocation
|
page execute and read and write
|
||
2306000
|
heap
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
4AFB000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
D63C000
|
direct allocation
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
7EF50000
|
direct allocation
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
EB90000
|
direct allocation
|
page execute and read and write
|
||
7FC80000
|
direct allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
D644000
|
direct allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
33A4000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
65C000
|
heap
|
page read and write
|
||
7F17A000
|
direct allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
629000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
D7AE000
|
stack
|
page execute and read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
33BD000
|
heap
|
page read and write
|
||
D14000
|
unkown
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
DF71000
|
heap
|
page read and write
|
||
31D000
|
stack
|
page read and write
|
||
D62F000
|
direct allocation
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
527000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
B2E000
|
unkown
|
page write copy
|
||
33A4000
|
heap
|
page read and write
|
||
27CA000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
D5C7000
|
direct allocation
|
page read and write
|
||
7EA10000
|
direct allocation
|
page read and write
|
||
2D8D000
|
stack
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2880000
|
direct allocation
|
page readonly
|
||
308E000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
DBCE000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
7F980000
|
direct allocation
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
7E970000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
D6C4000
|
direct allocation
|
page read and write
|
||
33C1000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
46D4000
|
direct allocation
|
page execute and read and write
|
||
2320000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
D5B0000
|
direct allocation
|
page read and write
|
||
7FCCF000
|
direct allocation
|
page read and write
|
||
D6DA000
|
direct allocation
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
27E6000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2293000
|
heap
|
page read and write
|
||
D6A1000
|
direct allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
228D000
|
direct allocation
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
7FDA0000
|
direct allocation
|
page read and write
|
||
32BB000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
7FC80000
|
direct allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
2D6C000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
B00000
|
unkown
|
page readonly
|
||
DF60000
|
heap
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
DE1E000
|
stack
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
21F0000
|
direct allocation
|
page execute and read and write
|
||
33D0000
|
heap
|
page read and write
|
||
D7AE000
|
stack
|
page execute and read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
E3E3000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
7FBBF000
|
direct allocation
|
page read and write
|
||
7F120000
|
direct allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
DF70000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
2448000
|
direct allocation
|
page read and write
|
||
3276000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
D67D000
|
direct allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2408000
|
direct allocation
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
7F270000
|
direct allocation
|
page read and write
|
||
D8EF000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
27CD000
|
heap
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
E86F000
|
heap
|
page read and write
|
||
28C7000
|
direct allocation
|
page execute and read and write
|
||
352E000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
7E990000
|
direct allocation
|
page read and write
|
||
B2E000
|
unkown
|
page write copy
|
||
35530000
|
heap
|
page read and write
|
||
E5FF000
|
trusted library allocation
|
page read and write
|
||
3549E000
|
stack
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
22B8000
|
direct allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2330000
|
direct allocation
|
page execute and read and write
|
||
DA2F000
|
stack
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
7F130000
|
direct allocation
|
page read and write
|
||
AA0000
|
direct allocation
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
313D000
|
stack
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FCF0000
|
direct allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
249B000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
2401000
|
direct allocation
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
358A0000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
2F0F000
|
stack
|
page read and write
|
||
D7AF000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
D6AC000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
DD1E000
|
stack
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
7FBE9000
|
direct allocation
|
page read and write
|
||
2881000
|
direct allocation
|
page execute read
|
||
D693000
|
direct allocation
|
page read and write
|
||
7E800000
|
direct allocation
|
page read and write
|
||
D67C000
|
direct allocation
|
page read and write
|
||
E3D0000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
33C1000
|
heap
|
page read and write
|
||
E710000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7E970000
|
direct allocation
|
page read and write
|
||
DB6F000
|
stack
|
page read and write
|
||
2400000
|
direct allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
E863000
|
heap
|
page read and write
|
||
29B6000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
D6BD000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
2294000
|
direct allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
3552E000
|
stack
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
7E910000
|
direct allocation
|
page read and write
|
||
D6D3000
|
direct allocation
|
page read and write
|
||
7ECA0000
|
direct allocation
|
page read and write
|
||
D684000
|
direct allocation
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
27B7000
|
heap
|
page read and write
|
||
33C1000
|
heap
|
page read and write
|
||
7F460000
|
direct allocation
|
page read and write
|
||
7F340000
|
direct allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
3D10F000
|
trusted library allocation
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
5EF000
|
stack
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
33C1000
|
heap
|
page read and write
|
||
7F1F0000
|
direct allocation
|
page read and write
|
||
465C000
|
stack
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
33BD000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
DF70000
|
heap
|
page read and write
|
||
46D8000
|
direct allocation
|
page execute and read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
7F1E0000
|
direct allocation
|
page read and write
|
||
D69A000
|
direct allocation
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
7EC40000
|
direct allocation
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
33C1000
|
heap
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
2907000
|
direct allocation
|
page execute and read and write
|
||
75E000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
D7EE000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
3545E000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
E861000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
7EBC0000
|
direct allocation
|
page read and write
|
||
8C9000
|
stack
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
23DD000
|
direct allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
DA6E000
|
stack
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
2887000
|
direct allocation
|
page execute and read and write
|
||
B2E000
|
unkown
|
page write copy
|
||
33BD000
|
heap
|
page read and write
|
||
D92E000
|
stack
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
D7AF000
|
stack
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
D16000
|
unkown
|
page readonly
|
||
D605000
|
direct allocation
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
7F460000
|
direct allocation
|
page read and write
|
||
2424000
|
direct allocation
|
page read and write
|
||
481000
|
unkown
|
page read and write
|
||
7F980000
|
direct allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
47A000
|
stack
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
E9F7000
|
heap
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
E07F000
|
trusted library allocation
|
page read and write
|
||
226C000
|
stack
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
DFEE000
|
stack
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
D14000
|
unkown
|
page write copy
|
||
33BD000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page write copy
|
||
33A4000
|
heap
|
page read and write
|
||
27BC000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
2675000
|
heap
|
page read and write
|
||
DE5E000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
DFA0000
|
remote allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
297B000
|
direct allocation
|
page execute and read and write
|
||
2350000
|
heap
|
page read and write
|
||
7EB60000
|
direct allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
DE1E000
|
stack
|
page read and write
|
||
D66F000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
D6CC000
|
direct allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
4C0000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
3390000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
7EA7F000
|
direct allocation
|
page read and write
|
||
238F000
|
direct allocation
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
D653000
|
direct allocation
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
21E0000
|
direct allocation
|
page execute and read and write
|
||
CEF000
|
stack
|
page read and write
|
||
DBCE000
|
stack
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
B32000
|
unkown
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
DCCF000
|
stack
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
529000
|
unkown
|
page read and write
|
||
7F180000
|
direct allocation
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
7BE000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
29FE000
|
direct allocation
|
page execute and read and write
|
||
28D0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
33C1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
7FAD0000
|
direct allocation
|
page read and write
|
||
7ECA0000
|
direct allocation
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
7EC0F000
|
direct allocation
|
page read and write
|
||
7EB30000
|
direct allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
DA2F000
|
stack
|
page read and write
|
||
E070000
|
trusted library allocation
|
page read and write
|
||
D636000
|
direct allocation
|
page read and write
|
||
7EC0F000
|
direct allocation
|
page read and write
|
||
28C3000
|
direct allocation
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
3017000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
B2E000
|
unkown
|
page write copy
|
||
33A4000
|
heap
|
page read and write
|
||
7E9F0000
|
direct allocation
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
2801000
|
direct allocation
|
page execute read
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
7FB50000
|
direct allocation
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
22C6000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
DF5F000
|
stack
|
page read and write
|
||
DFA0000
|
remote allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
236C000
|
stack
|
page read and write
|
||
E865000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
28AE000
|
direct allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7E890000
|
direct allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
7FC5F000
|
direct allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
AE0000
|
direct allocation
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
E62B000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
E22E000
|
stack
|
page read and write
|
||
D7EF000
|
stack
|
page read and write
|
||
DB6F000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
7EC10000
|
direct allocation
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
2883000
|
direct allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
2C5F000
|
stack
|
page read and write
|
||
358F000
|
unkown
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
D7EE000
|
stack
|
page read and write
|
||
29FB000
|
direct allocation
|
page execute and read and write
|
||
30D0000
|
heap
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
7EAA0000
|
direct allocation
|
page read and write
|
||
D5CA000
|
direct allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
23E4000
|
direct allocation
|
page read and write
|
||
27CA000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
3D100000
|
trusted library allocation
|
page read and write
|
||
7EBC0000
|
direct allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
D668000
|
direct allocation
|
page read and write
|
||
D92E000
|
stack
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
529000
|
unkown
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
620000
|
heap
|
page read and write
|
||
7F45B000
|
direct allocation
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
23AB000
|
direct allocation
|
page read and write
|
||
E861000
|
heap
|
page read and write
|
||
7F030000
|
direct allocation
|
page read and write
|
||
4C9000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
228C000
|
stack
|
page read and write
|
||
7F1F0000
|
direct allocation
|
page read and write
|
||
7EB80000
|
direct allocation
|
page read and write
|
||
7F1F0000
|
direct allocation
|
page read and write
|
||
D7EA000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
527000
|
unkown
|
page read and write
|
||
7F150000
|
direct allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2455000
|
stack
|
page read and write
|
||
E668000
|
heap
|
page read and write
|
||
D683000
|
direct allocation
|
page read and write
|
||
7E730000
|
direct allocation
|
page read and write
|
||
D92E000
|
stack
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
E960000
|
trusted library allocation
|
page read and write
|
||
22AA000
|
direct allocation
|
page read and write
|
||
D6E1000
|
direct allocation
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
E5F0000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
unkown
|
page read and write
|
||
D65A000
|
direct allocation
|
page read and write
|
||
DB6F000
|
stack
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
5C0000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
2FAD000
|
stack
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
D7EE000
|
stack
|
page execute and read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
B01000
|
unkown
|
page execute read
|
||
4E5000
|
heap
|
page read and write
|
||
23EC000
|
direct allocation
|
page read and write
|
||
286E000
|
direct allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
D674000
|
direct allocation
|
page read and write
|
||
E621000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
344A000
|
heap
|
page read and write
|
||
27D8000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
DF71000
|
heap
|
page read and write
|
||
B4A000
|
unkown
|
page readonly
|
||
320E000
|
unkown
|
page read and write
|
||
DA6E000
|
stack
|
page read and write
|
||
7FCEF000
|
direct allocation
|
page read and write
|
||
23DE000
|
direct allocation
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
264F000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
282E000
|
direct allocation
|
page read and write
|
||
D5FA000
|
direct allocation
|
page read and write
|
||
33C1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
DE1E000
|
stack
|
page read and write
|
||
2D25000
|
stack
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
630000
|
heap
|
page read and write
|
||
4B3D000
|
stack
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
7F24F000
|
direct allocation
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
7EC0F000
|
direct allocation
|
page read and write
|
||
243A000
|
direct allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
232C000
|
stack
|
page read and write
|
||
E860000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
242C000
|
direct allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
317A000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
7F1E0000
|
direct allocation
|
page read and write
|
||
D676000
|
direct allocation
|
page read and write
|
||
DD1E000
|
stack
|
page read and write
|
||
27DA000
|
heap
|
page read and write
|
||
7F980000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
23C0000
|
direct allocation
|
page read and write
|
||
7EA70000
|
direct allocation
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
7FCA0000
|
direct allocation
|
page read and write
|
||
65C000
|
heap
|
page read and write
|
||
7E8C0000
|
direct allocation
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
D65F000
|
direct allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
E712000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
DF5D000
|
stack
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
43D000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2433000
|
direct allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
E2BD000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
297C000
|
stack
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
474000
|
direct allocation
|
page execute and read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
4909000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
7F340000
|
direct allocation
|
page read and write
|
||
D607000
|
direct allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
7F1A0000
|
direct allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
23FA000
|
direct allocation
|
page read and write
|
||
D6E8000
|
direct allocation
|
page read and write
|
||
D7AA000
|
stack
|
page read and write
|
||
DD1E000
|
stack
|
page read and write
|
||
29BA000
|
heap
|
page read and write
|
||
D6A8000
|
direct allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
D8EF000
|
stack
|
page read and write
|
||
DE5E000
|
stack
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
52B000
|
unkown
|
page write copy
|
||
B4A000
|
unkown
|
page readonly
|
||
4D04000
|
heap
|
page read and write
|
||
E0EF000
|
stack
|
page read and write
|
||
2855000
|
direct allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
7EAF0000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
2441000
|
direct allocation
|
page read and write
|
||
3CE000
|
stack
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
DA6E000
|
stack
|
page read and write
|
||
27DD000
|
heap
|
page read and write
|
||
D6B6000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
33D0000
|
heap
|
page read and write
|
||
2356000
|
heap
|
page read and write
|
||
7EB0F000
|
direct allocation
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
7F23F000
|
direct allocation
|
page read and write
|
||
E960000
|
direct allocation
|
page execute and read and write
|
||
90F000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
481000
|
unkown
|
page read and write
|
||
229C000
|
direct allocation
|
page read and write
|
||
27AF000
|
heap
|
page read and write
|
||
27EE000
|
heap
|
page read and write
|
||
E63F000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
D8EF000
|
stack
|
page read and write
|
||
DE5E000
|
stack
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
2270000
|
direct allocation
|
page read and write
|
||
E697000
|
heap
|
page read and write
|
||
B4E000
|
unkown
|
page readonly
|
||
B01000
|
unkown
|
page execute read
|
||
4FB000
|
heap
|
page read and write
|
||
7F270000
|
direct allocation
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
2895000
|
direct allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
22B1000
|
direct allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
343B000
|
heap
|
page read and write
|
||
27BA000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
There are 806 hidden memdumps, click here to show them.